Under the purely economics-based approach to competition law, the central consideration is whether the conduct of undertakings has the effect of restricting competition or not. Such an ‘objective’ approach to antitrust enforcement leaves little room for subjective elements like intentions. But what happens when economic analysis reaches its limits? In this signal contribution, the author invokes the criminal law concept of mens rea, the idea of the ‘guilty mind’, thoroughly evaluating the normative cogency of mens rea evidence in the determination of antitrust infringements. Delving deep into the case law, the author views the subject from the standpoint of a confluence of various areas of law, including: the role of mens rea in the criminal law in France, Germany, and England and Wales; the different types of mens rea (e.g., intent, recklessness, negligence); mens rea in a corporate context; mens rea evidence in United States antitrust law; the notion of the ‘meeting of minds’ in Article 101 TFEU; relevance of intentions in the determination of the object of an agreement or concerted practice; relevance of intentions in the determination of abuse of a dominant position; and the role of mens rea in the determination of fines for antitrust breaches. The author also examines arguments both for and against the use of mens rea evidence in determining whether an antitrust infringement took place and how it should be punished. This is the first full-length assessment of what role mens rea evidence actually plays and should play in competition law even as the tools for antitrust analysis are meant to become increasingly objective. As a thoroughly researched and systematically presented commentary and analysis of the current status of the use of mens rea in antitrust enforcement and how the practice could develop, it is sure to be welcomed by practitioners as well as by policymakers and academics.
There is no recent elementary introduction to the theory of discrete dynamical systems that stresses the topological background of the topic. This book fills this gap: it deals with this theory as 'applied general topology'. We treat all important concepts needed to understand recent literature. The book is addressed primarily to graduate students. The prerequisites for understanding this book are modest: a certain mathematical maturity and course in General Topology are sufficient.
This volume contains the papers which have been accepted for presentation atthe Third International Symposium on Programming Language Implementation andLogic Programming (PLILP '91) held in Passau, Germany, August 26-28, 1991. The aim of the symposium was to explore new declarative concepts, methods and techniques relevant for the implementation of all kinds of programming languages, whether algorithmic or declarative ones. The intention was to gather researchers from the fields of algorithmic programming languages as well as logic, functional and object-oriented programming. This volume contains the two invited talks given at the symposium by H. Ait-Kaci and D.B. MacQueen, 32 selected papers, and abstracts of several system demonstrations. The proceedings of PLILP '88 and PLILP '90 are available as Lecture Notes in Computer Science Volumes 348 and 456.
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. Topics and features: Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest Helps develop a comprehensive understanding of modern applied cryptography Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum Supplies up-to-date security parameters for all cryptographic algorithms Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, from whichthey have drawn important lessons for their teaching.
The introduction of consumer-level head-mounted devices (HMDs) has led to a major drop in the application costs of virtual reality (VR), making the technology available for a wide range of users. To understand if VR HMDs can be used for planning and training in the context of manual order picking, this thesis provides the results of a large-scale randomized controlled study in which order picking has been compared between a virtual and a real environment. The results imply that VR HMDs can indeed be used by manufacturers and warehouse operators in a rack planning process if the reduction of searching times or the perceived workload is in focus. Additionally, the findings enable the use of VR HMDs for scientific research on human-centred rack design. Finally, the thesis highlights the usability of VR HMDs for training manual order picking activities.
This book constitutes the refereed proceedings of the 8th International Symposium on Experimental and Efficient Algorithms, SEA 2009, held in Dortmund, Germany, in June 2009. The 23 revised full papers were carefully reviewed and selected from 64 submissions and present current research on experimental evaluation and engineering of algorithms, as well as in various aspects of computational optimization and its applications. Contributions are supported by experimental evaluation, methodological issues in the design and interpretation of experiments, the use of (meta-) heuristics, or application-driven case studies that deepen the understanding of a problem's complexity.
Low-Energy FPGAs: Architecture and Design is a primary resource for both researchers and practicing engineers in the field of digital circuit design. The book addresses the energy consumption of Field-Programmable Gate Arrays (FPGAs). FPGAs are becoming popular as embedded components in computing platforms. The programmability of the FPGA can be used to customize implementations of functions on an application basis. This leads to performance gains, and enables reuse of expensive silicon. Chapter 1 provides an overview of digital circuit design and FPGAs. Chapter 2 looks at the implication of deep-submicron technology onFPGA power dissipation. Chapter 3 describes the exploration environment to guide and evaluate design decisions. Chapter 4 discusses the architectural optimization process to evaluate the trade-offs between the flexibility of the architecture, and the effect on the performance metrics. Chapter 5 reviews different circuit techniques to reduce the performance overhead of some of the dominant components. Chapter 6 shows methods to configure FPGAs to minimize the programming overhead. Chapter 7 addresses the physical realization of some of the critical components and the final implementation of a specific low-energy FPGA. Chapter 8 compares the prototype array to an equivalent commercial architecture.
This IBM® Redbooks® publication documents and addresses topics to set up a complete infrastructure environment and tune the applications to use an IBM POWER9TM hardware architecture with the technical computing software stack. This publication is driven by a CORAL project solution. It explores, tests, and documents how to implement an IBM High-Performance Computing (HPC) solution on a POWER9 processor-based system by using IBM technical innovations to help solve challenging scientific, technical, and business problems. This book documents the HPC clustering solution with InfiniBand on IBM Power SystemsTM AC922 8335-GTH and 8335-GTX servers with NVIDIA Tesla V100 SXM2 graphics processing units (GPUs) with NVLink, software components, and the IBM SpectrumTM Scale parallel file system. This solution includes recommendations about the components that are used to provide a cohesive clustering environment that includes job scheduling, parallel application tools, scalable file systems, administration tools, and a high-speed interconnect. This book is divided into three parts: Part 1 focuses on the planners of the solution, Part 2 focuses on the administrators, and Part 3 focuses on the developers. This book targets technical professionals (consultants, technical support staff, IT architects, and IT specialists) who are responsible for delivering cost-effective HPC solutions that help uncover insights among clients' data so that they can act to optimize business results, product development, and scientific discoveries.
