14,326 research outputs found

    Lifetime of Magnetically Trapped Antihydrogen in ALPHA

    Full text link
    How long antihydrogen atoms linger in the ALPHA magnetic trap is an important characteristic of the ALPHA apparatus. The initial trapping experiments in 2010 [1] were conducted with 38 detected antiatoms confined for 172 ms and in 2011 [2] with seven for 1000 s. Long confinement times are necessary to perform detailed frequency scans during spectroscopic measurements. An analysis carried out, using machine learning methods, on more than 1000 antiatoms confined for several hours in the ALPHA-2 magnetic trap, yields a preliminary lower limit to the lifetime of 66 hours. Hence this observation suggests that the measured confinement time of antihydrogen is extended by more than two orders of magnitude. [1] Andresen, G. B. et al. (ALPHA collaboration), Nature 468, 673-676 (2010) [2] Andresen, G. B. et al. (ALPHA collaboration), Nature Phys. 7, 558-564 (2011

    Reachability Analysis of Time Basic Petri Nets: a Time Coverage Approach

    Full text link
    We introduce a technique for reachability analysis of Time-Basic (TB) Petri nets, a powerful formalism for real- time systems where time constraints are expressed as intervals, representing possible transition firing times, whose bounds are functions of marking's time description. The technique consists of building a symbolic reachability graph relying on a sort of time coverage, and overcomes the limitations of the only available analyzer for TB nets, based in turn on a time-bounded inspection of a (possibly infinite) reachability-tree. The graph construction algorithm has been automated by a tool-set, briefly described in the paper together with its main functionality and analysis capability. A running example is used throughout the paper to sketch the symbolic graph construction. A use case describing a small real system - that the running example is an excerpt from - has been employed to benchmark the technique and the tool-set. The main outcome of this test are also presented in the paper. Ongoing work, in the perspective of integrating with a model-checking engine, is shortly discussed.Comment: 8 pages, submitted to conference for publicatio

    Q-CAD: QoS and Context Aware Discovery framework for adaptive mobile systems

    Get PDF
    This paper presents Q-CALl, a resource discovery framework that enables pervasive computing applications to discover and select the resource(s) best satisfying the user needs, taking the current execution context and quality-ofservice (QoS} requirements into account. The available resources are first screened, so that only those suirable to the current execution context of the application will be considered; the shortlisted resources are then evaluated against the QoS needs of the application, and a binding is established to the best available

    TRULLO - local trust bootstrapping for ubiquitous devices

    Get PDF
    Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such content is growing rapidly and, from the perspective of each user, selecting relevant content is key. To this end, each user may run a trust model - a software agent that keeps track of who disseminates content that its user finds relevant. This agent does so by assigning an initial trust value to each producer for a specific category (context); then, whenever it receives new content, the agent rates the content and accordingly updates its trust value for the producer in the content category. However, a problem with such an approach is that, as the number of content categories increases, so does the number of trust values to be initially set. This paper focuses on how to effectively set initial trust values. The most sophisticated of the current solutions employ predefined context ontologies, using which initial trust in a given context is set based on that already held in similar contexts. However, universally accepted (and time invariant) ontologies are rarely found in practice. For this reason, we propose a mechanism called TRULLO (TRUst bootstrapping by Latently Lifting cOntext) that assigns initial trust values based only on local information (on the ratings of its user’s past experiences) and that, as such, does not rely on third-party recommendations. We evaluate the effectiveness of TRULLO by simulating its use in an informal antique market setting. We also evaluate the computational cost of a J2ME implementation of TRULLO on a mobile phone

    Towards a human trust model for mobile ad-hoc networks

    Get PDF

    Third Circuit Task Force Report on Selection of Class Counsel

    Get PDF

    Classroom Games: A Prisoner's Dilemma

    Get PDF
    Game theory is often introduced in undergraduate courses in the context of a prisoner's dilemma paradigm, which illustrates the conflict between social incentives to cooperate and private incentives to defect. We present a very simple card game that efficiently involves a large number of students in a prisoner's dilemma. The extent of cooperation is affected by the payoff incentives and by the nature of repeated interaction. The exercise can be used to stimulate a discussion of a wide range of topics such as bankruptcy, quality standards, or price competition.prisoner's dilemma, game theory, experimental economics, classroom experiments

    Foreword: Symposium on Forensic Expert Testimony, \u3ci\u3eDaubert\u3c/i\u3e, and Rule 702

    Get PDF
    On October 27, 2017, the Judicial Conference Advisory Committee on Evidence Rules held a Symposium to obtain input and guidance on critical matters involving the admissibility of expert testimony. The Symposium consisted of presentations and discussions by brilliant scientists, outstanding federal judges, academics with deep expertise in both evidence and science, and stellar practitioners from private and public practice. The transcript of the Symposium and the accompanying articles establish an important agenda for the Advisory Committee to tackle over the next few years

    Expanding (or Just Fixing) the Residual Exception to the Hearsay Rule

    Get PDF
    The Judicial Conference Advisory Committee on Evidence Rules (“the Committee”) has been considering whether to amend Federal Rule of Evidence 807 (known as the residual exception to the hearsay rule) to improve the way the Rule functions—and also to allow the admission of more hearsay if it is reliable. At the conference sponsored by the Committee in October, 2016—transcribed in this Fordham Law Review issue—the Committee submitted a working draft of an amendment that was vetted by the experts at the conference and reviewed favorably by most. This Article analyzes the arguments in favor of and against the reform of the residual exception and will set forth and explain the Advisory Committee’s approach to a possible amendment
    corecore