118,855 research outputs found

    DA UTILIDADE E DOS INCONVENIENTES DO MÉTODO PARA A HISTÓRIA DAS IDÉIAS LINGÜÍSTICAS

    Get PDF
    A partir de autores como S. Auroux, E. Orlandi, E. Guimarães, J-C Chevalier, S. Delesalle, J-L Chiss, C. Puech, M. Foucault e F. Nietzsche, o trabalho se coloca algumas questões sobre a constituição de uma metodologia específica para realizar história das idéias lingüísticas a partir de obras

    Protocol analysis modulo combination of theories: A case study in Maude-NPA

    Full text link
    There is a growing interest in formal methods and tools to analyze cryptographic protocols modulo algebraic properties of their underlying cryptographic functions. It is well-known that an intruder who uses algebraic equivalences of such functions can mount attacks that would be impossible if the cryptographic functions did not satisfy such equivalences. In practice, however, protocols use a collection of well-known functions, whose algebraic properties can naturally be grouped together as a union of theories E 1... ¿ n. Reasoning symbolically modulo the algebraic properties E 1... ¿ n requires performing (E 1... ¿ n)-unification. However, even if a unification algorithm for each individual E i is available, this requires combining the existing algorithms by methods that are highly non-deterministic and have high computational cost. In this work we present an alternative method to obtain unification algorithms for combined theories based on variant narrowing. Although variant narrowing is less efficient at the level of a single theory E i, it does not use any costly combination method. Furthermore, it does not require that each E i has a dedicated unification algorithm in a tool implementation. We illustrate the use of this method in the Maude-NPA tool by means of a well-known protocol requiring the combination of three distinct equational theories. © 2011 Springer-Verlag.R. Sasse and J. Meseguer have been partially supported by NSF Grants CNS0716638, CNS-0831064 and CNS-0904749. S. Escobar has been partially supported by the EU (FEDER) and the Spanish MEC/MICINN under grant TIN 2007-68093- C02-02. C. Meadows has been partially supported by NSF Grant CNS-0904749National Science Foundation, EEUUSasse, R.; Escobar Román, S.; Meadows, C.; Meseguer, J. (2011). Protocol analysis modulo combination of theories: A case study in Maude-NPA. En Security and Trust Management. Springer Verlag (Germany). 6710:163-178. doi:10.1007/978-3-642-22444-7_11S1631786710Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2–32 (2006)Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281–285. Springer, Heidelberg (2005)Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories: Combining decision procedures. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 50–65. Springer, Heidelberg (1992)Basin, D.A., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 253–270. Springer, Heidelberg (2003)Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 148–163. Springer, Heidelberg (2009)Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society, Los Alamitos (2001)Bursuc, S., Comon-Lundh, H.: Protocol security and algebraic properties: Decision results for a bounded number of sessions. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 133–147. Springer, Heidelberg (2009)Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: LICS, pp. 261–270. IEEE Computer Society, Los Alamitos (2003)Chevalier, Y., Rusinowitch, M.: Hierarchical combination of intruder theories. Inf. Comput. 206(2-4), 352–377 (2008)Chevalier, Y., Rusinowitch, M.: Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theor. Comput. Sci. 411(10), 1261–1282 (2010)Ciobâcă, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocols under convergent equational theories. In: Schmidt, R.A. (ed.) CADE-22. LNCS, vol. 5663, pp. 355–370. Springer, Heidelberg (2009)Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294–307. Springer, Heidelberg (2005)Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 352–363. Springer, Heidelberg (2007)Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. Theoretical Computer Science 367(1-2), 162–202 (2006)Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: Cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009 Tutorial Lectures. LNCS, vol. 5705, pp. 1–50. Springer, Heidelberg (2009)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking or disproving the finite variant property. Technical Report UIUCDCS-R-2008-2960, Department of Computer Science - University of Illinois at Urbana-Champaign (April 2008)Escobar, S., Meseguer, J., Sasse, R.: Effectively checking the finite variant property. In: Voronkov, A. (ed.) RTA 2008. LNCS, vol. 5117, pp. 79–93. Springer, Heidelberg (2008)Escobar, S., Meseguer, J., Sasse, R.: Variant narrowing and equational unification. Electr. Notes Theor. Comput. Sci. 238(3), 103–119 (2009)Escobar, S., Sasse, R., Meseguer, J.: Folding variant narrowing and optimal variant termination. In: Ölveczky, P.C. (ed.) WRLA 2010. LNCS, vol. 6381, pp. 52–68. Springer, Heidelberg (2010)Fabrega, F.J.T., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191–230 (1999)Guo, Q., Narendran, P.: Unification and matching modulo nilpotence. In: CADE-13. LNCS, vol. 1104, pp. 261–274. Springer, Heidelberg (1996)Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF RFC 2409, (November 1998)Jouannaud, J.-P., Kirchner, C., Kirchner, H.: Incremental construction of unification algorithms in equational theories. In: Díaz, J. (ed.) ICALP 1983. LNCS, vol. 154, pp. 361–373. Springer, Heidelberg (1983)Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach. In: ACM Conference on Computer and Communications Security, pp. 129–138 (2008)Küsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: CSF, pp. 157–171. IEEE Computer Society, Los Alamitos (2009)Lafourcade, P., Terrade, V., Vigier, S.: Comparison of cryptographic verification tools dealing with algebraic properties. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 173–185. Springer, Heidelberg (2010)Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147–166. Springer, Heidelberg (1996)Meadows, C.: The NRL protocol analyzer: An overview. J. Log. Program. 26(2), 113–131 (1996)Meseguer, J.: Conditional rewriting logic as a united model of concurrency. Theor. Comput. Sci. 96(1), 73–155 (1992)Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18–61. Springer, Heidelberg (1998)Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation 20(1–2), 123–160 (2007)Ohlebusch, E.: Advanced Topics in Term Rewriting. Springer, Heidelberg (2002)Santiago, S., Talcott, C.L., Escobar, S., Meadows, C., Meseguer, J.: A graphical user interface for Maude-NPA. Electr. Notes Theor. Comput. Sci. 258(1), 3–20 (2009)Schmidt-Schauß, M.: Unification in a combination of arbitrary disjoint equational theories. J. Symb. Comput. 8(1/2), 51–99 (1989)Terese (ed.): Term Rewriting Systems. Cambridge University Press, Cambridge (2003)Turuani, M.: The CL-atse protocol analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006

