744 research outputs found
Die Verordnung (EG) 805/2004 zur Einführung eines europäischen Vollstreckungstitels für unbestrittene Forderungen (EuVTVO) und ihre Konsequenzen für den Schuldnerschutz
Mit der EuVTVO wird zur Vereinfachung und Beschleunigung der Vollstreckung ausländischer Titel innerhalb der europäischen Gemeinschaft der Eu-Vollstreckungstitel eingeführt. Bei dieser Verordnung handelt es sich um eine konsequente Fortsetzung des bereits mit der EuGVVO begonnenen Ansatzes zur Integration eines grenzüberschreitenden Vollstreckungstitels in die jeweiligen nationalen Rechtssysteme. Die herausragende Neuerung durch die EuVTVO stellen die Abschaffung der Vollstreckbarerklärung im Vollstreckungsstaat und der damit verbundene Wegfall der wesentlichen Anerkennungs- und Vollstreckungshindernisse dar. Die Einführung der EuVTVO und damit die Abschaffung des Exequaturverfahrens im Vollstreckungsstaat für unbestrittene Forderungen ist ein weiterer Schritt zur Verbesserung und Vereinfachung der Anerkennung und Vollstreckung gerichtlicher und außergerichtlicher Entscheidung in Zivil- und Handelssachen
Cancellation of the Chiral Anomaly in a Model with Spontaneous Symmetry Breaking
A perturbatively renormalized Abelian Higgs-Kibble model with a chirally
coupled fermion is considered. The Slavnov identity is fulfilled to all orders
of perturbation theory, which is crucial for renormalizability in models with
vector bosons. BRS invariance, i.e. the validity of the identity, forces the
chiral anomaly to be cancelled by Wess-Zumino counterterms. This procedure
preserves the renormalizability in the one-loop approximation but it violates
the Froissart bounds for partial wave amplitudes above some energy and destroys
renormalizability from the second order in h bar onwards due to the
counterterms. (The paper has 3 figs. in postscript which are not included; send
request to the author's e-mailbox with subject: figures . The author is willing
to mail hard copies of the paper.)Comment: 13 pages, plain TeX, SI 92-1
P-SCOR: Integration of Constraint Programming Orchestration and Programmable Data Plane
In this manuscript we present an original implementation of network management functions in the context of Software Defined Networking. We demonstrate a full integration of an artificial intelligence driven management, an SDN control plane, and a programmable data plane. Constraint Programming is used to implement a management operating system that accepts high level specifications, via a northbound interface, in terms of operational objective and directives. These are translated in technology-specific constraints and directives for the SDN control plane, leveraging the programmable data plane, which is enriched with functionalities suited to feed data that enable the most effective operation of the “intelligent” control plane, by exploiting the language
One-dimensional Ising ferromagnet frustrated by long-range interactions at finite temperatures
We consider a one-dimensional lattice of Ising-type variables where the
ferromagnetic exchange interaction J between neighboring sites is frustrated by
a long-ranged anti-ferromagnetic interaction of strength g between the sites i
and j, decaying as |i-j|^-alpha, with alpha>1. For alpha smaller than a certain
threshold alpha_0, which is larger than 2 and depends on the ratio J/g, the
ground state consists of an ordered sequence of segments with equal length and
alternating magnetization. The width of the segments depends on both alpha and
the ratio J/g. Our Monte Carlo study shows that the on-site magnetization
vanishes at finite temperatures and finds no indication of any phase
transition. Yet, the modulation present in the ground state is recovered at
finite temperatures in the two-point correlation function, which oscillates in
space with a characteristic spatial period: The latter depends on alpha and J/g
and decreases smoothly from the ground-state value as the temperature is
increased. Such an oscillation of the correlation function is exponentially
damped over a characteristic spatial scale, the correlation length, which
asymptotically diverges roughly as the inverse of the temperature as T=0 is
approached. This suggests that the long-range interaction causes the Ising
chain to fall into a universality class consistent with an underlying
continuous symmetry. The e^(Delta/T)-temperature dependence of the correlation
length and the uniform ferromagnetic ground state, characteristic of the g=0
discrete Ising symmetry, are recovered for alpha > alpha_0.Comment: 12 pages, 7 figure
Unforgeable Quantum Encryption
We study the problem of encrypting and authenticating quantum data in the
presence of adversaries making adaptive chosen plaintext and chosen ciphertext
queries. Classically, security games use string copying and comparison to
detect adversarial cheating in such scenarios. Quantumly, this approach would
violate no-cloning. We develop new techniques to overcome this problem: we use
entanglement to detect cheating, and rely on recent results for characterizing
quantum encryption schemes. We give definitions for (i.) ciphertext
unforgeability , (ii.) indistinguishability under adaptive chosen-ciphertext
attack, and (iii.) authenticated encryption. The restriction of each definition
to the classical setting is at least as strong as the corresponding classical
notion: (i) implies INT-CTXT, (ii) implies IND-CCA2, and (iii) implies AE. All
of our new notions also imply QIND-CPA privacy. Combining one-time
authentication and classical pseudorandomness, we construct schemes for each of
these new quantum security notions, and provide several separation examples.
