168,126 research outputs found

    Decoherence in Nanostructures and Quantum Systems

    Get PDF
    Decoherence phenomena are pervasive in the arena of nanostructures but perhaps even more so in the study of the fundamentals of quantum mechanics and quantum computation. Since there has been little overlap between the studies in both arenas, this is an attempt to bridge the gap. Topics stressed include (a) wave packet spreading in a dissipative environment, a key element in all arenas, (b) the definition of a quantitative measure of decoherence, (c) the near zero and zero temperature limit, and (d) the key role played by initial conditions: system and environment entangled at all times so that one must use the density matrix (or Wigner distribution) for the complete system or initially decoupled system and environment so that use of a reduced density matrix or reduced Wigner distribution is feasible. Our approach utilizes generalized quantum Langevin equations and Wigner distributions

    Entropy of a Quantum Oscillator coupled to a Heat Bath and implications for Quantum Thermodynamics

    Get PDF
    The free energy of a quantum oscillator in an arbitrary heat bath at a temperature T is given by a "remarkable formula" which involves only a single integral. This leads to a corresponding simple result for the entropy. The low temperature limit is examined in detail and we obtain explicit results both for the case of an Ohmic heat bath and a radiation heat bath. More general heat bath models are also examined. This enables us to determine the entropy at zero temperature in order to check the third law of thermodynamics in the quantum regimeComment: International Conference on "Frontiers of Quantum and Mesoscopic Thermodynamics

    Icebergs in the Clouds: the Other Risks of Cloud Computing

    Full text link
    Cloud computing is appealing from management and efficiency perspectives, but brings risks both known and unknown. Well-known and hotly-debated information security risks, due to software vulnerabilities, insider attacks, and side-channels for example, may be only the "tip of the iceberg." As diverse, independently developed cloud services share ever more fluidly and aggressively multiplexed hardware resource pools, unpredictable interactions between load-balancing and other reactive mechanisms could lead to dynamic instabilities or "meltdowns." Non-transparent layering structures, where alternative cloud services may appear independent but share deep, hidden resource dependencies, may create unexpected and potentially catastrophic failure correlations, reminiscent of financial industry crashes. Finally, cloud computing exacerbates already-difficult digital preservation challenges, because only the provider of a cloud-based application or service can archive a "live," functional copy of a cloud artifact and its data for long-term cultural preservation. This paper explores these largely unrecognized risks, making the case that we should study them before our socioeconomic fabric becomes inextricably dependent on a convenient but potentially unstable computing model.Comment: 6 pages, 3 figure

    Plugging Side-Channel Leaks with Timing Information Flow Control

    Get PDF
    The cloud model's dependence on massive parallelism and resource sharing exacerbates the security challenge of timing side-channels. Timing Information Flow Control (TIFC) is a novel adaptation of IFC techniques that may offer a way to reason about, and ultimately control, the flow of sensitive information through systems via timing channels. With TIFC, objects such as files, messages, and processes carry not just content labels describing the ownership of the object's "bits," but also timing labels describing information contained in timing events affecting the object, such as process creation/termination or message reception. With two system design tools-deterministic execution and pacing queues-TIFC enables the construction of "timing-hardened" cloud infrastructure that permits statistical multiplexing, while aggregating and rate-limiting timing information leakage between hosted computations.Comment: 5 pages, 3 figure

    Slow response to Angola's food crisis.

    Get PDF

    Embedding QR codes in the Bournemouth University print collection

    Get PDF
    During the 2011/12 academic year, Library and Learning Support (LLS) at BU have been working on a project to embed QR codes within the library print collection to highlight available e-books from heavily used areas of the shelves
    corecore