16,413 research outputs found

    A second Higgs from the Higgs portal

    Get PDF
    In the Higgs portal framework, the Higgs field generally mixes with the Standard Model singlet leading to the existence of two states, one of which is identified with the 125 GeV scalar observed at the LHC. In this work, we analyse direct and indirect constraints on the second mass eigenstate and the corresponding mixing angle. The existence of the additional scalar can be beneficial as it can stabilise the otherwise-metastable electroweak vacuum. We find parameter regions where all of the bounds, including the stability constraints, are satisfied. We also study prospects for observing the decay of the heavier state into a pair of the 125 GeV Higgs-like scalars.Comment: 16 pages, updated figures 3 and 4 with new limits from Higgs-searches at the LHC, minor text adjustments, references adde

    Spatial motion of the Magellanic Clouds. Tidal models ruled out?

    Full text link
    Recently, Kallivayalil et al. derived new values of the proper motion for the Large and Small Magellanic Clouds (LMC and SMC, respectively). The spatial velocities of both Clouds are unexpectedly higher than their previous values resulting from agreement between the available theoretical models of the Magellanic System and the observations of neutral hydrogen (HI) associated with the LMC and the SMC. Such proper motion estimates are likely to be at odds with the scenarios for creation of the large-scale structures in the Magellanic System suggested so far. We investigated this hypothesis for the pure tidal models, as they were the first ones devised to explain the evolution of the Magellanic System, and the tidal stripping is intrinsically involved in every model assuming the gravitational interaction. The parameter space for the Milky Way (MW)-LMC-SMC interaction was analyzed by a robust search algorithm (genetic algorithm) combined with a fast restricted N-body model of the interaction. Our method extended the known variety of evolutionary scenarios satisfying the observed kinematics and morphology of the Magellanic large-scale structures. Nevertheless, assuming the tidal interaction, no satisfactory reproduction of the HI data available for the Magellanic Clouds was achieved with the new proper motions. We conclude that for the proper motion data by Kallivayalil et al., within their 1-sigma errors, the dynamical evolution of the Magellanic System with the currently accepted total mass of the MW cannot be explained in the framework of pure tidal models. The optimal value for the western component of the LMC proper motion was found to be pm_w(LMC) > -1.3 mas/yr in case of tidal models. It corresponds to the reduction of the Kallivayalil et al. value for pm_w(LMC) by approx. 40% in its magnitude.Comment: ApJ accepted, 17 pages, 4 figure

    Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation

    Full text link
    Motivated by growing concerns over ensuring privacy on social networks, we develop new algorithms and impossibility results for fitting complex statistical models to network data subject to rigorous privacy guarantees. We consider the so-called node-differentially private algorithms, which compute information about a graph or network while provably revealing almost no information about the presence or absence of a particular node in the graph. We provide new algorithms for node-differentially private estimation for a popular and expressive family of network models: stochastic block models and their generalization, graphons. Our algorithms improve on prior work, reducing their error quadratically and matching, in many regimes, the optimal nonprivate algorithm. We also show that for the simplest random graph models (G(n,p)G(n,p) and G(n,m)G(n,m)), node-private algorithms can be qualitatively more accurate than for more complex models---converging at a rate of 1ϵ2n3\frac{1}{\epsilon^2 n^{3}} instead of 1ϵ2n2\frac{1}{\epsilon^2 n^2}. This result uses a new extension lemma for differentially private algorithms that we hope will be broadly useful

    Social Bots: Human-Like by Means of Human Control?

    Get PDF
    Social bots are currently regarded an influential but also somewhat mysterious factor in public discourse and opinion making. They are considered to be capable of massively distributing propaganda in social and online media and their application is even suspected to be partly responsible for recent election results. Astonishingly, the term `Social Bot' is not well defined and different scientific disciplines use divergent definitions. This work starts with a balanced definition attempt, before providing an overview of how social bots actually work (taking the example of Twitter) and what their current technical limitations are. Despite recent research progress in Deep Learning and Big Data, there are many activities bots cannot handle well. We then discuss how bot capabilities can be extended and controlled by integrating humans into the process and reason that this is currently the most promising way to go in order to realize effective interactions with other humans.Comment: 36 pages, 13 figure

    Leftover Hashing Against Quantum Side Information

    Full text link
    The Leftover Hash Lemma states that the output of a two-universal hash function applied to an input with sufficiently high entropy is almost uniformly random. In its standard formulation, the lemma refers to a notion of randomness that is (usually implicitly) defined with respect to classical side information. Here, we prove a (strictly) more general version of the Leftover Hash Lemma that is valid even if side information is represented by the state of a quantum system. Furthermore, our result applies to arbitrary delta-almost two-universal families of hash functions. The generalized Leftover Hash Lemma has applications in cryptography, e.g., for key agreement in the presence of an adversary who is not restricted to classical information processing
    corecore