984 resultados para 420205 Latin and Classical Greek
Resumo:
Très peu d’études ont été consacrées à l’œuvre de la romancière française Lydie Salvayre, dont le premier roman a paru en 1990. Il me semble pertinent de me pencher plus sérieusement sur son travail, qui manifeste une véritable exigence d’écriture. Un trait de l’œuvre de Salvayre m’intéresse plus spécifiquement : son rapport à l’héritage. J’envisage ce rapport à la fois dans la thématique, dans l’écriture et dans la forme de deux de ses romans, soient La Puissance des mouches (1995) et La Méthode Mila (2005). Dans chacun de ces deux romans, le narrateur a un rapport trouble à la fois avec son héritage familial et avec son héritage culturel, plus spécialement celui de la philosophie et de la satire classiques. Tiraillé entre le monde du quotidien (trivial) et le monde des idées (sublime), le personnage cherche une issue : il cherche comment vivre. Dans La Puissance des mouches, le narrateur voue une haine à son père et avoue un amour pour Pascal. Dans La Méthode Mila, il est déchiré entre sa mère sénile dont il a la charge et Descartes dont il est obsédé. J’étudierai comment se vit cette déchirure et comment le texte la travaille. La façon dont l’auteure met l’héritage en éclats — elle pastiche, bouscule, malmène, détourne les classiques — n’a rien du respect servile. Cette manière d’hériter, de rompre avec l’évidence d’une continuité avec le passé, pose une question essentielle : comment hériter aujourd’hui, et pourquoi ?
Resumo:
Entièrement réalisé grâce au programme LaTeX (http://www.latex-project.org/)
Resumo:
Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a common secret key over a public authenticated channel, and an eavesdropper who intercepts all their messages in order to learn the secret. We consider query complexity in which we count only the number of evaluations (queries) of a given black-box function, and classical communication channels. Ralph Merkle provided the first unclassified scheme for secure communications over insecure channels. When legitimate parties are willing to ask O(N) queries for some parameter N, any classical eavesdropper needs Omega(N^2) queries before being able to learn their secret, which is is optimal. However, a quantum eavesdropper can break this scheme in O(N) queries. Furthermore, it was conjectured that any scheme, in which legitimate parties are classical, could be broken in O(N) quantum queries. In this thesis, we introduce protocols à la Merkle that fall into two categories. When legitimate parties are restricted to use classical computers, we offer the first secure classical scheme. It requires Omega(N^{13/12}) queries of a quantum eavesdropper to learn the secret. We give another protocol having security of Omega(N^{7/6}) queries. Furthermore, for any k>= 2, we introduce a classical protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1/2+k/{k+1}}) queries, approaching Theta(N^{3/2}) when k increases. When legitimate parties are provided with quantum computers, we present two quantum protocols improving on the best known scheme before this work. Furthermore, for any k>= 2, we give a quantum protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1+{k}/{k+1}})} queries, approaching Theta(N^{2}) when k increases.
Resumo:
Despite the wide range of agendas used in legislative decision-making, the literature has focused almost exclusively on two stylized formats, the so-called Euro-Latin and Anglo-American agendas. As emphasized by Ordeshook and Schwartz [1987], this focus leaves a sizable gap in our understanding of the legislative process. To help address the deficiency, I first define a very broad class of agendas (called simple agendas) whose features are common among agendas used in legislative settings. I then characterize the sophisticated (Farquharson [1969]) voting outcomes implemented by agendas in this class. By establishing a clear connection between the structure of simple agendas and the outcomes associated with them, the characterization extends our understanding of legislative decision-making well beyond the very limited scope of Euro-Latin and Anglo-American agendas.
Resumo:
In classical field theory, the ordinary potential V is an energy density for that state in which the field assumes the value ¢. In quantum field theory, the effective potential is the expectation value of the energy density for which the expectation value of the field is ¢o. As a result, if V has several local minima, it is only the absolute minimum that corresponds to the true ground state of the theory. Perturbation theory remains to this day the main analytical tool in the study of Quantum Field Theory. However, since perturbation theory is unable to uncover the whole rich structure of Quantum Field Theory, it is desirable to have some method which, on one hand, must go beyond both perturbation theory and classical approximation in the points where these fail, and at that time, be sufficiently simple that analytical calculations could be performed in its framework During the last decade a nonperturbative variational method called Gaussian effective potential, has been discussed widely together with several applications. This concept was described as a means of formalizing our intuitive understanding of zero-point fluctuation effects in quantum mechanics in a way that carries over directly to field theory.
