11,067 research outputs found
Light-Cone Sum Rules Analysis of Weak Decays
We analyze the weak decay of doubly-heavy baryon decays into anti-triplets
with light-cone sum rules. To calculate the decay form factors,
both bottom and charmed anti-triplets and are described
by the same set of leading twist light-cone distribution functions. With the
obtained form factors, we perform a phenomenology study on the corresponding
semi-leptonic decays. The decay widths are calculated and the branching ratios
given in this work are expected to be tested by future experimental data, which
will help us to understand the underlying dynamics in doubly-heavy baryon
decays.Comment: 19 pages, 3 figures, 7 table
SU(3) analysis of fully-light tetraquarks in heavy meson weak decays
We perform a SU(3) analysis for both semi-leptonic and non-leptonic heavy
meson weak decays into a pseudoscalar meson and a fully-light tetraquark in 10
or 27 representation. A reduction of the SU(3) representation tensor for the
fully-light tetraquarks is produced and all the flavor components for each
representation tensor are listed. The decay channels we analysis include , and , with represents
a fully-light tetraquark in 10 or 27 representation and is a pseudoscalar
meson. Finally, among these results we list all the golden decay channels which
are expected to have more possibilities to be observed in experiments.Comment: 32 pages, 5 figure
QCD Sum Rules Analysis of Weak Decays of Doubly-Heavy Baryons
We calculate the weak decay form factors of doubly-heavy baryons using
three-point QCD sum rules. The Cutkosky rules are used to derive the double
dispersion relations. We include perturbative contributions and condensation
contributions up to dimension five, and point out that the perturbative
contributions and condensates with lowest dimensions dominate. An estimate of
part of gluon-gluon condensates show that it plays a less important role. With
these form factors at hand, we present a phenomenological study of semileptonic
decays. The future experimental facilities can test these predictions, and
deepen our understanding of the dynamics in decays of doubly-heavy baryons.Comment: 30 pages, 8 figures. Version accepted in The European Physical
Journal
Anomalous dimensions for the interpolating currents of baryons
The anomalous dimensions for the interpolating currents of baryons are
indispensable inputs in a serious analysis of baryon QCD sum rules. However,
the results in the literature are vague. In view of this, in this work, we
investigate the one-loop anomalous dimensions for some interpolating currents
such as those of and proton. This work has more significance in
pedagogy.Comment: 5 pages, 1 figur
MicroTEE: Designing TEE OS Based on the Microkernel Architecture
ARM TrustZone technology is widely used to provide Trusted Execution
Environments (TEE) for mobile devices. However, most TEE OSes are implemented
as monolithic kernels. In such designs, device drivers, kernel services and
kernel modules all run in the kernel, which results in large size of the
kernel. It is difficult to guarantee that all components of the kernel have no
security vulnerabilities in the monolithic kernel architecture, such as the
integer overflow vulnerability in Qualcomm QSEE TrustZone and the TZDriver
vulnerability in HUAWEI Hisilicon TEE architecture. This paper presents
MicroTEE, a TEE OS based on the microkernel architecture. In MicroTEE, the
microkernel provides strong isolation for TEE OS's basic services, such as
crypto service and platform key management service. The kernel is only
responsible for providing core services such as address space management,
thread management, and inter-process communication. Other fundamental services,
such as crypto service and platform key management service are implemented as
applications at the user layer. Crypto Services and Key Management are used to
provide Trusted Applications (TAs) with sensitive information encryption, data
signing, and platform attestation functions. Our design avoids the compromise
of the whole TEE OS if only one kernel service is vulnerable. A monitor has
also been added to perform the switch between the secure world and the normal
world. Finally, we implemented a MicroTEE prototype on the Freescale i.MX6Q
Sabre Lite development board and tested its performance. Evaluation results
show that the performance of cryptographic operations in MicroTEE is better
than it in Linux when the size of data is small.Comment: 8 pages, 8 figure
- …