16,066 research outputs found
Quantum density anomaly in optically trapped ultracold gases
We show that the Bose-Hubbard Model exhibits an increase in density with
temperature at fixed pressure in the regular fluid regime and in the superfluid
phase. The anomaly at the Bose-Einstein condensate is the first density anomaly
observed in a quantum state. We propose that the mechanism underlying both the
normal phase and the superfluid phase anomalies is related to zero point
entropies and ground state phase transitions. A connection with the typical
experimental scales and setups is also addressed. This key finding opens a new
pathway for theoretical and experimental studies of water-like anomalies in the
area of ultracold quantum gases
Local heuristics and the emergence of spanning subgraphs in complex networks
We study the use of local heuristics to determine spanning subgraphs for use
in the dissemination of information in complex networks. We introduce two
different heuristics and analyze their behavior in giving rise to spanning
subgraphs that perform well in terms of allowing every node of the network to
be reached, of requiring relatively few messages and small node bandwidth for
information dissemination, and also of stretching paths with respect to the
underlying network only modestly. We contribute a detailed mathematical
analysis of one of the heuristics and provide extensive simulation results on
random graphs for both of them. These results indicate that, within certain
limits, spanning subgraphs are indeed expected to emerge that perform well in
respect to all requirements. We also discuss the spanning subgraphs' inherent
resilience to failures and adaptability to topological changes
Probabilistic heuristics for disseminating information in networks
We study the problem of disseminating a piece of information through all the
nodes of a network, given that it is known originally only to a single node. In
the absence of any structural knowledge on the network other than the nodes'
neighborhoods, this problem is traditionally solved by flooding all the
network's edges. We analyze a recently introduced probabilistic algorithm for
flooding and give an alternative probabilistic heuristic that can lead to some
cost-effective improvements, like better trade-offs between the message and
time complexities involved. We analyze the two algorithms both mathematically
and by means of simulations, always within a random-graph framework and
considering relevant node-degree distributions
Phase Diagram and Thermodynamic and Dynamic Anomalies in a Pure Repulsive Model
Using Monte Carlo simulations a lattice gas model with only repulsive
interactions was checked for the presence of anomalies. We show that this
system exhibits the density (temperature of maximum density - TMD) and
diffusion anomalies as present in liquid water. These anomalous behavior exist
in the region of the chemical potential vs temperature phase diagram where two
structured phases are present. A fragile-to-strong dynamic transition is also
observed in the vicinity of the TMD line
The solar siblings in the Gaia era
We perform realistic simulations of the Sun's birth cluster in order to
predict the current distribution of solar siblings in the Galaxy. We study the
possibility of finding the solar siblings in the Gaia catalogue by using only
positional and kinematic information. We find that the number of solar siblings
predicted to be observed by Gaia will be around 100 in the most optimistic
case, and that a phase space only search in the Gaia catalogue will be
extremely difficult. It is therefore mandatory to combine the chemical tagging
technique with phase space selection criteria in order to have any hope of
finding the solar siblings.Comment: To be published in the proceedings of the GREAT-ITN conference "The
Milky Way Unravelled by Gaia: GREAT Science from the Gaia Data Releases", 1-5
December 2014, University of Barcelona, Spain, EAS Publications Series, eds
Nicholas Walton, Francesca Figueras, and Caroline Soubira
Two novel evolutionary formulations of the graph coloring problem
We introduce two novel evolutionary formulations of the problem of coloring
the nodes of a graph. The first formulation is based on the relationship that
exists between a graph's chromatic number and its acyclic orientations. It
views such orientations as individuals and evolves them with the aid of
evolutionary operators that are very heavily based on the structure of the
graph and its acyclic orientations. The second formulation, unlike the first
one, does not tackle one graph at a time, but rather aims at evolving a
`program' to color all graphs belonging to a class whose members all have the
same number of nodes and other common attributes. The heuristics that result
from these formulations have been tested on some of the Second DIMACS
Implementation Challenge benchmark graphs, and have been found to be
competitive when compared to the several other heuristics that have also been
tested on those graphs.Comment: To appear in Journal of Combinatorial Optimizatio
Influence of disordered porous media in the anomalous properties of a simple water model
The thermodynamic, dynamic and structural behavior of a water-like system
confined in a matrix is analyzed for increasing confining geometries. The
liquid is modeled by a two dimensional associating lattice gas model that
exhibits density and diffusion anomalies, in similarity to the anomalies
present in liquid water. The matrix is a triangular lattice in which fixed
obstacles impose restrictions to the occupation of the particles. We show that
obstacules shortens all lines, including the phase coexistence, the critical
and the anomalous lines. The inclusion of a very dense matrix not only suppress
the anomalies but also the liquid-liquid critical point
Modeling the input history of programs for improved instruction-memory performance
When a program is loaded into memory for execution, the relative position of
its basic blocks is crucial, since loading basic blocks that are unlikely to be
executed first places them high in the instruction-memory hierarchy only to be
dislodged as the execution goes on. In this paper we study the use of Bayesian
networks as models of the input history of a program. The main point is the
creation of a probabilistic model that persists as the program is run on
different inputs and at each new input refines its own parameters in order to
reflect the program's input history more accurately. As the model is thus
tuned, it causes basic blocks to be reordered so that, upon arrival of the next
input for execution, loading the basic blocks into memory automatically takes
into account the input history of the program. We report on extensive
experiments, whose results demonstrate the efficacy of the overall approach in
progressively lowering the execution times of a program on identical inputs
placed randomly in a sequence of varied inputs. We provide results on selected
SPEC CINT2000 programs and also evaluate our approach as compared to the gcc
level-3 optimization and to Pettis-Hansen reordering
Fast and secure key distribution using mesoscopic coherent states of light
This work shows how two parties A and B can securely share sequences of
random bits at optical speeds. A and B possess true-random physical sources and
exchange random bits by using a random sequence received to cipher the
following one to be sent. A starting shared secret key is used and the method
can be described as an unlimited one-time-pad extender. It is demonstrated that
the minimum probability of error in signal determination by the eavesdropper
can be set arbitrarily close to the pure guessing level. Being based on the
-ry encryption protocol this method also allows for optical amplification
without security degradation, offering practical advantages over the BB84
protocol for key distribution.Comment: 11 pages and 4 figures. This version updates the one published in PRA
68, 052307 (2003). Minor changes were made in the text and one section on
Mutual Information was adde
- …