1,242 research outputs found

    Black hole collisions: how far can perturbation theory go?

    Get PDF
    The computation of gravitational radiation generated by the coalescence of inspiralling binary black holes is nowdays one of the main goals of numerical relativity. Perturbation theory has emerged as an ubiquitous tool for all those dynamical evolutions where the two black holes start close enough to each other, to be treated as single distorted black hole (close limit approximation), providing at the same time useful benchmarks for full numerical simulations. Here we summarize the most recent developments to study evolutions of perturbations around rotating (Kerr) black holes. The final aim is to generalize the close limit approximation to the most general case of two rotating black holes in orbit around each other, and thus provide reliable templates for the gravitational waveforms in this regime. For this reason it has become very important to know if these predictions can actually be trusted to larger separation parameters (even in the region where the holes have distinct event horizons). The only way to extend the range of validity of the linear approximation is to develop the theory of second order perturbations around a Kerr hole, by generalizing the Teukolsky formalism.Comment: 6 pages, Latex, uses moriond.sty, proceedings of the talk given at the Moriond 99' euroconferenc

    Information Spreading on Almost Torus Networks

    Get PDF
    Epidemic modeling has been extensively used in the last years in the field of telecommunications and computer networks. We consider the popular Susceptible-Infected-Susceptible spreading model as the metric for information spreading. In this work, we analyze information spreading on a particular class of networks denoted almost torus networks and over the lattice which can be considered as the limit when the torus length goes to infinity. Almost torus networks consist on the torus network topology where some nodes or edges have been removed. We find explicit expressions for the characteristic polynomial of these graphs and tight lower bounds for its computation. These expressions allow us to estimate their spectral radius and thus how the information spreads on these networks

    New Algebraic Formulation of Density Functional Calculation

    Full text link
    This article addresses a fundamental problem faced by the ab initio community: the lack of an effective formalism for the rapid exploration and exchange of new methods. To rectify this, we introduce a novel, basis-set independent, matrix-based formulation of generalized density functional theories which reduces the development, implementation, and dissemination of new ab initio techniques to the derivation and transcription of a few lines of algebra. This new framework enables us to concisely demystify the inner workings of fully functional, highly efficient modern ab initio codes and to give complete instructions for the construction of such for calculations employing arbitrary basis sets. Within this framework, we also discuss in full detail a variety of leading-edge ab initio techniques, minimization algorithms, and highly efficient computational kernels for use with scalar as well as shared and distributed-memory supercomputer architectures

    The Evolution of Quantum Field Theory, From QED to Grand Unification

    Full text link
    In the early 1970s, after a slow start, and lots of hurdles, Quantum Field Theory emerged as the superior doctrine for understanding the interactions between relativistic sub-atomic particles. After the conditions for a relativistic field theoretical model to be renormalizable were established, there were two other developments that quickly accelerated acceptance of this approach: first the Brout-Englert-Higgs mechanism, and then asymptotic freedom. Together, these gave us a complete understanding of the perturbative sector of the theory, enough to give us a detailed picture of what is now usually called the Standard Model. Crucial for this understanding were the strong indications and encouragements provided by numerous experimental findings. Subsequently, non-perturbative features of the quantum field theories were addressed, and the first proposals for completely unified quantum field theories were launched. Since the use of continuous symmetries of all sorts, together with other topics of advanced mathematics, were recognised to be of crucial importance, many new predictions were pointed out, such as the Higgs particle, supersymmetry and baryon number violation. There are still many challenges ahead.Comment: 25 pages in total. A contribution to: The Standard Theory up to the Higgs discovery - 60 years of CERN - L. Maiani and G. Rolandi, ed

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Numerical Relativity: A review

    Full text link
    Computer simulations are enabling researchers to investigate systems which are extremely difficult to handle analytically. In the particular case of General Relativity, numerical models have proved extremely valuable for investigations of strong field scenarios and been crucial to reveal unexpected phenomena. Considerable efforts are being spent to simulate astrophysically relevant simulations, understand different aspects of the theory and even provide insights in the search for a quantum theory of gravity. In the present article I review the present status of the field of Numerical Relativity, describe the techniques most commonly used and discuss open problems and (some) future prospects.Comment: 2 References added; 1 corrected. 67 pages. To appear in Classical and Quantum Gravity. (uses iopart.cls
    • …
    corecore