5,064 research outputs found
Kondo "underscreening" cloud: spin-spin correlations around a partially screened magnetic impurity
We consider the spatial spin correlations around a partially screened spin-1
magnetic moment in a metal exhibiting the underscreened Kondo effect. We find
that the underscreening of the impurity spin results in spatial spin
correlations that are more pronounced as compared to the fully screened Kondo
effect; their power-law decay is weaker because of characteristic logarithmic
corrections at large distances. The spin correlator also changes sign as a
function of distance to the impurity allowing for ferromagnetic correlations
between conduction electron spin density and the local moment. The numerical
findings are shown to be in agreement with the predictions deriving from an
effective ferromagnetic Kondo Hamiltonian.Comment: 4+ pages, 2 figures, submitted to Phys. Rev.
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
The vulnerability of the Internet has been demonstrated by prominent IP
prefix hijacking events. Major outages such as the China Telecom incident in
2010 stimulate speculations about malicious intentions behind such anomalies.
Surprisingly, almost all discussions in the current literature assume that
hijacking incidents are enabled by the lack of security mechanisms in the
inter-domain routing protocol BGP. In this paper, we discuss an attacker model
that accounts for the hijacking of network ownership information stored in
Regional Internet Registry (RIR) databases. We show that such threats emerge
from abandoned Internet resources (e.g., IP address blocks, AS numbers). When
DNS names expire, attackers gain the opportunity to take resource ownership by
re-registering domain names that are referenced by corresponding RIR database
objects. We argue that this kind of attack is more attractive than conventional
hijacking, since the attacker can act in full anonymity on behalf of a victim.
Despite corresponding incidents have been observed in the past, current
detection techniques are not qualified to deal with these attacks. We show that
they are feasible with very little effort, and analyze the risk potential of
abandoned Internet resources for the European service region: our findings
reveal that currently 73 /24 IP prefixes and 7 ASes are vulnerable to be
stealthily abused. We discuss countermeasures and outline research directions
towards preventive solutions.Comment: Final version for TMA 201
Strong vs. Weak Coupling Duality and Coupling Dependence of the Kondo Temperature in the Two-Channel Kondo Model
We perform numerical renormalization group (NRG) as well as analytical
calculations for the two-channel Kondo model to obtain the dependence of the
Kondo temperature on the dimensionless (bare) spin exchange coupling
over the complete parameter range from to . We show that there
exists a duality between the regimes of small and large coupling. It is unique
for the two-channel model and enables a mapping between the strong and the weak
coupling cases via the identification , implying an
exponential dependence of on and , respectively, in the two
regimes. This agrees quantitatively with our NRG calculations where we extract
over the complete parameter range and obtain a non-monotonous
dependence, strongly peaked at the 2CK fixed point coupling . These
results may be relevant for resolving the long-standing puzzle within the 2CK
interpretation of certain random defect systems, why no broad distribution of
is observed in those systems.Comment: 6 pages, 3 figures; PRB published version, shortened, nomenclature
clarifie
CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP
The Internet routing protocol BGP expresses topological reachability and
policy-based decisions simultaneously in path vectors. A complete view on the
Internet backbone routing is given by the collection of all valid routes, which
is infeasible to obtain due to information hiding of BGP, the lack of
omnipresent collection points, and data complexity. Commonly, graph-based data
models are used to represent the Internet topology from a given set of BGP
routing tables but fall short of explaining policy contexts. As a consequence,
routing anomalies such as route leaks and interception attacks cannot be
explained with graphs.
In this paper, we use formal languages to represent the global routing system
in a rigorous model. Our CAIR framework translates BGP announcements into a
finite route language that allows for the incremental construction of minimal
route automata. CAIR preserves route diversity, is highly efficient, and
well-suited to monitor BGP path changes in real-time. We formally derive
implementable search patterns for route leaks and interception attacks. In
contrast to the state-of-the-art, we can detect these incidents. In practical
experiments, we analyze public BGP data over the last seven years
The Garden of Roses : Waltzes
https://digitalcommons.library.umaine.edu/mmb-ps/2290/thumbnail.jp
The analysis of disease biomarker data using a mixed hidden Markov model (Open Access publication)
A mixed hidden Markov model (HMM) was developed for predicting breeding values of a biomarker (here, somatic cell score) and the individual probabilities of health and disease (here, mastitis) based upon the measurements of the biomarker. At a first level, the unobserved disease process (Markov model) was introduced and at a second level, the measurement process was modeled, making the link between the unobserved disease states and the observed biomarker values. This hierarchical formulation allows joint estimation of the parameters of both processes. The flexibility of this approach is illustrated on the simulated data. Firstly, lactation curves for the biomarker were generated based upon published parameters (mean, variance, and probabilities of infection) for cows with known clinical conditions (health or mastitis due to Escherichia coli or Staphylococcus aureus). Next, estimation of the parameters was performed via Gibbs sampling, assuming the health status was unknown. Results from the simulations and mathematics show that the mixed HMM is appropriate to estimate the quantities of interest although the accuracy of the estimates is moderate when the prevalence of the disease is low. The paper ends with some indications for further developments of the methodology
Genetic management of infectious diseases: a heterogeneous epidemio-genetic model illustrated with S. aureus mastitis
Given that individuals are genetically heterogeneous in their degree of resistance to infection, a model is proposed to formulate appropriate choices that will limit the spread of an infectious disease. The model is illustrated with data on S. aureus mastitis and is based on parameters characterizing the spread of the disease (contact rate, probability of infection after contact, and rate of recovery after infection), the demography (replacement and culling rates) and the genetic composition (degree of relationship and heritability of the disease trait) of the animal population. To decrease infection pressure, it is possible to apply non-genetic procedures that increase the culling (e.g., culling of chronically infected cows) and recovery (e.g., antibiotic therapy) rates of infected cows. But the contribution of the paper is to show that genetic management of infectious disease is also theoretically possible as a control measure complementary to non-genetic actions. Indeed, the probability for an uninfected individual to become infected after contact with an infected one is partially related to their degree of kinship: the more closely they are related, the more likely they are to share identical genes like those associated to the non-resistance to infection. Different prospective genetic management procedures are proposed to decrease the contact rate between infected and uninfected relatives and keep the number of secondary cases generated by one infected animal below 1
The Whirl - Wind : Galop de Concert
https://digitalcommons.library.umaine.edu/mmb-ps/3044/thumbnail.jp
The Garden of Roses
Roses on large trees with smaller trees between each large treehttps://scholarsjunction.msstate.edu/cht-sheet-music/11433/thumbnail.jp
- ā¦