10,528 research outputs found

    How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET

    Get PDF
    Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these protocols is mostly lacking. In this paper, we are concerned with this problem, how to specify and how to prove the correctness of a secure routing protocol. We provide a definition of what a protocol is expected to achieve independently of its functionality, as well as communication and adversary models. This way, we enable formal reasoning on the correctness of secure routing protocols. We demonstrate this by analyzing two protocols from the literature

    Modelling of epitaxial graphene functionalization

    Full text link
    A new model for graphene, epitaxially grown on silicon carbide is proposed. Density functional theory modelling of epitaxial graphene functionalization by hydrogen, fluorine and phenyl groups has been performed with hydrogen and fluorine showing a high probability of cluster formation in high adatom concentration. It has also been shown that the clusterization of fluorine adatoms provides midgap states in formation due to significant flat distortion of graphene. The functionalization of epitaxial graphene using larger species (methyl and phenyl groups) renders cluster formation impossible, due to the steric effect and results in uniform coverage with the energy gap opening.Comment: 15 pages, 4 figures, to appear in Nanotechnolog

    A Hessenberg Markov chain for fast fibre delay line length optimization

    Get PDF
    In this paper we present an approach to compute the invariant vector of the N + 1 state Markov chain P presented in (Rogiest et al., Lecture Notes in Computer Science, NET-COOP 2007 Special Issue, pp. 4465:185-194) to determine the loss rate of an FDL buffer consisting of N lines, by solving a related Hessenberg system (i.e., a Markov chain skip-free in one direction). This system is obtained by inserting additional time instants in the sample paths of P and allows us to compute the loss rate for various FDL lengths by solving a single system. This is shown to be especially effective in reducing the computation time of the heuristic LRA algorithm presented in (Lambert et al., Proc. NAEC 2005, pp. 545-555) to optimize the FDL lengths, where improvements of several orders of magnitude can be realized

    Aperiodic nano-photonic design

    Full text link
    The photon scattering properties of aperiodic nano-scale dielectric structures can be tailored to closely match a desired response by using adaptive algorithms for device design. We show that broken symmetry of aperiodic designs provides access to device functions not available to conventional periodic photonic crystal structures.Comment: 23 pages, LaTex, 8 postscript figure

    Near Infrared Adaptive Optics Imaging of QSO Host Galaxies

    Get PDF
    We report near-infrared (primarily H-band) adaptive optics (AO) imaging with the Gemini-N and Subaru Telescopes, of a representative sample of 32 nearby (z<0.3) QSOs selected from the Palomar-Green (PG) Bright Quasar Survey (BQS), in order to investigate the properties of the host galaxies. 2D modeling and visual inspection of the images shows that ~36% of the hosts are ellipticals, \~39% contain a prominent disk component, and ~25% are of undetermined type. 30% show obvious signs of disturbance. The mean M_H(host) = -24.82 (2.1L_H*), with a range -23.5 to -26.5 (~0.63 to 10 L_H*). At <L_H*, all hosts have a dominant disk component, while at >2 L_H* most are ellipticals. "Disturbed" hosts are found at all M_H(host), while "strongly disturbed" hosts appear to favor the more luminous hosts. Hosts with prominent disks have less luminous QSOs, while the most luminous QSOs are almost exclusively in ellipticals or in mergers (which presumably shortly will be ellipticals). At z<0.13, where our sample is complete at B-band, we find no clear correlation between M_B(QSO) and M_H(host). However, at z>0.15, the more luminous QSOs (M_B<-24.7), and 4/5 of the radio-loud QSOs, have the most luminous H-band hosts (>7L_H*), most of which are ellipticals. Finally, we find a strong correlation between the "infrared-excess", L_IR/L_BB, of QSOs with host type and degree of disturbance. Disturbed and strongly disturbed hosts and hosts with dominant disks have L_IR/L_BB twice that of non-disturbed and elliptical hosts, respectively. QSOs with "disturbed" and "strongly-disturbed" hosts are also found to have morphologies and mid/far-infrared colors that are similar to what is found for "warm" ultraluminous infrared galaxies, providing further evidence for a possible evolutionary connection between both classes of objects.Comment: 80 pages, accepted for publication in ApJ Supp

