100,504 research outputs found
Crystals for high-energy calorimetry in extreme environments
Crystals are used as a homogeneous calorimetric medium in many high-energy
physics experiments. For some experiments, performance has to be ensured in
very difficult operating conditions, like a high radiation environment, very
large particle fluxes, high collision rates, placing constraints on response
and readout time. An overview is presented of recent achievements in the field,
with particular attention given to the performance of Lead Tungstate (PWO)
crystals exposed to high particle fluxes.Comment: To be published in Proc. of the Meeting of the Division of Particles
and Fields of the American Physical Society, DPF2004 (Riverside, USA, August
26th to 31st, 2004
A flexible mandatory access control policy for XML databases
A flexible mandatory access control policy (MAC) for XML
databases is presented in this paper. The label type and label
access policy can be defined according to the requirements of
applications. In order to preserve the integrity of data in XML
databases, a constraint between a read access rule and a write
access rule in label access policy is introduced. Rules for label
assignment and propagation are proposed to alleviate the
workload of label assignment. Also, a solution for resolving
conflicts of label assignments is proposed. At last, operations for
implementation of the MAC policy in a XML database are
illustrated
Recommended from our members
A practical mandatory access control model for XML databases
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The
label type and label access policy can be defined according to the requirements of different applications. In order to
preserve the integrity of data in XML databases, a constraint between a read-access rule and a write-access rule in
label access policy is introduced. Rules for label assignment and propagation are presented to alleviate the workload
of label assignments. Furthermore, a solution for resolving conflicts in label assignments is proposed. Rules for
update-related operations, rules for exceptional privileges of ordinary users and the administrator are also proposed
to preserve the security of operations in XML databases. The MAC model, we proposed in this study, has been
implemented in an XML database. Test results demonstrated that our approach provides rational and scalable
performance
The Spin Stiffness and the Transverse Susceptibility of the Half-filled Hubbard Model
The spin stiffness and the transverse susceptibility of the square lattice half-filled Hubbard model are calculated as a
function of the Hubbard parameter ratio by series expansions around the
Ising limit. We find that the calculated spin-stiffness, transverse
susceptibility, and sublattice magnetization for the Hubbard model smoothly
approach the Heisenberg values for large . The results are compared for
different with RPA and other numerical studies.Comment: 9 Revtex pages, 3 Postscript figures, Europhys. Lett. in pres
Recommended from our members
Learning distance to subspace for the nearest subspace methods in high-dimensional data classification
The nearest subspace methods (NSM) are a category of classification methods widely applied to classify high-dimensional data. In this paper, we propose to improve the classification performance of NSM through learning tailored distance metrics from samples to class subspaces. The learned distance metric is termed as ‘learned distance to subspace’ (LD2S). Using LD2S in the classification rule of NSM can make the samples closer to their correct class subspaces while farther away from their wrong class subspaces. In this way, the classification task becomes easier and the classification performance of NSM can be improved. The superior classification performance of using LD2S for NSM is demonstrated on three real-world high-dimensional spectral datasets
Agent fabrication and its implementation for agent-based electronic commerce
In the last decade, agent-based e-commerce has emerged as a potential role for the next generation of e-commerce. How to create agents for e-commerce applications has become a serious consideration in this field. This paper proposes a new scheme named agent fabrication and elaborates its implementation in multi-agent systems based on the SAFER (Secure Agent Fabrication, Evolution & Roaming) architecture. First, a conceptual structure is proposed for software agents carrying out e-commerce activities. Furthermore, agent module suitcase is defined to facilitate agent fabrication. With these definitions and facilities in the SAFER architecture, the formalities of agent fabrication are elaborated. In order to enhance the security of agent-based e-commerce, an infrastructure of agent authorization and authentication is integrated in agent fabrication. Our implementation and prototype applications show that the proposed agent fabrication scheme brings forth a potential solution for creating agents in agent-based e-commerce applications
Robustness of predator-prey models for confinement regime transitions in fusion plasmas
Energy transport and confinement in tokamak fusion plasmas is usually determined by the coupled nonlinear interactions of small-scale drift turbulence and larger scale coherent nonlinear structures, such as zonal flows, together with free energy sources such as temperature gradients. Zero-dimensional models, designed to embody plausible physical narratives for these interactions, can help to identify the origin of enhanced energy confinement and of transitions between confinement regimes. A prime zero-dimensional paradigm is predator-prey or Lotka-Volterra. Here, we extend a successful three-variable (temperature gradient; microturbulence level; one class of coherent structure) model in this genre [M. A. Malkov and P. H. Diamond, Phys. Plasmas 16, 012504 (2009)], by adding a fourth variable representing a second class of coherent structure. This requires a fourth coupled nonlinear ordinary differential equation. We investigate the degree of invariance of the phenomenology generated by the model of Malkov and Diamond, given this additional physics. We study and compare the long-time behaviour of the three-equation and four-equation systems, their evolution towards the final state, and their attractive fixed points and limit cycles. We explore the sensitivity of paths to attractors. It is found that, for example, an attractive fixed point of the three-equation system can become a limit cycle of the four-equation system. Addressing these questions which we together refer to as “robustness” for convenience is particularly important for models which, as here, generate sharp transitions in the values of system variables which may replicate some key features of confinement transitions. Our results help to establish the robustness of the zero-dimensional model approach to capturing observed confinement phenomenology in tokamak fusion plasmas
- …