    Table ronde

    Get PDF
    On retiendra principalement des interventions de J. Authier-Revuz, J.-C. Chevalier, S. Delesalle, M.-L. Elalouf, É. Genevay, A. Meunier… les réflexions suivantes que nous présentons regroupées par thèmes. Il ne s’agit pas d’une simple retranscription mais d’une recontextualisation à partir des éléments recueillis à l’écoute de la bande enregistrée. 1. Le manuel scolaire en tant que tel est pris dans un réseau de contraintes. La fabrication d’un manuel de français tient de l’art de la « cuisin..

    Table ronde

    Get PDF
    On retiendra principalement des interventions de J. Authier-Revuz, J.-C. Chevalier, S. Delesalle, M.-L. Elalouf, É. Genevay, A. Meunier… les réflexions suivantes que nous présentons regroupées par thèmes. Il ne s’agit pas d’une simple retranscription mais d’une recontextualisation à partir des éléments recueillis à l’écoute de la bande enregistrée. 1. Le manuel scolaire en tant que tel est pris dans un réseau de contraintes. La fabrication d’un manuel de français tient de l’art de la « cuisin..

    Remote optical addressing of single nano-objects

    Get PDF
    We present a scheme for remotely addressing single nano-objects by means of near-field optical microscopy that makes only use of one of the most fundamental properties of electromagnetic radiation: its polarization. A medium containing optically active nano-objects is covered with a thin metallic film presenting sub-wavelength holes. When the optical tip is positioned some distance away from a hole, surface plasmons in the metal coating are generated which, by turning the polarization plane of the excitation light, transfer the excitation towards a chosen hole and induce emission from the underlying nano-objects. The method, easily applicable to other systems, is demonstrated for single quantum dots (QDs) at low temperature. It may become a valuable tool for future optical applications in the nanoworld

    Below-ground ectomycorrhizal community in natural Tuber melanosporum truffle grounds and dynamics after canopy opening

