1,955 research outputs found

    Device-independent bounds for Hardy's experiment

    Full text link
    In this Letter we compute an analogue of Tsirelson's bound for Hardy's test of nonlocality, that is, the maximum violation of locality constraints allowed by the quantum formalism, irrespective of the dimension of the system. The value is found to be the same as the one achievable already with two-qubit systems, and we show that only a very specific class of states can lead to such maximal value, thus highlighting Hardy's test as a device-independent self-test protocol for such states. By considering realistic constraints in Hardy's test, we also compute device-independent upper bounds on this violation and show that these bounds are saturated by two-qubit systems, thus showing that there is no advantage in using higher-dimensional systems in experimental implementations of such test.Comment: 4 pages, 2 figure

    Multiple scattering and attenuation corrections in Deep Inelastic Neutron Scattering experiments

    Full text link
    Multiple scattering and attenuation corrections in Deep Inelastic Neutron Scattering experiments are analyzed. The theoretical basis is stated, and a Monte Carlo procedure to perform the calculation is presented. The results are compared with experimental data. The importance of the accuracy in the description of the experimental parameters is tested, and the implications of the present results on the data analysis procedures is examined.Comment: 19 pages, 8 figure

    Coin Tossing is Strictly Weaker Than Bit Commitment

    Full text link
    We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally secure coin tossing can be carried out by exchanges of classical information. We show also, following Mayers, Lo and Chau, that unconditionally secure bit commitment cannot be carried out by finitely many exchanges of classical or quantum information. Finally we show that, under standard cryptographic assumptions, coin tossing is strictly weaker than bit commitment. That is, no secure classical or quantum bit commitment protocol can be built from a finite number of invocations of a secure coin tossing black box together with finitely many additional information exchanges.Comment: Final version; to appear in Phys. Rev. Let

    His story/her story: A dialogue about including men and masculinities in the women’s studies curriculum

    Get PDF
    The article discusses the issue of inclusion of men and masculinities in the Women\u27s Studies curriculum. Women\u27s Studies programs were started to compensate for the male domination in the academics. Women\u27s Studies presented a platform where scholarship for women was produced and taken seriously, female students and faculty could find their say or voice, and theoretical investigations required for the advancement of the aims of the women\u27s movement could take place. If the academy as a whole does not sufficiently integrate Women\u27s Studies into the curriculum, integrating Men\u27s Studies into Women\u27s Studies might end up further marginalizing Women\u27s Studies by decreasing the number of classroom hours students spend engaging women\u27s lives and feminist scholarship. Such an integration would presents an another form of male privilege, with men manipulating their way into the only branch of scholarship that has consistently focused on women. On a ground level, feminist scholars are apprehensive that a move from a Women\u27s Studies program to a Gender Studies program will reduce the political aspect of women\u27s programs

    Deuteron Momentum Distribution in KD2HPO4

    Full text link
    The momentum distribution in KD2PO4(DKDP) has been measured using neutron Compton scattering above and below the weakly first order paraelectric-ferroelectric phase transition(T=229K). There is very litte difference between the two distributions, and no sign of the coherence over two locations for the proton observed in the paraelectric phase, as in KH2PO4(KDP). We conclude that the tunnel splitting must be much less than 20mev. The width of the distribution indicates that the effective potential for DKDP is significantly softer than that for KDP. As electronic structure calculations indicate that the stiffness of the potential increases with the size of the coherent region locally undergoing soft mode fluctuations, we conclude that there is a mass dependent quantum coherence length in both systems.Comment: 6 pages 5 figure

    Security of EPR-based Quantum Cryptography against Incoherent Symmetric Attacks

    Get PDF
    We investigate a new strategy for incoherent eavesdropping in Ekert's entanglement based quantum key distribution protocol. We show that under certain assumptions of symmetry the effectiveness of this strategy reduces to that of the original single qubit protocol of Bennett and Brassard

    Analysis of behavior of simply supported flat plates compressed beyond the buckling load into the plastic range

    Get PDF
    An analysis is presented of the postbuckling behavior of a simply supported square flat plate with straight edges compressed beyond the buckling load into the plastic range. The method of analysis involves the application of a variational principle of the deformation theory of plasticity in conjunction with computations carried out on a high-speed calculating machine. Numerical results are obtained for several plate proportions and for one material. The results indicate plate strengths greater than those that have been found experimentally on plates that do not satisfy straight-edge conditions. (author
    corecore