1,396 research outputs found
Structure properties of Th and Fm fission fragments: mean field analysis with the Gogny force
The constrained Hartree-Fock-Bogoliubov method is used with the Gogny
interaction D1S to calculate potential energy surfaces of fissioning nuclei
Th and Fm up to very large deformations. The
constraints employed are the mass quadrupole and octupole moments. In this
subspace of collective coordinates, many scission configurations are identified
ranging from symmetric to highly asymmetric fragmentations. Corresponding
fragment properties at scission are derived yielding fragment deformations,
deformation energies, energy partitioning, neutron binding energies at
scission, neutron multiplicities, charge polarization and total fragment
kinetic energies.Comment: 15 pages, 23 figures, accepted for publication in Phys. Rev. C (2007
Constrained Cost-Coupled Stochastic Games with Independent State Processes
We consider a non-cooperative constrained stochastic games with N players
with the following special structure. With each player there is an associated
controlled Markov chain. The transition probabilities of the i-th Markov chain
depend only on the state and actions of controller i. The information structure
that we consider is such that each player knows the state of its own MDP and
its own actions. It does not know the states of, and the actions taken by other
players. Finally, each player wishes to minimize a time-average cost function,
and has constraints over other time-avrage cost functions. Both the cost that
is minimized as well as those defining the constraints depend on the state and
actions of all players. We study in this paper the existence of a Nash
equilirium. Examples in power control in wireless communications are given.Comment: 7 pages, submitted in september 2006 to Operations Research Letter
Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild
Risk-based authentication (RBA) is an adaptive security measure to strengthen
password-based authentication. RBA monitors additional implicit features during
password entry such as device or geolocation information, and requests
additional authentication factors if a certain risk level is detected. RBA is
recommended by the NIST digital identity guidelines, is used by several large
online services, and offers protection against security risks such as password
database leaks, credential stuffing, insecure passwords and large-scale
guessing attacks. Despite its relevance, the procedures used by
RBA-instrumented online services are currently not disclosed. Consequently,
there is little scientific research about RBA, slowing down progress and deeper
understanding, making it harder for end users to understand the security
provided by the services they use and trust, and hindering the widespread
adoption of RBA.
In this paper, with a series of studies on eight popular online services, we
(i) analyze which features and combinations/classifiers are used and are useful
in practical instances, (ii) develop a framework and a methodology to measure
RBA in the wild, and (iii) survey and discuss the differences in the user
interface for RBA. Following this, our work provides a first deeper
understanding of practical RBA deployments and helps fostering further research
in this direction.Comment: 14 pages, 7 table
On-chip quantum interference between silicon photon-pair sources
Large-scale integrated quantum photonic technologies1, 2 will require on-chip integration of identical photon sources with reconfigurable waveguide circuits. Relatively complex quantum circuits have been demonstrated already1, 2, 3, 4, 5, 6, 7, but few studies acknowledge the pressing need to integrate photon sources and waveguide circuits together on-chip8, 9. A key step towards such large-scale quantum technologies is the integration of just two individual photon sources within a waveguide circuit, and the demonstration of high-visibility quantum interference between them. Here, we report a silicon-on-insulator device that combines two four-wave mixing sources in an interferometer with a reconfigurable phase shifter. We configured the device to create and manipulate two-colour (non-degenerate) or same-colour (degenerate) path-entangled or path-unentangled photon pairs. We observed up to 100.0 ± 0.4% visibility quantum interference on-chip, and up to 95 ± 4% off-chip. Our device removes the need for external photon sources, provides a path to increasing the complexity of quantum photonic circuits and is a first step towards fully integrated quantum technologies
Fast path and polarisation manipulation of telecom wavelength single photons in lithium niobate waveguide devices
We demonstrate fast polarisation and path control of photons at 1550 nm in
lithium niobate waveguide devices using the electro-optic effect. We show
heralded single photon state engineering, quantum interference, fast state
preparation of two entangled photons and feedback control of quantum
interference. These results point the way to a single platform that will enable
the integration of nonlinear single photon sources and fast reconfigurable
circuits for future photonic quantum information science and technology.Comment: 6 page
CQG algebras: a direct algebraic approach to compact quantum groups
The purely algebraic notion of CQG algebra (algebra of functions on a compact
quantum group) is defined. In a straightforward algebraic manner, the
Peter-Weyl theorem for CQG algebras and the existence of a unique positive
definite Haar functional on any CQG algebra are established. It is shown that a
CQG algebra can be naturally completed to a -algebra. The relations
between our approach and several other approaches to compact quantum groups are
discussed.Comment: 14 pp., Plain TeX, accepted by Lett. Math. Phy
CacheZoom: How SGX Amplifies The Power of Cache Attacks
In modern computing environments, hardware resources are commonly shared, and
parallel computation is widely used. Parallel tasks can cause privacy and
security problems if proper isolation is not enforced. Intel proposed SGX to
create a trusted execution environment within the processor. SGX relies on the
hardware, and claims runtime protection even if the OS and other software
components are malicious. However, SGX disregards side-channel attacks. We
introduce a powerful cache side-channel attack that provides system adversaries
a high resolution channel. Our attack tool named CacheZoom is able to virtually
track all memory accesses of SGX enclaves with high spatial and temporal
precision. As proof of concept, we demonstrate AES key recovery attacks on
commonly used implementations including those that were believed to be
resistant in previous scenarios. Our results show that SGX cannot protect
critical data sensitive computations, and efficient AES key recovery is
possible in a practical environment. In contrast to previous works which
require hundreds of measurements, this is the first cache side-channel attack
on a real system that can recover AES keys with a minimal number of
measurements. We can successfully recover AES keys from T-Table based
implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems
(CHES '17
X-Ray Diffuse Scattering Study on Ionic-Pair Displacement Correlations in Relaxor Lead Magnesium Niobate
Ionic-pair equal-time displacement correlations in relaxor lead magnesium
niobate, , have been investigated at room
temperature in terms of an x-ray diffuse scattering technique. Functions of the
distinct correlations have been determined quantitatively. The results show the
significantly strong rhombohedral-polar correlations regarding Pb-O, Mg/Nb-O,
and O-O' pairs. Their spatial distribution forms an ellipse or a sphere with
the radii of 30-80. This observation of local structure in the system
proves precursory presence of the polar microregions in the paraelectric state
which leads to the dielectric dispersion.Comment: 11 pages, 3 figure
Theory of Mind and Empathy in Preclinical and Clinical Huntington's Disease
We investigated cognitive and affective Theory of Mind (ToM) and empathy in patients with premanifest and manifest Huntington\u27s disease (HD). The relation between ToM performance and executive skills was also examined.
16 preclinical and 23 clinical HD patients, and 39 healthy subjects divided in 2 control groups were given a French adaptation of the Yoni test (Shamay-Tsoory and Aharon-Peretz, 2007) that examines first and second-order cognitive and affective ToM processing in separate conditions with a physical control condition. Participants were also given questionnaires of empathy and cognitive tests which mainly assessed executive functions (inhibition and mental flexibility).
Clinical HD patients made significantly more errors than their controls in the first-and second-order cognitive and affective ToM conditions of the Yoni task, but exhibited no empathy deficits. However, there was no evidence that ToM impairment was related to cognitive deficits in these patients. Preclinical HD patients were unimpaired in ToM tasks and empathy measures compared to their controls.
Our results are consistent with the idea that impaired affective and cognitive mentalising emerges with the clinical manifestation of HD, but is not necessarily part of the preclinical stage. Furthermore, these impairments appear independent of executive dysfunction and empathy
- …