583 research outputs found
REGIONAL GAINS AND LOSSES FOR CONSUMERS AND PRODUCERS FROM CHANGES IN FLUID MILK PRICES
Agribusiness,
Coddling Spies: Why the Law Doesn’t Adequately Address Computer Spyware
Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another\u27s computer to report a user\u27s activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual\u27s identity. Existing law does not address spyware adequately because authorization language, buried in click-through boilerplate, renders much of current law useless. Congress must act to make spyware companies disclose their intentions with conspicuous and clearly-stated warnings
Interpretations of Presburger Arithmetic in Itself
Presburger arithmetic PrA is the true theory of natural numbers with
addition. We study interpretations of PrA in itself. We prove that all
one-dimensional self-interpretations are definably isomorphic to the identity
self-interpretation. In order to prove the results we show that all linear
orders that are interpretable in (N,+) are scattered orders with the finite
Hausdorff rank and that the ranks are bounded in terms of the dimension of the
respective interpretations. From our result about self-interpretations of PrA
it follows that PrA isn't one-dimensionally interpretable in any of its finite
subtheories. We note that the latter was conjectured by A. Visser.Comment: Published in proceedings of LFCS 201
Sediment management for Horseshoe Lake and its watershed, Alexander County, Illinois
Illinois Department of Conservation Contract No. 1-5-39782published or submitted for publicationis peer reviewedOpe
Circular quantum secret sharing
A circular quantum secret sharing protocol is proposed, which is useful and
efficient when one of the parties of secret sharing is remote to the others who
are in adjacent, especially the parties are more than three. We describe the
process of this protocol and discuss its security when the quantum information
carrying is polarized single photons running circularly. It will be shown that
entanglement is not necessary for quantum secret sharing. Moreover, the
theoretic efficiency is improved to approach 100% as almost all the instances
can be used for generating the private key, and each photon can carry one bit
of information without quantum storage. It is straightforwardly to utilize this
topological structure to complete quantum secret sharing with multi-level
two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
We give easy proofs of some recent results concerning threshold gaps in ramp schemes. We then generalise a construction method for ramp schemes employing error-correcting codes so that it can be applied using nonlinear (as well as linear) codes. Finally, as an immediate consequence of these results, we provide a new explicit bound on the minimum length of a code having a specified distance and dual distance
Emergent global patterns of ecosystem structure and function from a mechanistic general ecosystem model
Anthropogenic activities are causing widespread degradation of ecosystems worldwide, threatening the ecosystem services upon which all human life depends. Improved understanding of this degradation is urgently needed to improve avoidance and mitigation measures. One tool to assist these efforts is predictive models of ecosystem structure and function that are mechanistic: based on fundamental ecological principles. Here we present the first mechanistic General Ecosystem Model (GEM) of ecosystem structure and function that is both global and applies in all terrestrial and marine environments. Functional forms and parameter values were derived from the theoretical and empirical literature where possible. Simulations of the fate of all organisms with body masses between 10 µg and 150,000 kg (a range of 14 orders of magnitude) across the globe led to emergent properties at individual (e.g., growth rate), community (e.g., biomass turnover rates), ecosystem (e.g., trophic pyramids), and macroecological scales (e.g., global patterns of trophic structure) that are in general agreement with current data and theory. These properties emerged from our encoding of the biology of, and interactions among, individual organisms without any direct constraints on the properties themselves. Our results indicate that ecologists have gathered sufficient information to begin to build realistic, global, and mechanistic models of ecosystems, capable of predicting a diverse range of ecosystem properties and their response to human pressures
The Legal Status of Spyware
This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs
The Legal Status of Spyware
This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs
- …