    Full text link
    [EN] The ectomycorrhizal fungus Tuber melanosporum fruits in association with Quercus in natural forests of Spain. Some of these stands are managed to keep an open canopy and meet the habitat requirements of the fungus. However, there are few quantitative studies analysing in these forests the relationship between soil environment and T. melanosporum. Eight forest stands which produce T. melanosporum have been monitored for 6 years in order to characterise the below-ground ectomycorrhizal community and to assess its temporal dynamics after experimental canopy opening. The brûlé, the ground where T. melanosporum fruits, shows a distinct ectomycorrhizal community, characterised by lower density of active ectomycorrhizal tips, lower morphotype richness per soil volume, higher abundance of T. melanosporum and lower abundance of Cenococcum geophilum than soil closest to the trunk of the host Quercus ilex. Opening the canopy has not stimulated an increase in T. melanosporum, suggesting that a shift in the soil environment alone will not trigger the formation of new truffières in the short term. The dry climate of these truffières may be a factor as T. melanosporum abundance appears to be sensitive to annual weather conditions. © 2011 Springer-Verlag.We gratefully acknowledge the support of the Conselleria de Medi Ambient (Generalitat Valenciana) and VAERSA. Comments from anonymous reviewers and editorial suggestions from Randy Molina greatly helped in improving the manuscript. The Fundacion CEAM is partly supported by Generalitat Valenciana, Fundacion Bancaja and the projects GRACCIE (Consolider-Ingenio 2010) and FEEDBACKS (Prometeo-Generalitat Valenciana).García Barreda, S.; Reyna Domenech, S. (2012). Below-ground ectomycorrhizal community in natural Tuber melanosporum truffle grounds and dynamics after canopy opening. Mycorrhiza. 22(5):361-369. doi:10.1007/s00572-011-0410-2S361369225Agerer R (1987–2002) Colour atlas of ectomycorrhizae 1st-12th del. Eihorn-Verlag, BerlinÁgueda B, Fernández-Toirán LM, De Miguel AM, Martínez-Peña F (2010) Ectomycorrhizal status of a mature productive black truffle plantation. For Syst 19:89–97Barry-Etienne D, Ricard JM, Diente S, Moundy PJ, Chandioux O, Fiorese D, Jaillard B, Serre F, Jourdan C (2008) Distribution of Tuber melanosporum mycorrhizas on rootstocks of holm-oaks (Quercus ilex) in production. 3º Congresso Internazionale di Spoleto sul Tartufo, Spoleto, ItalyBonet JA, Fischer CR, Colinas C (2001) Evolución mensual en campo de las ectomicorrizas de Tuber melanosporum Vitt. inoculadas en plantas de Quercus ilex. In: Actas del III Congreso Forestal Español. Junta de Andalucía. Available in http://www.congresoforestal.es . Accessed 3 June 2011Claus A, George E (2005) Effect of stand age on fine-root biomass and biomass distribution in three European forest chronosequences. Can J For Res 35:1617–1625. doi: 10.1139/X05-079Courty P-E, Franc A, Pierrat J-C, Garbaye J (2008) Temporal changes in the ectomycorrhizal community in two soil horizons of a temperate oak