Resumo:
We are currently at the cusp of a revolution in quantum technology that relies not just on the passive use of quantum effects, but on their active control. At the forefront of this revolution is the implementation of a quantum computer. Encoding information in quantum states as “qubits” allows to use entanglement and quantum superposition to perform calculations that are infeasible on classical computers. The fundamental challenge in the realization of quantum computers is to avoid decoherence – the loss of quantum properties – due to unwanted interaction with the environment. This thesis addresses the problem of implementing entangling two-qubit quantum gates that are robust with respect to both decoherence and classical noise. It covers three aspects: the use of efficient numerical tools for the simulation and optimal control of open and closed quantum systems, the role of advanced optimization functionals in facilitating robustness, and the application of these techniques to two of the leading implementations of quantum computation, trapped atoms and superconducting circuits. After a review of the theoretical and numerical foundations, the central part of the thesis starts with the idea of using ensemble optimization to achieve robustness with respect to both classical fluctuations in the system parameters, and decoherence. For the example of a controlled phasegate implemented with trapped Rydberg atoms, this approach is demonstrated to yield a gate that is at least one order of magnitude more robust than the best known analytic scheme. Moreover this robustness is maintained even for gate durations significantly shorter than those obtained in the analytic scheme. Superconducting circuits are a particularly promising architecture for the implementation of a quantum computer. Their flexibility is demonstrated by performing optimizations for both diagonal and non-diagonal quantum gates. In order to achieve robustness with respect to decoherence, it is essential to implement quantum gates in the shortest possible amount of time. This may be facilitated by using an optimization functional that targets an arbitrary perfect entangler, based on a geometric theory of two-qubit gates. For the example of superconducting qubits, it is shown that this approach leads to significantly shorter gate durations, higher fidelities, and faster convergence than the optimization towards specific two-qubit gates. Performing optimization in Liouville space in order to properly take into account decoherence poses significant numerical challenges, as the dimension scales quadratically compared to Hilbert space. However, it can be shown that for a unitary target, the optimization only requires propagation of at most three states, instead of a full basis of Liouville space. Both for the example of trapped Rydberg atoms, and for superconducting qubits, the successful optimization of quantum gates is demonstrated, at a significantly reduced numerical cost than was previously thought possible. Together, the results of this thesis point towards a comprehensive framework for the optimization of robust quantum gates, paving the way for the future realization of quantum computers.
Resumo:
Revisión crítica de la ‘versión heredada’ sobre el resurgir del pragmatismo norteamericano. Aquí sostengo que ésta es una narrativa sobre la historia de la filosofía que puede ser usada para “reivindicar” la continuidad o para “añorar” la pérdida de esa tradición. Presento tres argumentos a favor de mi tesis sobre la versión heredada: i) es insuficiente para explicar el surgimiento del pragmatismo; ii) es un tipo de narrativa que hace plausible una imagen de la filosofía; iii) impide apreciar que la formación del canon obedece a los propósitos de los seguidores del movimiento.
Resumo:
Technical efficiency is estimated and examined for a cross-section of Australian dairy farms using various frontier methodologies; Bayesian and Classical stochastic frontiers, and Data Envelopment Analysis. The results indicate technical inefficiency is present in the sample data. Also identified are statistical differences between the point estimates of technical efficiency generated by the various methodologies. However, the rank of farm level technical efficiency is statistically invariant to the estimation technique employed. Finally, when confidence/credible intervals of technical efficiency are compared significant overlap is found for many of the farms' intervals for all frontier methods employed. The results indicate that the choice of estimation methodology may matter, but the explanatory power of all frontier methods is significantly weaker when interval estimate of technical efficiency is examined.
Resumo:
Decay-accelerating factor (CD55), a regulator of the alternative and classical pathways of complement activation, is expressed on all serum-exposed cells. It is used by pathogens, including many enteroviruses and uropathogenic Escherichia coli, as a receptor prior to infection. We describe the x-ray structure of a pathogen-binding fragment of human CD55 at 1.7 A resolution containing two of the three domains required for regulation of human complement. We have used mutagenesis to map biological functions onto the molecule; decay-accelerating activity maps to a single face of the molecule, whereas bacterial and viral pathogens recognize a variety of different sites on CD55.
