9,867 research outputs found

    A compactness theorem for scalar-flat metrics on manifolds with boundary

    Full text link
    Let (M,g) be a compact Riemannian manifold with boundary. This paper is concerned with the set of scalar-flat metrics which are in the conformal class of g and have the boundary as a constant mean curvature hypersurface. We prove that this set is compact for dimensions greater than or equal to 7 under the generic condition that the trace-free 2nd fundamental form of the boundary is nonzero everywhere.Comment: 49 pages. Final version, to appear in Calc. Var. Partial Differential Equation

    Cosmic-ray fermion decay through tau-antitau emission with Lorentz violation

    Get PDF
    We study CPT and Lorentz violation in the tau-lepton sector of the Standard Model in the context of the Standard-Model Extension, parametrized by a coefficient which is thus far unbounded by experiment. We show that any nonzero value of this coefficient implies that, for sufficiently large energies, Standard Model fermions become unstable against decay due to the emission of a pair of tau-antitau leptons. We calculate the induced fermion energy-loss rate and we deduce the first limit on the Lorentz- and CPT-violation coefficient.Fundacao para a Ciencia e a Tecnologia of Portugal (FCT) [UID/FIS/00099/2013, SFRH/BPD/101403/2014]; CONACyT [234745]info:eu-repo/semantics/publishedVersio

    Guarana fertilization.

    Get PDF
    bitstream/item/210626/1/Guarana-Fertilization.pd

    An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA

    Full text link
    [EN] Maude-NPA is an analysis tool for cryptographic security protocols that takes into account the algebraic properties of the cryptosystem. Maude-NPA can reason about a wide range of cryptographic properties. However, some algebraic properties, and protocols using them, have been beyond Maude-NPA capabilities, either because the cryptographic properties cannot be expressed using its equational unification features or because the state space is unmanageable. In this paper, we provide a protocol transformation that can safely get rid of cryptographic properties under some conditions. The time and space difference between verifying the protocol with all the crypto properties and verifying the protocol with a minimal set of the crypto properties is remarkable. We also provide, for the first time, an encoding of the theory of bilinear pairing into Maude-NPA that goes beyond the encoding of bilinear pairing available in the Tamarin toolPartially supported by the EU (FEDER) and the Spanish MCIU under grant RTI2018-094403-B-C32, by the Spanish Generalitat Valenciana under grant PROMETEO/2019/098, and by the US Air Force Office of Scientific Research under award number FA9550-17-1-0286. Julia Sapiña has been supported by the Generalitat Valenciana APOSTD/2019/127 grantAparicio-Sánchez, D.; Escobar Román, S.; Gutiérrez Gil, R.; Sapiña-Sanchis, J. (2020). An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA. Springer Nature. 230-250. https://doi.org/10.1007/978-3-030-59013-0_12S230250Maude-NPA manual v3.1. http://maude.cs.illinois.edu/w/index.php/Maude_Tools:_Maude-NPAThe Tamarin-Prover Manual, 4 June 2019. https://tamarin-prover.github.io/manual/tex/tamarin-manual.pdfAl-Riyami, S.S., Paterson, K.G.: Tripartite authenticated key agreement protocols from pairings. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 332–359. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40974-8_27Baader, F., Snyder, W.: Unification theory. In: Robinson, J.A., Voronkov, A. (eds.) Handbook of Automated Reasoning, vol. 1, pp. 447–533. Elsevier Science (2001)Baelde, D., Delaune, S., Gazeau, I., Kremer, S.: Symbolic verification of privacy-type properties for security protocols with XOR. In: 30th IEEE Computer Security Foundations Symposium, CSF 2017, pp. 234–248. IEEE Computer Society (2017)Blanchet, B.: Modeling and verifying security protocols with the applied pi calculus and ProVerif. Found. Trends Privacy Secur. 1(1–2), 1–135 (2016)Clavel, M., et al.: Maude manual (version 3.0). Technical report, SRI International, Computer Science Laboratory (2020). http://maude.cs.uiuc.eduComon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-32033-3_22Cremers, C.J.F.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70545-1_38Dreier, J., Duménil, C., Kremer, S., Sasse, R.: Beyond subterm-convergent equational theories in automated verification of stateful protocols. In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 117–140. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54455-6_6Escobar, S., Hendrix, J., Meadows, C., Meseguer, J.: Diffie-Hellman cryptographic reasoning in the Maude-NRL protocol analyzer. In: Proceedings of 2nd International Workshop on Security and Rewriting Techniques (SecReT 2007) (2007)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1–2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03829-7_1Escobar, S., et al.: Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. In: Proceedings of PPDP 2011, pp. 65–76. ACM (2011)Escobar, S., Meadows, C.A., Meseguer, J., Santiago, S.: State space reduction in the Maude-NRL protocol analyzer. Inf. Comput. 238, 157–186 (2014)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. J. Log. Algebr. Program. 81(7–8), 898–928 (2012)Fabrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: why is a security protocol correct? In: Proceedings of IEEE Symposium on Security and Privacy, pp. 160–171 (1998)Guttman, J.D.: Security goals and protocol transformations. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 130–147. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27375-9_8Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–393. Springer, Heidelberg (2000). https://doi.org/10.1007/10722028_23Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Dupuy, M., Paradinas, P. (eds.) SEC 2001. IIFIP, vol. 65, pp. 229–244. Springer, Boston, MA (2002). https://doi.org/10.1007/0-306-46998-7_16Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: IEEE Computer Security Foundations, pp. 157–171 (2009)Küsters, R., Truderung, T.: Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. J. Autom. Reason. 46(3–4), 325–352 (2011)Meadows, C.: The NRL protocol analyzer: an overview. J. Logic Program. 26(2), 113–131 (1996)Meier, S., Cremers, C., Basin, D.: Strong invariants for the efficient construction of machine-checked protocol security proofs. In: 2010 23rd IEEE Computer Security Foundations Symposium, pp. 231–245 (2010)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theoret. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Variant-based satisfiability in initial algebras. Sci. Comput. Program. 154, 3–41 (2018)Meseguer, J.: Generalized rewrite theories, coherence completion, and symbolic methods. J. Log. Algebr. Meth. Program. 110, 100483 (2020)Mödersheim, S., Viganò, L.: The open-source fixed-point model checker for symbolic analysis of security protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007-2009. LNCS, vol. 5705, pp. 166–194. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03829-7_6Sasse, R., Escobar, S., Meadows, C., Meseguer, J.: Protocol analysis modulo combination of theories: a case study in Maude-NPA. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 163–178. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22444-7_11Schmidt, B., Sasse, R., Cremers, C., Basin, D.A.: Automated verification of group key agreement protocols. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, pp. 179–194. IEEE Computer Society (2014)Skeirik, S., Meseguer, J.: Metalevel algorithms for variant satisfiability. J. Log. Algebraic Methods Program. 96, 81–110 (2018)TeReSe: Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Yang, F., Escobar, S., Meadows, C.A., Meseguer, J., Narendran, P.: Theories of homomorphic encryption, unification, and the finite variant property. In: Proceedings of PPDP 2014, pp. 123–133. ACM (2014