forest. Appl Environ Microbiol 74(8):5792–5801. doi: 10.1128/AEM.01592-08De Román M (2003) Las ectomicorrizas de Quercus ilex subsp. ballota y su dinámica post-incendio en una zona potencialmente trufera. Dissertation, Universidad de NavarraDeschaseaux A, Ponge J-F (2001) Changes in the composition of humus profiles near the trunk base of an oak tree (Quercus petraea (Mattus.) Liebl). Eur J Soil Biol 37:9–16. doi: 10.1016/S1164-5563(01)01064-0Dickie IA, Reich PB (2005) Ectomycorrhizal fungal communities at forest edges. J Ecol 93:244–255. doi: 10.1111/j.1365-2745.2005.00977.xGardes M, Bruns TD (1996) Community structure of ectomycorrhizal fungi in a Pinus muricata forest: above- and below-ground views. Can J Bot 74:1572–1583. doi: 10.1139/b96-190Granetti B (2005) Miglioramento e rinnovamento delle tartufaie. In: Granetti B, De Angelis A, Materozzi G (eds) Umbria terra di tartufi. Regione Umbria-Gruppo Micologico Ternano, Terni, Italy, pp 207–208Gregori G, Elisei S, Pasquini L, Sacchi A, Spezi D (2001) Rigenerazione di una vecchia tartufaia coltivata di Tuber melanosporum Vitt. In: Courvoisier M, Olivier JM, Chevalier G (eds) Actes du V Congrès International Science et Culture de la Truffe. Fédération Française des Trufficulteurs, Aix-en-Provence, pp 400–405Hagerman SM, Sakakibara SM, Durall DM (2001) The potential for woody understory plants to provide refuge for ectomycorrhizal inoculum at an interior Douglas-fir forest after clear-cut logging. Can J For Res 31:711–721. doi: 10.1139/cjfr-31-4-711Hall IR, Yun W, Amicucci A (2003) Cultivation of edible ectomycorrhizal mushrooms. Trends Biotechnol 21:433–438. doi: 10.1016/S0167-7799(03)00204-XHall IR, Brown GT, Zambonelli A (2007) Taming the truffle: the history, lore and science of the ultimate mushroom. Timber, PortlandJones MD, Durall DM, Cairney JWG (2003a) Ectomycorrhizal fungal communities in young forest stands regenerating after clearcut logging. New Phytol 157:399–422. doi: 10.1139/X09-072Jones RH, Mitchell RJ, Stevens GN, Pecot SD (2003b) Controls of fine root dynamics across a gradient of gap sizes in a pine woodland. Oecologia 134:132–143. doi: 10.1007/s00442-002-1098-yJones MD, Twieg BD, Durall DM, Berch SM (2008) Location relative to a retention patch affects the ECM fungal community more than patch size in the first season after timber harvesting on Vancouver Island, British Columbia. For Eco Manag 255:1342–1352. doi: 10.1016/j.foreco.2007.10.042Koide RT, Fernandez C, Petprakob K (2011) General principles in the community ecology of ectomycorrhizal fungi. Ann For Sci 68:45–55. doi: 10.1007/s1395-010-0006-6Lian C, Narimatsu M, Nara K, Hogetsu T (2006) Tricholoma matsutake in a natural Pinus densiflora forest: correspondence between above- and below-ground genets, in association with multiple host trees and alteration of existing ectomycorrhizal communities. New Phytol 171:825–836. doi: 10.1111/j.1469-8137.2006.01801.xLloret F, Peñuelas J, Ogaya R (2004) Establishment of co-existing Mediterranean tree species under a varying soil moisture regime. J Veg Sci 