502,163 research outputs found

    Classification of constraints using chain by chain method

    Get PDF
    We introduce "chain by chain" method for constructing the constraint structure of a system possessing both first and second class constraints. We show that the whole constraints can be classified into completely irreducible first or second class chains. We found appropriate redefinition of second class constraints to obtain a symplectic algebra among them.Comment: 23 pages, to appear in Int. J. Mod. Phys.

    Collective Hamiltonians with Kac-Moody Algebraic Conditions

    Get PDF
    We describe the general framework for constructing collective--theory Hamiltonians whose hermicity requirements imply a Kac--Moody algebra of constraints on the associated Jacobian. We give explicit examples for the algebras sl(2)ksl(2)_k and sl(3)ksl(3)_k. The reduction to WnW_n--constraints, relevant to nn-matrix models, is described for the Jacobians.Comment: Additional results and references; Phyzzte

    Rational vs Polynomial Character of Wnl_n^l-Algebras

    Full text link
    The constraints proposed recently by Bershadsky to produce WnlW^l_n algebras are a mixture of first and second class constraints and are degenerate. We show that they admit a first-class subsystem from which they can be recovered by gauge-fixing, and that the non-degenerate constraints can be handled by previous methods. The degenerate constraints present a new situation in which the natural primary field basis for the gauge-invariants is rational rather than polynomial. We give an algorithm for constructing the rational basis and converting the base elements to polynomials.Comment: 18 page

    Eliminating Network Protocol Vulnerabilities Through Abstraction and Systems Language Design

    Full text link
    Incorrect implementations of network protocol message specifications affect the stability, security, and cost of network system development. Most implementation defects fall into one of three categories of well defined message constraints. However, the general process of constructing network protocol stacks and systems does not capture these categorical con- straints. We introduce a systems programming language with new abstractions that capture these constraints. Safe and efficient implementations of standard message handling operations are synthesized by our compiler, and whole-program analysis is used to ensure constraints are never violated. We present language examples using the OpenFlow protocol

    Controller synthesis with very simplified linear constraints in PN model

    Full text link
    This paper addresses the problem of forbidden states for safe Petri net modeling discrete event systems. We present an efficient method to construct a controller. A set of linear constraints allow forbidding the reachability of specific states. The number of these so-called forbidden states and consequently the number of constraints are large and lead to a large number of control places. A systematic method for constructing very simplified controller is offered. By using a method based on Petri nets partial invariants, maximal permissive controllers are determined.Comment: Dependable Control of discrete Systems, Bari : Italie (2009

    Constraint Propagation of C2C^2-adjusted Formulation - Another Recipe for Robust ADM Evolution System

    Full text link
    With a purpose of constructing a robust evolution system against numerical instability for integrating the Einstein equations, we propose a new formulation by adjusting the ADM evolution equations with constraints. We apply an adjusting method proposed by Fiske (2004) which uses the norm of the constraints, C2. One of the advantages of this method is that the effective signature of adjusted terms (Lagrange multipliers) for constraint-damping evolution is pre-determined. We demonstrate this fact by showing the eigenvalues of constraint propagation equations. We also perform numerical tests of this adjusted evolution system using polarized Gowdy-wave propagation, which show robust evolutions against the violation of the constraints than that of the standard ADM formulation.Comment: 11 pages, 5 figures. To be published in Phys. Rev.
    • …
    corecore