    Runaway evaporation for optically dressed atoms

    Get PDF
    Forced evaporative cooling in a far-off-resonance optical dipole trap is proved to be an efficient method to produce fermionic- or bosonic-degenerated gases. However in most of the experiences, the reduction of the potential height occurs with a diminution of the collision elastic rate. Taking advantage of a long-living excited state, like in two-electron atoms, I propose a new scheme, based on an optical knife, where the forced evaporation can be driven independently of the trap confinement. In this context, the runaway regime might be achieved leading to a substantial improvement of the cooling efficiency. The comparison with the different methods for forced evaporation is discussed in the presence or not of three-body recombination losses

    On the existence of initial data containing isolated black holes

    Get PDF
    We present a general construction of initial data for Einstein's equations containing an arbitrary number of black holes, each of which is instantaneously in equilibrium. Each black hole is taken to be a marginally trapped surface and plays the role of the inner boundary of the Cauchy surface. The black hole is taken to be instantaneously isolated if its outgoing null rays are shear-free. Starting from the choice of a conformal metric and the freely specifiable part of the extrinsic curvature in the bulk, we give a prescription for choosing the shape of the inner boundaries and the boundary conditions that must be imposed there. We show rigorously that with these choices, the resulting non-linear elliptic system always admits solutions.Comment: 11 pages, 2 figures, RevTeX

    Exergy cost assessment of solar trigeneration plant based on a concentrated solar power plant as the prime mover

    Get PDF
    An exergy cost assessment of solar trigeneration plant to generate electricity, fresh-water, and heat is carried out in order to study the process of exergy cost formation, to determine the key components that contribute to the cost of each product, and to establish the best configuration in term of unit exergy cost. The solar trigeneration plants evaluated consist of a concentrated solar power (CSP), a multi-effect distillation plant, and a process heat module, in which the CSP plant is the prime mover. The methodology includes modeling and evaluating the performance of standalone and trigeneration plants using the symbolic exergoeconomic methodology. Results show that the best configuration, in terms of exergy cost, is when the multi-effect distillation plant replaces the power cycle condenser. Regarding the costs formation, the key components which could be improved in their design are: solar collectors, evaporator, re-heater, dissipative systems, and productive subsystems

    Estimativa da variação do número de flores femininas efetivas do guaraná a partir de dados de colheita.

    Get PDF
    No presente trabalho se descreve um método indireto para estimar a época (período), variação e magnitude da floração feminina efetiva do guaraná a partir de dados individuais de produção por planta, peso individual de amêndoas secas por planta e período de maturação de frutos

    Lactococcus garvieae endocarditis in a patient undergoing chronic hemodialysis. First case report in Chile and review of the literature

    Get PDF
    Indexación: Scopus; Scielo.Los casos reportados de infección por Lactococcus garvieae son escasos y sólo uno asociado a hemodiálisis. Comunicamos el caso de endocarditis infecciosa de curso fatal por L. garvieae en un paciente con una enfermedad renal crónica sometido a hemodiálisis y portador de diverticulosis colónica no complicada. Se realiza una revisión de los casos publicados y se discuten los actuales desafíos diagnósticos y terapéuticos de este patógeno, capaz de producir infecciones graves y potencialmente fatales en pacientes susceptibles. Este sería el segundo caso de infección asociada a hemodiálisis y el primero reportado en Chile.Reports of Lactococcus garvieae infections in humans are scarce, and only one of them in a patient under-going hemodialysis. We report the first case of Lactococcus garvieae infection in Chile, presenting as an infective endocarditis, ultimately fatal, in a patient with uncomplicated colonic diverticulosis and end stage renal failure undergoing chronic hemodialysis. We review the published cases and discuss the diagnostic and therapeutic challenges associated with this new, increasingly diagnosed pathogen, capable of producing serious infections in susceptible patients.https://scielo.conicyt.cl/scielo.php?script=sci_arttext&pid=S0716-10182017000400397&lng=en&nrm=iso&tlng=e
    corecore