15:237–244. doi: 10.1111/j.1654-1103.2004.tb02258.xLuoma DL, Stockdale CA, Molina R, Eberhart JL (2006) The spatial influence of Pseudotsuga menziesii retention trees on ectomycorrhiza diversity. Can J For Res 36:2561–2573. doi: 10.1139/X06-143Martín-Benito D, Cherubini P, Del Río M, Cañellas I (2008) Growth response to climate and drought in Pinus nigra Arn. trees of different crown classes. Trees 22:363–373 doi: 10.1007/s00468-007-0191-6Mello A, Murat C, Bonfante P (2006) Truffles: much more than a prized and local fungal delicacy. FEMS Microbiol Lett 260:1–8. doi: 10.1111/j.1574-6968.2006.00252.xOlivier J-M, Savignac J-C, Sourzat P (2002) Truffe et trufficulture. Fanlac, Périgueux, FrancePargney JC, Chevalier G, Dupré C, Genet P, Jalade M (2001) Étude des stromas fongiques se développant sur les racines des plants mycorhizés par la truffe. In: Courvoisier M, Olivier JM, Chevalier G (eds) Actes du V Congrès International Science et Culture de la Truffe. Fédération Française des Trufficulteurs, Aix-en-Provence, France, pp 167–172Parsons WFJ, Miller SL, Knight DH (1994) Root-gap dynamics in a lodgepole pine forest: ectomycorrhizal and nonmycorrhizal fine root activity after experimental gap formation. Can J For Res 24:1531–1538. doi: 10.1139/x94-200Reyna S, Garcia S, Folch L, Pérez-Badia R, Galiana F, Rodríguez-Barreal JA, Domínguez-Núñez JA, Saiz de Omeñaca JA, Zazo J (2004) Selvicultura trufera en montes mediterráneos. In: Vallejo R, Alloza JA (eds) Avances en el estudio de la gestión del monte mediterránea. Fundación CEAM, Valencia, pp 523–546Ricard JM, Bergougnoux F, Callot R, Chevalier G, Olivier JM, Pargney JC, Sourzat P (2003) La truffe Guide technique de trufficulture. Ctifl, ParisSánchez-Durán S, De Miguel AM, Palazón C, González Armada B, Sáez R, Barriuso J (2009) Estado de micorrización de árboles truferos en función de su carácter productivo y su edad. In: Actas del 5º Congreso Forestal Español. Sociedad Española de Ciencias Forestales - Junta de Castilla y León. Available in http://www.congresoforestal.es . Accessed 3 June 2011Sourzat P, Génola L, Chaumeil F, Chédozeau N (2004) Questions d’ecologie appliquées à la trufficulture. Lycée Professionnel Agricole de Cahors-Le Montat, Le Montat, FranceSourzat P, Bouyssieres D, Brunet-Ruamps E, Chaumeil F, Dubiau J-M, Michels C, Génola L, Saenz W, Sanchez A (2008) La rénovation des anciennes plantations et la sylviculture truffière. Fédération Française des Trufficulteurs, Le Montat, FranceSplivallo R (2008) Biological significance of truffle secondary metabolites. In: Karlovsky P (ed) Secondary metabolites in soil ecology. Soil biology vol 14. Springer, BerlinTaylor AFS (2002) Fungal diversity in ectomycorrhizal communities: sampling effort and species detection. Plant Soil 244:19–28. doi: 10.1023/A:1020279815472Zavala MA (2004) Estructura, dinámica y modelos de ensamblaje del bosque mediterráneo: entre la necesidad y la contingencia. In: Valladares F (ed) Ecología del bosque mediterráneo en un mundo cambiante. Ministerio de Medio Ambiente, Madrid, pp 249–28