    Vortex, skyrmion and elliptical domain wall textures in the two-dimensional Hubbard model

    Full text link
    The spin and charge texture around doped holes in the two-dimensional Hubbard model is calculated within an unrestricted spin rotational invariant slave-boson approach. In the first part we examine in detail the spin structure around two holes doped in the half-filled system where we have studied cluster sizes up to 10 x 10. It turns out that the most stable configuration corresponds to a vortex-antivortex pair which has lower energy than the Neel-type bipolaron even when one takes the far field contribution into account. We also obtain skyrmions as local minima of the energy functional but with higher total energy than the vortex solutions. Additionally we have investigated the stability of elliptical domain walls for commensurate hole concentrations. We find that (i) these phases correspond to local minima of the energy functional only in case of partially filled walls, (ii) elliptical domain walls are only stable in the low doping regime.Comment: 7 pages, 6 figures, accepted for Phys. Rev.

    Analyzing split channel medium access control schemes,”

    Get PDF
    Abstract: In order to improve the throughput performance of Medium Access Control (MAC) schemes in wireless communication networks, some researchers proposed to divide a single shared channel into several subchannels: one as control sub-channel and the others as data sub-channels. In this paper, we analyze and evaluate the maximum achievable throughput of a class of generic multi-channel MAC schemes that are based on the RTS/CTS (Ready-To-Send/Clear-To-Send) dialogue and on ALOHA contention resolution. We study these multichannel MAC schemes under two split-channel scenarios: the fixed-total-bandwidth scenario and the fixed-channel-bandwidth scenario. In the fixed-total-bandwidth scenario, we show that the throughput of the multi-channel MAC schemes is inferior to that of the corresponding single-channel MAC scheme, which sends the RTS/CTS packets and DATA packets on a single shared channel. For the fixed-channel-bandwidth scenario, where CDMA or similar techniques can be applied, we derive the optimal number of the data subchannels that maximizes the throughput. The analytical framework that we derive in this paper can also be used to evaluate other contention resolution technique, when the average contention period is known. Index Terms: medium access control, MAC, shared channel, multiple channels, ALOHA, contention resolution, RTS/CTS dialogue Article: I. INTRODUCTION In wireless communication networks, Medium Access Control (MAC) schemes are used to manage the access of active nodes to a shared channel Even though there are many multi-channel MAC schemes proposed in the technical literature, to the best of our knowledge, systematic comparison of these multi-channel MAC schemes with the corresponding single-channel schemes is not available except i

    Three-Dimensional Ordering in Weakly Coupled Antiferromagnetic Ladders and Chains

    Full text link
    A theoretical description is presented for low-temperature magnetic-field induced three-dimensional (3D) ordering transitions in strongly anisotropic quantum antiferromagnets, consisting of weakly coupled antiferromagnetic spin-1/2 chains and ladders. First, effective continuum field theories are derived for the one-dimensional subsystems. Then the Luttinger parameters, which determine the low-temperature susceptibilities of the chains and ladders, are calculated from the Bethe ansatz solution for these effective models. The 3D ordering transition line is obtained using a random phase approximation for the weak inter-chain (inter-ladder) coupling. Finally, considering a Ginzburg criterion, the fluctuation corrections to this approach are shown to be small. The nature of the 3D ordered phase resembles a Bose condensate of integer-spin magnons. It is proposed that for systems with higher spin degrees of freedom, e.g. N-leg spin-1/2 ladders, multi-component condensates can occur at high magnetic fields.Comment: RevTex, 18 pages with 7 figure

    Optimal transport on wireless networks

    Get PDF
    We present a study of the application of a variant of a recently introduced heuristic algorithm for the optimization of transport routes on complex networks to the problem of finding the optimal routes of communication between nodes on wireless networks. Our algorithm iteratively balances network traffic by minimizing the maximum node betweenness on the network. The variant we consider specifically accounts for the broadcast restrictions imposed by wireless communication by using a different betweenness measure. We compare the performance of our algorithm to two other known algorithms and find that our algorithm achieves the highest transport capacity both for minimum node degree geometric networks, which are directed geometric networks that model wireless communication networks, and for configuration model networks that are uncorrelated scale-free networks.Comment: 5 pages, 4 figure
    • …
    corecore