16,413 research outputs found
A second Higgs from the Higgs portal
In the Higgs portal framework, the Higgs field generally mixes with the
Standard Model singlet leading to the existence of two states, one of which is
identified with the 125 GeV scalar observed at the LHC. In this work, we
analyse direct and indirect constraints on the second mass eigenstate and the
corresponding mixing angle. The existence of the additional scalar can be
beneficial as it can stabilise the otherwise-metastable electroweak vacuum. We
find parameter regions where all of the bounds, including the stability
constraints, are satisfied. We also study prospects for observing the decay of
the heavier state into a pair of the 125 GeV Higgs-like scalars.Comment: 16 pages, updated figures 3 and 4 with new limits from Higgs-searches
at the LHC, minor text adjustments, references adde
Spatial motion of the Magellanic Clouds. Tidal models ruled out?
Recently, Kallivayalil et al. derived new values of the proper motion for the
Large and Small Magellanic Clouds (LMC and SMC, respectively). The spatial
velocities of both Clouds are unexpectedly higher than their previous values
resulting from agreement between the available theoretical models of the
Magellanic System and the observations of neutral hydrogen (HI) associated with
the LMC and the SMC. Such proper motion estimates are likely to be at odds with
the scenarios for creation of the large-scale structures in the Magellanic
System suggested so far. We investigated this hypothesis for the pure tidal
models, as they were the first ones devised to explain the evolution of the
Magellanic System, and the tidal stripping is intrinsically involved in every
model assuming the gravitational interaction. The parameter space for the Milky
Way (MW)-LMC-SMC interaction was analyzed by a robust search algorithm (genetic
algorithm) combined with a fast restricted N-body model of the interaction. Our
method extended the known variety of evolutionary scenarios satisfying the
observed kinematics and morphology of the Magellanic large-scale structures.
Nevertheless, assuming the tidal interaction, no satisfactory reproduction of
the HI data available for the Magellanic Clouds was achieved with the new
proper motions. We conclude that for the proper motion data by Kallivayalil et
al., within their 1-sigma errors, the dynamical evolution of the Magellanic
System with the currently accepted total mass of the MW cannot be explained in
the framework of pure tidal models. The optimal value for the western component
of the LMC proper motion was found to be pm_w(LMC) > -1.3 mas/yr in case of
tidal models. It corresponds to the reduction of the Kallivayalil et al. value
for pm_w(LMC) by approx. 40% in its magnitude.Comment: ApJ accepted, 17 pages, 4 figure
Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation
Motivated by growing concerns over ensuring privacy on social networks, we
develop new algorithms and impossibility results for fitting complex
statistical models to network data subject to rigorous privacy guarantees. We
consider the so-called node-differentially private algorithms, which compute
information about a graph or network while provably revealing almost no
information about the presence or absence of a particular node in the graph.
We provide new algorithms for node-differentially private estimation for a
popular and expressive family of network models: stochastic block models and
their generalization, graphons. Our algorithms improve on prior work, reducing
their error quadratically and matching, in many regimes, the optimal nonprivate
algorithm. We also show that for the simplest random graph models ( and
), node-private algorithms can be qualitatively more accurate than for
more complex models---converging at a rate of
instead of . This result uses a new extension lemma
for differentially private algorithms that we hope will be broadly useful
Social Bots: Human-Like by Means of Human Control?
Social bots are currently regarded an influential but also somewhat
mysterious factor in public discourse and opinion making. They are considered
to be capable of massively distributing propaganda in social and online media
and their application is even suspected to be partly responsible for recent
election results. Astonishingly, the term `Social Bot' is not well defined and
different scientific disciplines use divergent definitions. This work starts
with a balanced definition attempt, before providing an overview of how social
bots actually work (taking the example of Twitter) and what their current
technical limitations are. Despite recent research progress in Deep Learning
and Big Data, there are many activities bots cannot handle well. We then
discuss how bot capabilities can be extended and controlled by integrating
humans into the process and reason that this is currently the most promising
way to go in order to realize effective interactions with other humans.Comment: 36 pages, 13 figure
Leftover Hashing Against Quantum Side Information
The Leftover Hash Lemma states that the output of a two-universal hash
function applied to an input with sufficiently high entropy is almost uniformly
random. In its standard formulation, the lemma refers to a notion of randomness
that is (usually implicitly) defined with respect to classical side
information. Here, we prove a (strictly) more general version of the Leftover
Hash Lemma that is valid even if side information is represented by the state
of a quantum system. Furthermore, our result applies to arbitrary delta-almost
two-universal families of hash functions. The generalized Leftover Hash Lemma
has applications in cryptography, e.g., for key agreement in the presence of an
adversary who is not restricted to classical information processing
- …