Resumo:
Parasitoids are the most important natural enemies of many insect species. Larvae of many Drosophila species can defend themselves against attack by parasitoids through a cellular immune response called encapsulation. The paper reviews recent studies of the evolutionary biology and ecological genetics of resistance in Drosophila, concentrating on D. melanogaster. The physiological basis of encapsulation, and the genes known to interfere with resistance are briefly summarized. Evidence for within- and between-population genetic variation in resistance from isofemale line, artificial selection and classical genetic studies are reviewed. There is now firm evidence that resistance is costly to Drosophila, and the nature of this cost is discussed, and the possibility that it may involve a reduction in metabolic rate considered. Comparative data on encapsulation and metabolic rates across seven Drosophila species provides support for this hypothesis. Finally, the possible population and community ecological consequences of evolution in the levels of host resistance are examined.
Resumo:
The May 2014 European Parliament (EP) elections were characterised by the success of far-right Eurosceptic parties, including the French Front National, UKIP, the Danish People’s Party, the Hungarian Jobbik, the Austrian FPÖ, the True Finns and the Greek Golden Dawn. However, a closer look at the results across Europe indicates that the success of far-right parties in the EP elections is neither a linear nor a clear-cut phenomenon: (1) the far right actually declined in many European countries compared to the 2009 results; (2) some of the countries that have experienced the worst of the economic crisis, including Spain, Portugal and Ireland, did not experience a significant rise in far-right party support; and (3) ‘far right’ is too broad an umbrella term, covering parties that are too different from each other to be grouped in one single party family.
Resumo:
We discuss substorm observations made near 2100 magnetic local time (MLT) on March 7, 1991, in a collaborative study involving data from the European Incoherent Scatter radar, all-sky camera data, and magnetometer data from the Tromsø Auroral Observatory, the U.K. Sub-Auroral Magnetometer Network (SAMNET) and the IMAGE magnetometer chain. We conclude that for the substorm studied a plasmoid was not pinched off until at least 10 min after onset at the local time of the observations (2100 MLT) and that the main substorm electrojet expanded westward over this local time 14 min after onset. In the late growth phase/early expansion phase, we observed southward drifting arcs probably moving faster than the background plasma. Similar southward moving arcs in the recovery phase moved at a speed which does not appear to be significantly different from the measured plasma flow speed. We discuss these data in terms of the “Kiruna conjecture” and classical “near-Earth neutral line” paradigms, since the data show features of both models of substorm development. We suggest that longitudinal variation in behavior may reconcile the differences between the two models in the case of this substorm.
Resumo:
A bibliography covering the archaeology of Bactria, Sogdiana, Arachosia and Gandhāra in the period of the Graeco-Bactrian and Indo-Greek kingdoms
Resumo:
BnF fr. 95 is a late 13th century manuscript containing Arthurian romances and other fictional and didactic texts. The Estoire del saint Graal and Merlin section is the most highly illuminated, with a rich marginal iconography, an unusual feature in the illustration of lay works and in these texts’ manuscript tradition. This article shows how in Merlin and its Vulgate Sequel marginal scenes overlap with widespread subjects in courtly and chivalric vernacular romances, in contrast with Latin and religious works. The reuse of similar patterns in principal and marginal miniatures, examined in the episode of the Battle of Danablaise, where King Arthur fights the Saxon King Rion, highlights the need for a comprehensive reading of text and images, taking into account the mise en page and the different levels of illustration in the manuscript.
Resumo:
This perspectives paper and its associated commentaries examine Alan Rugman's conceptual contribution to international business scholarship. Most significantly, we highlight Rugman's version of internalization theory as an approach that integrates transaction cost economics and ‘classical’ internalization theory with elements from the resource-based view, such that it is especially relevant to strategic management. In reviewing his oeuvre, we also offer observations on his ideas for ‘new internalization theory’. We classify his other novel insights into four categories: Network Multinationals; National competitiveness; Development and public policy; and Emerging Economy MNEs. This special section offers multiple views on how his work informed the larger academic debate and considers how these ideas might evolve in the longer term.