Along the way, we also give a new definition of one-time quantum authentication
which, unlike all previous approaches, authenticates ciphertexts rather than
plaintexts.Comment: 22+2 pages, 1 figure. v3: error in the definition of QIND-CCA2 fixed,
some proofs related to QIND-CCA2 clarifie
Mid-gut ACTH-secreting neuroendocrine tumor unmasked with (18)F-dihydroxyphenylalanine-positron emission tomography.
Ectopic ACTH Cushing's syndrome (EAS) is often caused by neuroendocrine tumors (NETs) of lungs, pancreas, thymus, and other less frequent locations. Localizing the source of ACTH can be challenging. A 64-year-old man presented with rapidly progressing fatigue, muscular weakness, and dyspnea. He was in poor condition and showed facial redness, proximal amyotrophy, and bruises. Laboratory disclosed hypokalemia, metabolic alkalosis, and markedly elevated ACTH and cortisol levels. Pituitary was normal on magnetic resonance imaging (MRI), and bilateral inferior petrosal sinus blood sampling with corticotropin-releasing hormone stimulation showed no significant central-to-periphery gradient of ACTH. Head and neck, thoracic and abdominal computerized tomography (CT), MRI, somatostatin receptor scintigraphy (SSRS), and (18)F-deoxyglucose-positron emission tomography (FDG-PET) failed to identify the primary tumor. (18)F-dihydroxyphenylalanine (F-DOPA)-PET/CT unveiled a 20-mm nodule in the jejunum and a metastatic lymph node. Segmental jejunum resection showed two adjacent NETs, measuring 2.0 and 0.5 cm with a peritoneal metastasis. The largest tumor expressed ACTH in 30% of cells. Following surgery, after a transient adrenal insufficiency, ACTH and cortisol levels returned to normal values and remain normal over a follow-up of 26 months. Small mid-gut NETs are difficult to localize on CT or MRI, and require metabolic imaging. Owing to low mitotic activity, NETs are generally poor candidates for FDG-PET, whereas SSRS shows poor sensitivity in EAS due to intrinsically low tumor concentration of type-2 somatostatin receptors (SST2) or to receptor down regulation by excess cortisol. However, F-DOPA-PET, which is related to amine precursor uptake by NETs, has been reported to have high positive predictive value for occult EAS despite low sensitivity, and constitutes a useful alternative to more conventional methods of tumor localization.
LEARNING POINTS: Uncontrolled high cortisol levels in EAS can be lethal if untreated.Surgical excision is the keystone of NETs treatment, thus tumor localization is crucial.Most cases of EAS are caused by NETs, which are located mainly in the lungs. However, small gut NETs are elusive to conventional imaging and require metabolic imaging for detection.FDG-PET, based on tumor high metabolic rate, may not detect NETs that have low mitotic activity. SSRS may also fail, due to absent or low concentration of SST2, which may be down regulated by excess cortisol.F-DOPA-PET, based on amine-precursor uptake, can be a useful method to localize the occult source of ACTH in EAS when other methods have failed
Quantum authentication with key recycling
We show that a family of quantum authentication protocols introduced in
[Barnum et al., FOCS 2002] can be used to construct a secure quantum channel
and additionally recycle all of the secret key if the message is successfully
authenticated, and recycle part of the key if tampering is detected. We give a
full security proof that constructs the secure channel given only insecure
noisy channels and a shared secret key. We also prove that the number of
recycled key bits is optimal for this family of protocols, i.e., there exists
an adversarial strategy to obtain all non-recycled bits. Previous works
recycled less key and only gave partial security proofs, since they did not
consider all possible distinguishers (environments) that may be used to
distinguish the real setting from the ideal secure quantum channel and secret
key resource.Comment: 38+17 pages, 13 figures. v2: constructed ideal secure channel and
secret key resource have been slightly redefined; also added a proof in the
appendix for quantum authentication without key recycling that has better
parameters and only requires weak purity testing code
- …