2,098 research outputs found

    Extreme Supernova Models for the Superluminous Transient ASASSN-15lh

    Get PDF
    The recent discovery of the unprecedentedly superluminous transient ASASSN-15lh (or SN 2015L) with its UV-bright secondary peak challenges all the power-input models that have been proposed for superluminous supernovae. Here we examine some of the few viable interpretations of ASASSN-15lh in the context of a stellar explosion, involving combinations of one or more power inputs. We model the lightcurve of ASASSN-15lh with a hybrid model that includes contributions from magnetar spin-down energy and hydrogen-poor circumstellar interaction. We also investigate models of pure circumstellar interaction with a massive hydrogen-deficient shell and discuss the lack of interaction features in the observed spectra. We find that, as a supernova ASASSN-15lh can be best modeled by the energetic core-collapse of a ~40 Msun star interacting with a hydrogen-poor shell of ~20 Msun. The circumstellar shell and progenitor mass are consistent with a rapidly rotating pulsational pair-instability supernova progenitor as required for strong interaction following the final supernova explosion. Additional energy injection by a magnetar with initial period of 1-2 ms and magnetic field of 0.1-1 x 10^14 G may supply the excess luminosity required to overcome the deficit in single-component models, but this requires more fine-tuning and extreme parameters for the magnetar, as well as the assumption of efficient conversion of magnetar energy into radiation. We thus favor a single-input model where the reverse shock formed in a strong SN ejecta-CSM interaction following a very powerful core-collapse SN explosion can supply the luminosity needed to reproduce the late-time UV-bright plateau.Comment: 8 pages, 3 figure

    A Rational Approach to Cryptographic Protocols

    Full text link
    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries

    Concurrent bandits and cognitive radio networks

    Full text link
    We consider the problem of multiple users targeting the arms of a single multi-armed stochastic bandit. The motivation for this problem comes from cognitive radio networks, where selfish users need to coexist without any side communication between them, implicit cooperation or common control. Even the number of users may be unknown and can vary as users join or leave the network. We propose an algorithm that combines an Ï”\epsilon-greedy learning rule with a collision avoidance mechanism. We analyze its regret with respect to the system-wide optimum and show that sub-linear regret can be obtained in this setting. Experiments show dramatic improvement compared to other algorithms for this setting

    Impact of the capping layers on lateral confinement in InAs/InP quantum dots for 1.55 um laser applications srudied by magneto-photoluminescence.

    Get PDF
    We have used magnetophotoluminescence to study the impact of different capping layer material combinations (InP, GaInAsP quaternary alloy, or both InP and quaternary alloy) on lateral confinement in InAs/InP quantum dots (QDs) grown on (311)B orientated substrates. Exciton effective masses, Bohr radii, and binding energies are measured for these samples. Conclusions regarding the strength of the lateral confinement in the different samples are supported by photoluminescence at high excitation power. Contrary to theoretical predictions, InAs QDs in quaternary alloy are found to have better confinement properties than InAs/InP QDs. This is attributed to a lack of lateral intermixing with the quaternary alloy, which is present when InP is used to (partially) cap the dots. The implications of the results for reducing the temperature sensitivity of QD lasers are discussed. ©2005 American Institute of Physic

    Pseudorandomness for Regular Branching Programs via Fourier Analysis

    Full text link
    We present an explicit pseudorandom generator for oblivious, read-once, permutation branching programs of constant width that can read their input bits in any order. The seed length is O(log⁥2n)O(\log^2 n), where nn is the length of the branching program. The previous best seed length known for this model was n1/2+o(1)n^{1/2+o(1)}, which follows as a special case of a generator due to Impagliazzo, Meka, and Zuckerman (FOCS 2012) (which gives a seed length of s1/2+o(1)s^{1/2+o(1)} for arbitrary branching programs of size ss). Our techniques also give seed length n1/2+o(1)n^{1/2+o(1)} for general oblivious, read-once branching programs of width 2no(1)2^{n^{o(1)}}, which is incomparable to the results of Impagliazzo et al.Our pseudorandom generator is similar to the one used by Gopalan et al. (FOCS 2012) for read-once CNFs, but the analysis is quite different; ours is based on Fourier analysis of branching programs. In particular, we show that an oblivious, read-once, regular branching program of width ww has Fourier mass at most (2w2)k(2w^2)^k at level kk, independent of the length of the program.Comment: RANDOM 201
    • 

    corecore