منابع مشابه
Itzhak Bars
The physics that is traditionally formulated in one–time-physics (1T-physics) can also be formulated in two-time-physics (2T-physics). The physical phenomena in 1T or 2T physics are not different, but the spacetime formalism used to describe them is. The 2T description involves two extra dimensions (one time and one space), is more symmetric, and makes manifest many hidden features of 1T-physic...
متن کاملItzhak Gilboa , Andrew Postlewaite
People often consume non-durable goods in a way that seems inconsistent with preferences for smoothing consumption over time. We suggest that such patterns of consumption can be better explained if one takes into account the future utility flows generated by memorable consumption goods—goods, such as a honeymoon or a vacation, whose utility flow outlives their physical consumption. We consider ...
متن کاملAlfred Goldberg
system, where non-sexualised images, e.g. from clothes ads or even from nudist beaches get the green light, erotic posing counts as amber, and material focusing on genitals or actual acts of child abuse gets the red light. “We train the patient to move only in the green area,” Ahlers told the paper. “Amber means: Caution! Potential danger for children and for myself! Risky behaviour on the verg...
متن کاملLisa Goldberg colloquium talk
The importance of diversification and risk management was recognized by a few visionaries in the early days of investing. Only in the 1950's, however, did these concepts become central. Since then, increasingly sophisticated mathematical and statistical tools have been brought to bear on the problem of estimating the aggregate risk of a portfolio. This risk depends crucially on the covariances ...
متن کاملSharon Goldberg Research Statement
As a security researcher, my goal is to develop practical solutions that make computer networks more reliable, predictable, and resilient to attack. To address the grand challenges in security research, I believe that we need to go beyond traditional disciplinary barriers. For instance, cryptography is crucial to deal with hacked devices and malicious parties, but cannot deal with the fact that...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Critique d’art
سال: 2014
ISSN: 1246-8258,2265-9404
DOI: 10.4000/critiquedart.15258