502,163 research outputs found
Classification of constraints using chain by chain method
We introduce "chain by chain" method for constructing the constraint
structure of a system possessing both first and second class constraints. We
show that the whole constraints can be classified into completely irreducible
first or second class chains. We found appropriate redefinition of second class
constraints to obtain a symplectic algebra among them.Comment: 23 pages, to appear in Int. J. Mod. Phys.
Collective Hamiltonians with Kac-Moody Algebraic Conditions
We describe the general framework for constructing collective--theory
Hamiltonians whose hermicity requirements imply a Kac--Moody algebra of
constraints on the associated Jacobian. We give explicit examples for the
algebras and . The reduction to --constraints, relevant
to -matrix models, is described for the Jacobians.Comment: Additional results and references; Phyzzte
Rational vs Polynomial Character of W-Algebras
The constraints proposed recently by Bershadsky to produce algebras
are a mixture of first and second class constraints and are degenerate. We show
that they admit a first-class subsystem from which they can be recovered by
gauge-fixing, and that the non-degenerate constraints can be handled by
previous methods. The degenerate constraints present a new situation in which
the natural primary field basis for the gauge-invariants is rational rather
than polynomial. We give an algorithm for constructing the rational basis and
converting the base elements to polynomials.Comment: 18 page
Eliminating Network Protocol Vulnerabilities Through Abstraction and Systems Language Design
Incorrect implementations of network protocol message specifications affect
the stability, security, and cost of network system development. Most
implementation defects fall into one of three categories of well defined
message constraints. However, the general process of constructing network
protocol stacks and systems does not capture these categorical con- straints.
We introduce a systems programming language with new abstractions that capture
these constraints. Safe and efficient implementations of standard message
handling operations are synthesized by our compiler, and whole-program analysis
is used to ensure constraints are never violated. We present language examples
using the OpenFlow protocol
Controller synthesis with very simplified linear constraints in PN model
This paper addresses the problem of forbidden states for safe Petri net
modeling discrete event systems. We present an efficient method to construct a
controller. A set of linear constraints allow forbidding the reachability of
specific states. The number of these so-called forbidden states and
consequently the number of constraints are large and lead to a large number of
control places. A systematic method for constructing very simplified controller
is offered. By using a method based on Petri nets partial invariants, maximal
permissive controllers are determined.Comment: Dependable Control of discrete Systems, Bari : Italie (2009
Constraint Propagation of -adjusted Formulation - Another Recipe for Robust ADM Evolution System
With a purpose of constructing a robust evolution system against numerical
instability for integrating the Einstein equations, we propose a new
formulation by adjusting the ADM evolution equations with constraints. We apply
an adjusting method proposed by Fiske (2004) which uses the norm of the
constraints, C2. One of the advantages of this method is that the effective
signature of adjusted terms (Lagrange multipliers) for constraint-damping
evolution is pre-determined. We demonstrate this fact by showing the
eigenvalues of constraint propagation equations. We also perform numerical
tests of this adjusted evolution system using polarized Gowdy-wave propagation,
which show robust evolutions against the violation of the constraints than that
of the standard ADM formulation.Comment: 11 pages, 5 figures. To be published in Phys. Rev.
- …