Often, people use nicotine, caffeine, and some level of alcohol in varying combinations at different times of the day in order to optimize their functioning and feelings of well-being, whether at work, in leisure time, or in a social context. However, until now, studies on the effects of this everyday practice have been diverse, widespread, and insufficiently summarized. Recently developed methods to study the effects in more detail have received little attention, especially among a nonscientific readership. Nicotine, Caffeine and Social Drinking focuses readers' attention on the effects of normal, socially accepted psychoactive substances on cognitive performance and on the brain. Divided into three sections, this book studies each substance individually before examining the effects of their combined usage.
This book provides senior managers, project- and program managers, team coaches and team leaders with thought and management tools for potentiating self-organization and creating collaborative intelligence in teams. Adapted and expanded from the 2018 Dynamic Collaboration: Strengthening Self-Organization and Collaborative Intelligence in Teams, the book aids readers in establishing team structures optimal for shared leadership, based on the longitudinal adult development of contributors, especially as team members. Drawing from theoretical and empirical research on social-emotional and cognitive development since 1975, the authors create a provocative paradigm of forming, managing, evaluating and linking teams into networks. They introduce an empirically validated team typology and workspace analysis of dialogue spaces called ‘We-Spaces’. Featuring real world examples and cases of teams that have become self-organizing, this book is a valuable resource for upper and middle level managers, CEOs, Board of Directors as well as consultants, researchers and academics in human resource management, adult development, team building, leadership and organizational management.
Resurrection in the New Testament is a Festschrift offered to J. Lambrecht on the occasion of his seventy-fifth birthday. Among the many scholarly interests of Professor Lambrecht the theme of the resurrection seemed best suited to honour his academic achievement. The 27 contributions cover many of the books of the New Testament. The first two articles in this volume discuss influences on the New Testament treatment of resurrection from the Greco-Roman (Dieter Zeller) and Jewish (Daniel J. Harrington) backgrounds. H.J. de Jonge considers visionary experiences of the Old Testament as an interpretive clue for understanding New Testament references to appearances. The articles by Martin Rese, Benoit Standaert, Otfried Hofius, and Gergely Juhasz deal with interpretive questions that range through several books of the New Testament and to varying degrees again bring into discussion previously debated issues. From this point, with the exception of the final two, the articles appear in canonical order. Adelbert Denaux and Wim J.C. Weren treat issues in Matthew, John Gillman in Luke-Acts, Maarten J.J. Menken and Thomas Soding in John, John J. Kilgallen and Florence Morgan Gillman in Acts, Veronica Koperski, Margaret E. Thrall, and Johan S. Vos in the Pauline letters in general, Morna D. Hooker and Eduard Lohse in Romans, Joel Delobel and Peter J. Tomson in 1 Corinthians, Frank J. Matera in 2 Corinthians, John Reumann in Philippians, Raymond F. Collins in the Pastoral Epistles, and Jacques Schlosser in 1 Peter. Joseph Verheyden discusses the witness of Mary Magdalene and the Women at the tomb in the extra-canonical Gospel of Peter. Finally, Barbara Baert contributes a discussion on how the Resurrection was portrayed in visual art during the Middle Ages, with striking illustrative examples.
This book helps students, researchers, and practicing engineers to understand the theoretical framework of control and system theory for discrete-time stochastic systems so that they can then apply its principles to their own stochastic control systems and to the solution of control, filtering, and realization problems for such systems. Applications of the theory in the book include the control of ships, shock absorbers, traffic and communications networks, and power systems with fluctuating power flows. The focus of the book is a stochastic control system defined for a spectrum of probability distributions including Bernoulli, finite, Poisson, beta, gamma, and Gaussian distributions. The concepts of observability and controllability of a stochastic control system are defined and characterized. Each output process considered is, with respect to conditions, represented by a stochastic system called a stochastic realization. The existence of a control law is related to stochastic controllability while the existence of a filter system is related to stochastic observability. Stochastic control with partial observations is based on the existence of a stochastic realization of the filtration of the observed process.
This self-contained textbook is an informal introduction to optimization through the use of numerous illustrations and applications. The focus is on analytically solving optimization problems with a finite number of continuous variables. In addition, the authors provide introductions to classical and modern numerical methods of optimization and to dynamic optimization. The book's overarching point is that most problems may be solved by the direct application of the theorems of Fermat, Lagrange, and Weierstrass. The authors show how the intuition for each of the theoretical results can be supported by simple geometric figures. They include numerous applications through the use of varied classical and practical problems. Even experts may find some of these applications truly surprising. A basic mathematical knowledge is sufficient to understand the topics covered in this book. More advanced readers, even experts, will be surprised to see how all main results can be grounded on the Fermat-Lagrange theorem. The book can be used for courses on continuous optimization, from introductory to advanced, for any field for which optimization is relevant.
A well-organized guide to the many techniques and shortcuts that can simplify AutoCAD and make users more productive. The book is organized into Beginning, Intermediate, and Advanced sections, with chapters and subchapters that lead readers to the exact issues they want to address. A comprehensive table of contents and cross-index allow the AutoCAD user to find multiple entries for the same topic. 85 illustrations.
Complete guide to programming professional graphics for your own applications. Introduction to VGA (hardware, software, operating system, display adapters, monitors); demos and example programs in all video modes; Hercules, MDA, CGA, EGA, VGA; DOS command extensions to simplify your programming tasks. Inlcudes two diskettes.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.