2,224 research outputs found
Shot noise and conductivity at high bias in bilayer graphene: Signatures of electron-optical phonon coupling
We have studied electronic conductivity and shot noise of bilayer graphene
(BLG) sheets at high bias voltages and low bath temperature K. As a
function of bias, we find initially an increase of the differential
conductivity, which we attribute to self-heating. At higher bias, the
conductivity saturates and even decreases due to backscattering from optical
phonons. The electron-phonon interactions are also responsible for the decay of
the Fano factor at bias voltages V. The high bias electronic
temperature has been calculated from shot noise measurements, and it goes up to
K at V. Using the theoretical temperature dependence of BLG
conductivity, we extract an effective electron-optical phonon scattering time
. In a 230 nm long BLG sample of mobility
cmVs, we find that decreases with increasing
voltage and is close to the charged impurity scattering time fs
at V.Comment: 7 pages, 7 figures. Extended version of the high bias part of version
1. The low bias part is discussed in arXiv:1102.065
Reconstruction of the optical potential from scattering data
We propose a method for reconstruction of the optical potential from
scattering data. The algorithm is a two-step procedure. In the first step the
real part of the potential is determined analytically via solution of the
Marchenko equation. At this point we use a diagonal Pad\'{e} approximant of the
corresponding unitary -matrix. In the second step the imaginary part of the
potential is determined via the phase equation of the variable phase approach.
We assume that the real and the imaginary parts of the optical potential are
proportional. We use the phase equation to calculate the proportionality
coefficient. A numerical algorithm is developed for a single and for coupled
partial waves. The developed procedure is applied to analysis of
, , and data.Comment: 26 pages, 8 figures, results of nucl-th/0410092 are refined, some new
results are presente
Quantum Key Distribution with High Loss: Toward Global Secure Communication
We propose a decoy-state method to overcome the photon-number-splitting
attack for Bennett-Brassard 1984 quantum key distribution protocol in the
presence of high loss: A legitimate user intentionally and randomly replaces
signal pulses by multi-photon pulses (decoy-states). Then they check the loss
of the decoy-states. If the loss of the decoy-states is abnormally less than
that of signal pulses, the whole protocol is aborted. Otherwise, to continue
the protocol, they estimate loss of signal multi-photon pulses based on that of
decoy-states. This estimation can be done with an assumption that the two
losses have similar values, that we justify.Comment: derivation made more detailed, 4 pages, RevTe
Neurophysiology
Contains reports on three research projects.National Institutes of Health (Grant 5 RO1 NB-04985-03)Instrumentation Laboratory under the auspices of DSR Project 55-257Bioscience Division of National Aeronautics and Space Administration through Contract NSR 22-009-138Bell Telephone Laboratories, Inc. (Grant)The Teagle Foundation, Inc. (Grant)U. S. Air Force (Aerospace Medical Division) under Contract AF33(615)-388
Efficient single-photon emission from electrically driven InP quantum dots epitaxially grown on Si(001)
The heteroepitaxy of III-V semiconductors on silicon is a promising approach
for making silicon a photonic platform for on-chip optical interconnects and
quantum optical applications. Monolithic integration of both material systems
is a long-time challenge, since different material properties lead to high
defect densities in the epitaxial layers. In recent years, nanostructures
however have shown to be suitable for successfully realising light emitters on
silicon, taking advantage of their geometry. Facet edges and sidewalls can
minimise or eliminate the formation of dislocations, and due to the reduced
contact area, nanostructures are little affected by dislocation networks. Here
we demonstrate the potential of indium phosphide quantum dots as efficient
light emitters on CMOS-compatible silicon substrates, with luminescence
characteristics comparable to mature devices realised on III-V substrates. For
the first time, electrically driven single-photon emission on silicon is
presented, meeting the wavelength range of silicon avalanche photo diodes'
highest detection efficiency
Many Roads to Synchrony: Natural Time Scales and Their Algorithms
We consider two important time scales---the Markov and cryptic orders---that
monitor how an observer synchronizes to a finitary stochastic process. We show
how to compute these orders exactly and that they are most efficiently
calculated from the epsilon-machine, a process's minimal unifilar model.
Surprisingly, though the Markov order is a basic concept from stochastic
process theory, it is not a probabilistic property of a process. Rather, it is
a topological property and, moreover, it is not computable from any
finite-state model other than the epsilon-machine. Via an exhaustive survey, we
close by demonstrating that infinite Markov and infinite cryptic orders are a
dominant feature in the space of finite-memory processes. We draw out the roles
played in statistical mechanical spin systems by these two complementary length
scales.Comment: 17 pages, 16 figures:
http://cse.ucdavis.edu/~cmg/compmech/pubs/kro.htm. Santa Fe Institute Working
Paper 10-11-02
Neurophysiology
Contains reports on two research projects.Teagle Foundation, IncorporatedNational Institutes of HealthBell Telephone Laboratories, Incorporate
Universally Composable Quantum Multi-Party Computation
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for
secure composition of arbitrary protocols. We present a quantum version of the
UC model which enjoys the same compositionality guarantees. We prove that in
this model statistically secure oblivious transfer protocols can be constructed
from commitments. Furthermore, we show that every statistically classically UC
secure protocol is also statistically quantum UC secure. Such implications are
not known for other quantum security definitions. As a corollary, we get that
quantum UC secure protocols for general multi-party computation can be
constructed from commitments
Quantum Lightning Never Strikes the Same State Twice
Public key quantum money can be seen as a version of the quantum no-cloning
theorem that holds even when the quantum states can be verified by the
adversary. In this work, investigate quantum lightning, a formalization of
"collision-free quantum money" defined by Lutomirski et al. [ICS'10], where
no-cloning holds even when the adversary herself generates the quantum state to
be cloned. We then study quantum money and quantum lightning, showing the
following results:
- We demonstrate the usefulness of quantum lightning by showing several
potential applications, such as generating random strings with a proof of
entropy, to completely decentralized cryptocurrency without a block-chain,
where transactions is instant and local.
- We give win-win results for quantum money/lightning, showing that either
signatures/hash functions/commitment schemes meet very strong recently proposed
notions of security, or they yield quantum money or lightning.
- We construct quantum lightning under the assumed multi-collision resistance
of random degree-2 systems of polynomials.
- We show that instantiating the quantum money scheme of Aaronson and
Christiano [STOC'12] with indistinguishability obfuscation that is secure
against quantum computers yields a secure quantum money schem
- …