    Time-dependence in Relativistic Collisionless Shocks: Theory of the Variable "Wisps" in the Crab Nebula

    Full text link
    We describe results from time-dependent numerical modeling of the collisionless reverse shock terminating the pulsar wind in the Crab Nebula. We treat the upstream relativistic wind as composed of ions and electron-positron plasma embedded in a toroidal magnetic field, flowing radially outward from the pulsar in a sector around the rotational equator. The relativistic cyclotron instability of the ion gyrational orbit downstream of the leading shock in the electron-positron pairs launches outward propagating magnetosonic waves. Because of the fresh supply of ions crossing the shock, this time-dependent process achieves a limit-cycle, in which the waves are launched with periodicity on the order of the ion Larmor time. Compressions in the magnetic field and pair density associated with these waves, as well as their propagation speed, semi-quantitatively reproduce the behavior of the wisp and ring features described in recent observations obtained using the Hubble Space Telescope and the Chandra X-Ray Observatory. By selecting the parameters of the ion orbits to fit the spatial separation of the wisps, we predict the period of time variability of the wisps that is consistent with the data. When coupled with a mechanism for non-thermal acceleration of the pairs, the compressions in the magnetic field and plasma density associated with the optical wisp structure naturally account for the location of X-ray features in the Crab. We also discuss the origin of the high energy ions and their acceleration in the equatorial current sheet of the pulsar wind.Comment: 13 pages, 4 figures, accepted to ApJ. High-resolution figures and mpeg movies available at http://astron.berkeley.edu/~anatoly/wisp

    Coronal X-Ray Emission from the Stellar Companions to Transiently Accreting Black Holes

    Get PDF
    Observations of soft X-ray transients (SXTs) in quiescence have found that the binaries harboring black holes are fainter than those that contain a neutron star. Narayan and collaborators postulated that the faint X-ray emission from black hole binaries was powered by an advection dominated accretion flow (ADAF). We explore an alternative explanation for the quiescent X-ray emission from the black hole systems: coronal emission from the rapidly rotating optical companion. This is commonly observed and well studied in other tidally locked binaries, such as the RS CVns. We show that two of the three X-ray detected black hole binaries (A0620-00 and GRO J1655-40) exhibit X-ray fluxes entirely consistent with coronal emission. The X-ray spectra of these objects should be best fit with thermal Raymond-Smith models rich in lines when coronal emission predominates. One black hole system (V404 Cyg) is too X-ray bright to be explained as coronal emission. The quiescent X-ray emission from the neutron star binaries is far too bright for coronal emission. It might be that all SXT's have variable accretion rates in quiescence and that the basal quiescent X-ray flux is set by either coronal emission from the companion or -- when present -- by thermal emission from the neutron star. We also show that the lithium abundances in the black hole systems are comparable to those in the RS CVns, reducing the need for production mechanisms that involve the compact object.Comment: ApJ, accepted (v541; Oct 1, 2000); Changes to figures and tables, minor modifications to text. Uses emulateapj.sty. 14 pages, 3 figure

    Influence of the r-mode instability on hypercritically accreting neutron stars

    Get PDF
    We have investigated an influence of the r-mode instability on hypercritically accreting (M˙1My1\dot{M}\sim 1M_\odot {y}^{-1}) neutron stars in close binary systems during their common envelope phases based on the scenario proposed by Bethe et al. \shortcite{bethe-brown-lee}. On the one hand neutron stars are heated by the accreted matter at the stellar surface, but on the other hand they are also cooled down by the neutrino radiation. At the same time, the accreted matter transports its angular momentum and mass to the star. We have studied the evolution of the stellar mass, temperature and rotational frequency. The gravitational-wave-driven instability of the r-mode oscillation strongly suppresses spinning-up of the star, whose final rotational frequency is well below the mass-shedding limit, typically as small as 10% of that of the mass-shedding state. On a very short time scale the rotational frequency tends to approach a certain constant value and saturates there as far as the amount of the accreted mass does not exceed a certain limit to collapse to a black hole. This implies that the similar mechanism of gravitational radiation as the so-called Wagoner star may work in this process. The star is spun up by accretion until the angular momentum loss by gravitational radiation balances the accretion torque. The time-integrated dimensionless strain of the radiated gravitational wave may be large enough to be detectable by the gravitational wave detectors such as LIGO II.Comment: 6 pages, 3 figure
    corecore