607 research outputs found

    Vertex Operators for the Supermembrane

    Get PDF
    We derive the vertex operators that are expected to govern the emission of the massless d=11 supermultiplet from the supermembrane in the light cone gauge. We demonstrate that they form a representation of the supersymmetry algebra and reduce to the type IIA superstring vertex operators under double dimensional reduction, as well as to the vertices of the d=11 superparticle in the point-particle limit. As a byproduct, our results can be used to derive the corresponding vertex operators for matrix theory and to describe its linear coupling to an arbitrary d=11 supergravity background. Possible applications are discussed.Comment: 22 pages, LaTeX, uses axodraw.sty; v2: minor changes, version to be published in JHE

    An Introduction to the Quantum Supermembrane

    Get PDF
    We review aspects of quantisation of the 11-dimensional supermembrane world volume theory. We explicitly construct vertex operators for the massless states and study interactions of supermembranes. The open supermembrane and its vertex operators are discussed. We show how our results have direct applications to Matrix theory by appropriate regularisation of the supermembrane.Comment: 24pgs, 4 figure

    On the supersymmetric effective action of Matrix theory

    Full text link
    We present a simple derivation of the supersymmetric one-loop effective action of SU(2) Matrix theory by expressing it in a compact exponential form whose invariance under supersymmetry transformations is obvious. This result clarifies the one-loop exactness of the leading v^4 interactions and the absence of non-perturbative corrections.Comment: 6 pages, LaTeX. Minor changes, version to be published in PL

    POSTER: Privacy-preserving Indoor Localization

    Full text link
    Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose the details of the system, e.g., sophisticated classification models. We show how Secure Two-Party Computation can be used to reconcile privacy interests in a state-of-the-art localization system. Our approach provides strong privacy guarantees for all involved parties, while achieving room-level localization accuracy at reasonable overheads.Comment: Poster Session of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec'14

    A Unified Component Modeling Approach for Performance Estimation in Hardware/Software Codesign

    Get PDF
    This paper presents an approach for abstract modeling of hardware/software architectures using Hierarchical Colored Petri Nets. The approach is able to capture complex behavioral characteristics often seen in software and hardware architectures, thus it is suitable for high level codesign issues such as performance estimation. In this paper, the development of a model of the ARM7 processor [5] is described to illustrate the full potential of the modeling approach. To further illustrate the approach, a cache model is also described. The approach and related tools are currently being implemented in the LYCOS system [12]. Details and the basic characteristics of the approach can be found in [8]
    • …
    corecore