Results 1 - 10
of
34,609
Subject terms:
"... The electron is predicted to be slightly aspheric 1, with a distortion characterized by the electric dipole moment (EDM), d. No experiment has ever detected this deviation. The standard model of particle physics predicts that d is far too small to detect 2, being some eleven orders of magnitude smal ..."
Abstract
- Add to MetaCart
The electron is predicted to be slightly aspheric 1, with a distortion characterized by the electric dipole moment (EDM), d. No experiment has ever detected this deviation. The standard model of particle physics predicts that d is far too small to detect 2, being some eleven orders of magnitude smaller than the current experimental sensitivity. However, many extensions to the standard model naturally predict much larger values of d that should be detectable 3. This makes the search for the electron EDM a powerful way to search for new physics and constrain the possible extensions. In particular, the popular idea that new supersymmetric particles may exist at masses of a few hundred GeV/c 2 (where c is the speed of light) is difficult to reconcile with the absence of an electron EDM at the present limit of sensitivity 2, 4. The size of the EDM is also intimately related to the question of why the Universe has so little antimatter. If the reason is that some undiscovered particle interaction 5 breaks the symmetry between matter and antimatter, this should result in a measurable EDM in most models of particle physics 2. Here we use cold polar molecules to measure the electron EDM at the highest level of precision reported so far, providing a constraint on any possible new interactions. We obtain d = (−2.4 ± 5.7 ± 1.5) × 10 −28 e cm, where e is the charge on the electron, which sets a new upper limit of |d | < 10.5 × 10 −28 e cm with 90 per cent confidence. This result, consistent with zero, indicates that the electron is spherical at this improved level of precision. Our measurement of atto-electronvolt energy shifts in a molecule probes new physics at the tera-electronvolt energy scale 2 e e e e stat syst
Modeling Term Structures of Defaultable Bonds
, 1999
"... This article presents convenient reduced-form models of the valuation of contingent claims subject to default risk, focusing on applications to the term structure of interest rates for corporate or sovereign bonds. Examples include the valuation of a credit-spread option ..."
Abstract
-
Cited by 672 (34 self)
- Add to MetaCart
This article presents convenient reduced-form models of the valuation of contingent claims subject to default risk, focusing on applications to the term structure of interest rates for corporate or sovereign bonds. Examples include the valuation of a credit-spread option
Social force model for pedestrian dynamics
- Physical Review E
, 1995
"... It is suggested that the motion of pedestrians can be described as if they would be subject to ‘social forces’. These ‘forces ’ are not directly exerted by the pedestrians ’ personal environment, but they are a measure for the internal motivations of the individuals to perform certain actions (movem ..."
Abstract
-
Cited by 504 (25 self)
- Add to MetaCart
It is suggested that the motion of pedestrians can be described as if they would be subject to ‘social forces’. These ‘forces ’ are not directly exerted by the pedestrians ’ personal environment, but they are a measure for the internal motivations of the individuals to perform certain actions
An intrusion-detection model
- IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract
-
Cited by 639 (0 self)
- Add to MetaCart
of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular
The theory of planned behavior
- Organizational Behavior and Human Decision Processes
, 1991
"... Research dealing with various aspects of * the theory of planned behavior (Ajzen, 1985, 1987) is reviewed, and some unresolved issues are discussed. In broad terms, the theory is found to be well supported by empirical evidence. Intentions to perform behaviors of different kinds can be predicted wit ..."
Abstract
-
Cited by 2754 (9 self)
- Add to MetaCart
Research dealing with various aspects of * the theory of planned behavior (Ajzen, 1985, 1987) is reviewed, and some unresolved issues are discussed. In broad terms, the theory is found to be well supported by empirical evidence. Intentions to perform behaviors of different kinds can be predicted
Controlled and automatic human information processing
- I. Detection, search, and attention. Psychological Review
, 1977
"... A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically—without subjec ..."
Abstract
-
Cited by 874 (16 self)
- Add to MetaCart
A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically
Verbal reports as data
- Psychological Review
, 1980
"... The central proposal of this article is that verbal reports are data. Accounting for verbal reports, as for other kinds of data, requires explication of the mech-anisms by which the reports are generated, and the ways in which they are sensitive to experimental factors (instructions, tasks, etc.). W ..."
Abstract
-
Cited by 513 (3 self)
- Add to MetaCart
.). Within the theoret-ical framework of human information processing, we discuss different types of processes underlying verbalization and present a model of how subjects, in re-sponse to an instruction to think aloud, verbalize information that they are attending to in short-term memory (STM). Verbalizing
Emerging adulthood: A theory of development from the late teens through the twenties
- American Psychologist
, 2000
"... Emerging adulthood is proposed as a new conception of development for the period from the late teens through the twenties, with a focus on ages 18-25. A theoretical back-ground is presented, Then evidence is provided to support the idea that emerging adulthood is a distinct period de-mographically, ..."
Abstract
-
Cited by 643 (11 self)
- Add to MetaCart
-mographically, subjectively, and in terms of identity explo-rations. How emerging adulthood iffers from adolescence and young adulthood is explained. Finally, a cultural con-text for the idea of emerging adulthood is outlined, and it is specified that emerging adulthood exists only in cultures that allow young people a
Stochastic Perturbation Theory
, 1988
"... . In this paper classical matrix perturbation theory is approached from a probabilistic point of view. The perturbed quantity is approximated by a first-order perturbation expansion, in which the perturbation is assumed to be random. This permits the computation of statistics estimating the variatio ..."
Abstract
-
Cited by 907 (36 self)
- Add to MetaCart
the variation in the perturbed quantity. Up to the higher-order terms that are ignored in the expansion, these statistics tend to be more realistic than perturbation bounds obtained in terms of norms. The technique is applied to a number of problems in matrix perturbation theory, including least squares
Sparse MRI: The Application of Compressed Sensing for Rapid MR Imaging
- MAGNETIC RESONANCE IN MEDICINE 58:1182–1195
, 2007
"... The sparsity which is implicit in MR images is exploited to significantly undersample k-space. Some MR images such as angiograms are already sparse in the pixel representation; other, more complicated images have a sparse representation in some transform domain–for example, in terms of spatial finit ..."
Abstract
-
Cited by 538 (11 self)
- Add to MetaCart
The sparsity which is implicit in MR images is exploited to significantly undersample k-space. Some MR images such as angiograms are already sparse in the pixel representation; other, more complicated images have a sparse representation in some transform domain–for example, in terms of spatial
Results 1 - 10
of
34,609