42,098 research outputs found
Charm-strange baryon strong decays in a chiral quark model
The strong decays of charm-strange baryons up to N=2 shell are studied in a
chiral quark model. The theoretical predictions for the well determined
charm-strange baryons, , and , are in
good agreement with the experimental data. This model is also extended to
analyze the strong decays of the other newly observed charm-strange baryons
, , , and .
Our predictions are given as follows. (i) might be the first
-wave excitation of with , favors the $|\Xi_c'\
^2P_\lambda 1/2^->|\Xi_c'\ ^4P_\lambda 1/2^->\Xi_c(2980)P|\Xi_c'\ ^2P_\rho 1/2^->|\Xi_c'\ ^2P_\rho 3/2^->\Xi_c(2980)\Lambda_c^+\bar{K}\pi|\Xi_c'\ ^2P_\rho
1/2^->m\simeq 2.97\Xi_c^*(2645)\pi|\Xi_c'\ ^2P_\rho 3/2^->\Xi_c(3080)|\Xi_c\ S_{\rho\rho} 1/2^+>\Xi_c\Xi_c(3055)D\Xi_cJ^P=3/2^+|\Xi_c\
^2D_{\lambda\lambda} 3/2^+>\Xi_c(3123)|\Xi_c'\ ^4D_{\lambda\lambda} 3/2^+>|\Xi_c'\ ^4D_{\lambda\lambda} 5/2^+>|\Xi_c\ ^2D_{\rho\rho} 5/2^+>\Sigma_b^{\pm}\Sigma_b^{*\pm}\Xi_b^*$, which are in good agreement with the recent observations as well.Comment: 15 pages, 9 figure
EASYFLOW: Keep Ethereum Away From Overflow
While Ethereum smart contracts enabled a wide range of blockchain
applications, they are extremely vulnerable to different forms of security
attacks. Due to the fact that transactions to smart contracts commonly involve
cryptocurrency transfer, any successful attacks can lead to money loss or even
financial disorder. In this paper, we focus on the overflow attacks in Ethereum
, mainly because they widely rooted in many smart contracts and comparatively
easy to exploit. We have developed EASYFLOW , an overflow detector at Ethereum
Virtual Machine level. The key insight behind EASYFLOW is a taint analysis
based tracking technique to analyze the propagation of involved taints.
Specifically, EASYFLOW can not only divide smart contracts into safe contracts,
manifested overflows, well-protected overflows and potential overflows, but
also automatically generate transactions to trigger potential overflows. In our
preliminary evaluation, EASYFLOW managed to find potentially vulnerable
Ethereum contracts with little runtime overhead.Comment: Proceedings of the 41st International Conference on Software
Engineering: Companion Proceedings. IEEE Press, 201
- β¦