5,064 research outputs found

    Kondo "underscreening" cloud: spin-spin correlations around a partially screened magnetic impurity

    Full text link
    We consider the spatial spin correlations around a partially screened spin-1 magnetic moment in a metal exhibiting the underscreened Kondo effect. We find that the underscreening of the impurity spin results in spatial spin correlations that are more pronounced as compared to the fully screened Kondo effect; their power-law decay is weaker because of characteristic logarithmic corrections at large distances. The spin correlator also changes sign as a function of distance to the impurity allowing for ferromagnetic correlations between conduction electron spin density and the local moment. The numerical findings are shown to be in agreement with the predictions deriving from an effective ferromagnetic Kondo Hamiltonian.Comment: 4+ pages, 2 figures, submitted to Phys. Rev.

    The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire

    Full text link
    The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies. Surprisingly, almost all discussions in the current literature assume that hijacking incidents are enabled by the lack of security mechanisms in the inter-domain routing protocol BGP. In this paper, we discuss an attacker model that accounts for the hijacking of network ownership information stored in Regional Internet Registry (RIR) databases. We show that such threats emerge from abandoned Internet resources (e.g., IP address blocks, AS numbers). When DNS names expire, attackers gain the opportunity to take resource ownership by re-registering domain names that are referenced by corresponding RIR database objects. We argue that this kind of attack is more attractive than conventional hijacking, since the attacker can act in full anonymity on behalf of a victim. Despite corresponding incidents have been observed in the past, current detection techniques are not qualified to deal with these attacks. We show that they are feasible with very little effort, and analyze the risk potential of abandoned Internet resources for the European service region: our findings reveal that currently 73 /24 IP prefixes and 7 ASes are vulnerable to be stealthily abused. We discuss countermeasures and outline research directions towards preventive solutions.Comment: Final version for TMA 201

    Strong vs. Weak Coupling Duality and Coupling Dependence of the Kondo Temperature in the Two-Channel Kondo Model

    Full text link
    We perform numerical renormalization group (NRG) as well as analytical calculations for the two-channel Kondo model to obtain the dependence of the Kondo temperature TKT_K on the dimensionless (bare) spin exchange coupling gg over the complete parameter range from gā‰Ŗ1g\ll 1 to gā‰«1g\gg 1. We show that there exists a duality between the regimes of small and large coupling. It is unique for the two-channel model and enables a mapping between the strong and the weak coupling cases via the identification gā†”3/(2g)g\leftrightarrow 3/(2g), implying an exponential dependence of TKT_K on 1/g1/g and gg, respectively, in the two regimes. This agrees quantitatively with our NRG calculations where we extract TK(g)T_K(g) over the complete parameter range and obtain a non-monotonous TK(g)T_K(g) dependence, strongly peaked at the 2CK fixed point coupling gāˆ—g^*. These results may be relevant for resolving the long-standing puzzle within the 2CK interpretation of certain random defect systems, why no broad distribution of TKT_K is observed in those systems.Comment: 6 pages, 3 figures; PRB published version, shortened, nomenclature clarifie

    CAIR: Using Formal Languages to Study Routing, Leaking, and Interception in BGP

    Full text link
    The Internet routing protocol BGP expresses topological reachability and policy-based decisions simultaneously in path vectors. A complete view on the Internet backbone routing is given by the collection of all valid routes, which is infeasible to obtain due to information hiding of BGP, the lack of omnipresent collection points, and data complexity. Commonly, graph-based data models are used to represent the Internet topology from a given set of BGP routing tables but fall short of explaining policy contexts. As a consequence, routing anomalies such as route leaks and interception attacks cannot be explained with graphs. In this paper, we use formal languages to represent the global routing system in a rigorous model. Our CAIR framework translates BGP announcements into a finite route language that allows for the incremental construction of minimal route automata. CAIR preserves route diversity, is highly efficient, and well-suited to monitor BGP path changes in real-time. We formally derive implementable search patterns for route leaks and interception attacks. In contrast to the state-of-the-art, we can detect these incidents. In practical experiments, we analyze public BGP data over the last seven years

    The Garden of Roses : Waltzes

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-ps/2290/thumbnail.jp

    The analysis of disease biomarker data using a mixed hidden Markov model (Open Access publication)

    Get PDF
    A mixed hidden Markov model (HMM) was developed for predicting breeding values of a biomarker (here, somatic cell score) and the individual probabilities of health and disease (here, mastitis) based upon the measurements of the biomarker. At a first level, the unobserved disease process (Markov model) was introduced and at a second level, the measurement process was modeled, making the link between the unobserved disease states and the observed biomarker values. This hierarchical formulation allows joint estimation of the parameters of both processes. The flexibility of this approach is illustrated on the simulated data. Firstly, lactation curves for the biomarker were generated based upon published parameters (mean, variance, and probabilities of infection) for cows with known clinical conditions (health or mastitis due to Escherichia coli or Staphylococcus aureus). Next, estimation of the parameters was performed via Gibbs sampling, assuming the health status was unknown. Results from the simulations and mathematics show that the mixed HMM is appropriate to estimate the quantities of interest although the accuracy of the estimates is moderate when the prevalence of the disease is low. The paper ends with some indications for further developments of the methodology

    Genetic management of infectious diseases: a heterogeneous epidemio-genetic model illustrated with S. aureus mastitis

    Get PDF
    Given that individuals are genetically heterogeneous in their degree of resistance to infection, a model is proposed to formulate appropriate choices that will limit the spread of an infectious disease. The model is illustrated with data on S. aureus mastitis and is based on parameters characterizing the spread of the disease (contact rate, probability of infection after contact, and rate of recovery after infection), the demography (replacement and culling rates) and the genetic composition (degree of relationship and heritability of the disease trait) of the animal population. To decrease infection pressure, it is possible to apply non-genetic procedures that increase the culling (e.g., culling of chronically infected cows) and recovery (e.g., antibiotic therapy) rates of infected cows. But the contribution of the paper is to show that genetic management of infectious disease is also theoretically possible as a control measure complementary to non-genetic actions. Indeed, the probability for an uninfected individual to become infected after contact with an infected one is partially related to their degree of kinship: the more closely they are related, the more likely they are to share identical genes like those associated to the non-resistance to infection. Different prospective genetic management procedures are proposed to decrease the contact rate between infected and uninfected relatives and keep the number of secondary cases generated by one infected animal below 1

    The Whirl - Wind : Galop de Concert

    Get PDF
    https://digitalcommons.library.umaine.edu/mmb-ps/3044/thumbnail.jp

    The Garden of Roses

    Get PDF
    Roses on large trees with smaller trees between each large treehttps://scholarsjunction.msstate.edu/cht-sheet-music/11433/thumbnail.jp
    • ā€¦
    corecore