3,331 research outputs found
Long term monitoring of bright TeV Blazars with the MAGIC telescope
The MAGIC telescope has performed long term monitoring observations of the
bright TeV Blazars Mrk421, Mrk501 and 1ES1959+650. Up to 40 observations, 30 to
60 minutes each have been performed for each source evenly distributed over the
observable period of the year. The sensitivity of MAGIC is sufficient to
establish a flux level of 25% of the Crab flux for each measurement. These
observations are well suited to trigger multiwavelength ToO observations and
the overall collected data allow an unbiased study of the flaring statistics of
the observed AGNs.Comment: 4 pages, 4 figures, to appear in the proceedings of the 30th
International Cosmic Ray Conference, Merida, July 200
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
Wrist-wearables such as smartwatches and fitness bands are equipped with a
variety of high-precision sensors that support novel contextual and
activity-based applications. The presence of a diverse set of on-board sensors,
however, also expose an additional attack surface which, if not adequately
protected, could be potentially exploited to leak private user information. In
this paper, we investigate the feasibility of a new attack that takes advantage
of a wrist-wearable's motion sensors to infer input on mechanical devices
typically used to secure physical access, for example, combination locks. We
outline an inference framework that attempts to infer a lock's unlock
combination from the wrist motion captured by a smartwatch's gyroscope sensor,
and uses a probabilistic model to produce a ranked list of likely unlock
combinations. We conduct a thorough empirical evaluation of the proposed
framework by employing unlocking-related motion data collected from human
subject participants in a variety of controlled and realistic settings.
Evaluation results from these experiments demonstrate that motion data from
wrist-wearables can be effectively employed as a side-channel to significantly
reduce the unlock combination search-space of commonly found combination locks,
thus compromising the physical security provided by these locks
Second harmonic generation in SiC polytypes
LMTO calculations are presented for the frequency dependent second harmonic
generation (SHG) in the polytypes 2H, 4H, 6H, 15R and 3C of SiC. All
independent tensor components are calculated. The spectral features and the
ratios of the 333 to 311 tensorial components are studied as a function of the
degree of hexagonality. The relationship to the linear optical response and the
underlying band structure are investigated. SHG is suggested to be a sensitive
tool for investigating the near band edge interband excitations.Comment: 12 pages, 10 figure
Magnetism and domain formation in SU(3)-symmetric multi-species Fermi mixtures
We study the phase diagram of an SU(3)-symmetric mixture of three-component
ultracold fermions with attractive interactions in an optical lattice,
including the additional effect on the mixture of an effective three-body
constraint induced by three-body losses. We address the properties of the
system in by using dynamical mean-field theory and variational Monte
Carlo techniques. The phase diagram of the model shows a strong interplay
between magnetism and superfluidity. In the absence of the three-body
constraint (no losses), the system undergoes a phase transition from a color
superfluid phase to a trionic phase, which shows additional particle density
modulations at half-filling. Away from the particle-hole symmetric point the
color superfluid phase is always spontaneously magnetized, leading to the
formation of different color superfluid domains in systems where the total
number of particles of each species is conserved. This can be seen as the SU(3)
symmetric realization of a more general tendency to phase-separation in
three-component Fermi mixtures. The three-body constraint strongly disfavors
the trionic phase, stabilizing a (fully magnetized) color superfluid also at
strong coupling. With increasing temperature we observe a transition to a
non-magnetized SU(3) Fermi liquid phase.Comment: 36 pages, 17 figures; Corrected typo
On the Gold Standard for Security of Universal Steganography
While symmetric-key steganography is quite well understood both in the
information-theoretic and in the computational setting, many fundamental
questions about its public-key counterpart resist persistent attempts to solve
them. The computational model for public-key steganography was proposed by von
Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first
universal public-key stegosystem - i.e. one that works on all channels -
achieving security against replayable chosen-covertext attacks (SS-RCCA) and
asked whether security against non-replayable chosen-covertext attacks (SS-CCA)
is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every
efficiently sampleable channel, but did not achieve universality. He posed the
question whether universality and SS-CCA-security can be achieved
simultaneously. No progress on this question has been achieved since more than
a decade. In our work we solve Hopper's problem in a somehow complete manner:
As our main positive result we design an SS-CCA-secure stegosystem that works
for every memoryless channel. On the other hand, we prove that this result is
the best possible in the context of universal steganography. We provide a
family of 0-memoryless channels - where the already sent documents have only
marginal influence on the current distribution - and prove that no
SS-CCA-secure steganography for this family exists in the standard
non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl
Recomendação de variedades de milho para o Sul do Brasil: rede de ensaios preliminares-Safra 2009/10.
bitstream/item/45104/1/circular-99.pd
Poaching and firm-sponsored training: first clean evidence
A series of seminal theoretical papers argues that poaching of employees may hamper company-sponsored general training. However, the extent of poaching, its determinants and consequences, remains an open empirical question. We provide a novel empirical identification strategy for poaching and investigate its causes and consequences. We find that only a small number of training firms in Germany are poaching victims. Firms are more likely to poach employees during an economic downturn. Training firms respond to poaching by lowering the share of new apprentice intakes in the following years
Magnetisation configuration in arrays of permalloy rectangles and its impact on magnetisation reversal
The remanent domain structures of composite element magnetic barcodes have been imaged using photo-emission electron microscopy with contrast from x-ray magnetic circular dichroism (XMCD-PEEM) and analysed with reference to the results of micromagnetic simulations. The magnetisation configuration at the end of wide strips is found to be perpendicular to the majority magnetisation direction. This transitions to an incomplete rotation for nominal strip widths below 300 nm and is found to affect the mechanics of magnetisation reversal for nominal strip widths below 200 nm, owing to a difference in magnetisation orientation when an external magnetic field is applied that is just smaller than the magnetic coercivity of the structures and a corresponding change in reversal dynamics. This change in domain structure as strip width decreases is consistent with both the influence of shape anisotropy and with measurements of magnetic hysteresis. The magnetisation reversal characteristics of composite element structures are found to be dependent on the relative magnetisation configurations of neighbouring strips, which in turn are found to vary stochastically upon the application and removal of a magnetic field along the easy axis of the structure. It is found that the application of a canted field is necessary to ensure sharp, consistent magnetisation reversal of bits when writing a binary code. These results confirm that either improved lithography of narrower strips or non-rectangular elements would be necessary to further increase the number of individually programmable bits in a barcode
FACT -- The G-APD revolution in Cherenkov astronomy
Since two years, the FACT telescope is operating on the Canary Island of La
Palma. Apart from its purpose to serve as a monitoring facility for the
brightest TeV blazars, it was built as a major step to establish solid state
photon counters as detectors in Cherenkov astronomy. The camera of the First
G-APD Cherenkov Telesope comprises 1440 Geiger-mode avalanche photo diodes
(G-APD), equipped with solid light guides to increase the effective light
collection area of each sensor. Since no sense-line is available, a special
challenge is to keep the applied voltage stable although the current drawn by
the G-APD depends on the flux of night-sky background photons significantly
varying with ambient light conditions. Methods have been developed to keep the
temperature and voltage dependent response of the G-APDs stable during
operation. As a cross-check, dark count spectra with high statistics have been
taken under different environmental conditions. In this presentation, the
project, the developed methods and the experience from two years of operation
of the first G-APD based camera in Cherenkov astronomy under changing
environmental conditions will be presented.Comment: Proceedings of the Nuclear Science Symposium and Medical Imaging
Conference (IEEE-NSS/MIC), 201
- …