1,388 research outputs found

    Structure properties of 226{}^{226}Th and 256,258,260{}^{256,258,260}Fm fission fragments: mean field analysis with the Gogny force

    Full text link
    The constrained Hartree-Fock-Bogoliubov method is used with the Gogny interaction D1S to calculate potential energy surfaces of fissioning nuclei 226{}^{226}Th and 256,258,260{}^{256,258,260}Fm up to very large deformations. The constraints employed are the mass quadrupole and octupole moments. In this subspace of collective coordinates, many scission configurations are identified ranging from symmetric to highly asymmetric fragmentations. Corresponding fragment properties at scission are derived yielding fragment deformations, deformation energies, energy partitioning, neutron binding energies at scission, neutron multiplicities, charge polarization and total fragment kinetic energies.Comment: 15 pages, 23 figures, accepted for publication in Phys. Rev. C (2007

    Constrained Cost-Coupled Stochastic Games with Independent State Processes

    Full text link
    We consider a non-cooperative constrained stochastic games with N players with the following special structure. With each player there is an associated controlled Markov chain. The transition probabilities of the i-th Markov chain depend only on the state and actions of controller i. The information structure that we consider is such that each player knows the state of its own MDP and its own actions. It does not know the states of, and the actions taken by other players. Finally, each player wishes to minimize a time-average cost function, and has constraints over other time-avrage cost functions. Both the cost that is minimized as well as those defining the constraints depend on the state and actions of all players. We study in this paper the existence of a Nash equilirium. Examples in power control in wireless communications are given.Comment: 7 pages, submitted in september 2006 to Operations Research Letter

    Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild

    Full text link
    Risk-based authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional implicit features during password entry such as device or geolocation information, and requests additional authentication factors if a certain risk level is detected. RBA is recommended by the NIST digital identity guidelines, is used by several large online services, and offers protection against security risks such as password database leaks, credential stuffing, insecure passwords and large-scale guessing attacks. Despite its relevance, the procedures used by RBA-instrumented online services are currently not disclosed. Consequently, there is little scientific research about RBA, slowing down progress and deeper understanding, making it harder for end users to understand the security provided by the services they use and trust, and hindering the widespread adoption of RBA. In this paper, with a series of studies on eight popular online services, we (i) analyze which features and combinations/classifiers are used and are useful in practical instances, (ii) develop a framework and a methodology to measure RBA in the wild, and (iii) survey and discuss the differences in the user interface for RBA. Following this, our work provides a first deeper understanding of practical RBA deployments and helps fostering further research in this direction.Comment: 14 pages, 7 table

    On-chip quantum interference between silicon photon-pair sources

    Get PDF
    Large-scale integrated quantum photonic technologies1, 2 will require on-chip integration of identical photon sources with reconfigurable waveguide circuits. Relatively complex quantum circuits have been demonstrated already1, 2, 3, 4, 5, 6, 7, but few studies acknowledge the pressing need to integrate photon sources and waveguide circuits together on-chip8, 9. A key step towards such large-scale quantum technologies is the integration of just two individual photon sources within a waveguide circuit, and the demonstration of high-visibility quantum interference between them. Here, we report a silicon-on-insulator device that combines two four-wave mixing sources in an interferometer with a reconfigurable phase shifter. We configured the device to create and manipulate two-colour (non-degenerate) or same-colour (degenerate) path-entangled or path-unentangled photon pairs. We observed up to 100.0 ± 0.4% visibility quantum interference on-chip, and up to 95 ± 4% off-chip. Our device removes the need for external photon sources, provides a path to increasing the complexity of quantum photonic circuits and is a first step towards fully integrated quantum technologies

    Fast path and polarisation manipulation of telecom wavelength single photons in lithium niobate waveguide devices

    Get PDF
    We demonstrate fast polarisation and path control of photons at 1550 nm in lithium niobate waveguide devices using the electro-optic effect. We show heralded single photon state engineering, quantum interference, fast state preparation of two entangled photons and feedback control of quantum interference. These results point the way to a single platform that will enable the integration of nonlinear single photon sources and fast reconfigurable circuits for future photonic quantum information science and technology.Comment: 6 page

    CQG algebras: a direct algebraic approach to compact quantum groups

    Get PDF
    The purely algebraic notion of CQG algebra (algebra of functions on a compact quantum group) is defined. In a straightforward algebraic manner, the Peter-Weyl theorem for CQG algebras and the existence of a unique positive definite Haar functional on any CQG algebra are established. It is shown that a CQG algebra can be naturally completed to a CC^\ast-algebra. The relations between our approach and several other approaches to compact quantum groups are discussed.Comment: 14 pp., Plain TeX, accepted by Lett. Math. Phy

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17

    X-Ray Diffuse Scattering Study on Ionic-Pair Displacement Correlations in Relaxor Lead Magnesium Niobate

    Full text link
    Ionic-pair equal-time displacement correlations in relaxor lead magnesium niobate, Pb(Mg1/3Nb2/3)O3Pb(Mg_{1/3}Nb_{2/3})O_{3}, have been investigated at room temperature in terms of an x-ray diffuse scattering technique. Functions of the distinct correlations have been determined quantitatively. The results show the significantly strong rhombohedral-polar correlations regarding Pb-O, Mg/Nb-O, and O-O' pairs. Their spatial distribution forms an ellipse or a sphere with the radii of 30-80A˚\AA. This observation of local structure in the system proves precursory presence of the polar microregions in the paraelectric state which leads to the dielectric dispersion.Comment: 11 pages, 3 figure

    Theory of Mind and Empathy in Preclinical and Clinical Huntington's Disease

    Get PDF
    We investigated cognitive and affective Theory of Mind (ToM) and empathy in patients with premanifest and manifest Huntington\u27s disease (HD). The relation between ToM performance and executive skills was also examined. 16 preclinical and 23 clinical HD patients, and 39 healthy subjects divided in 2 control groups were given a French adaptation of the Yoni test (Shamay-Tsoory and Aharon-Peretz, 2007) that examines first and second-order cognitive and affective ToM processing in separate conditions with a physical control condition. Participants were also given questionnaires of empathy and cognitive tests which mainly assessed executive functions (inhibition and mental flexibility). Clinical HD patients made significantly more errors than their controls in the first-and second-order cognitive and affective ToM conditions of the Yoni task, but exhibited no empathy deficits. However, there was no evidence that ToM impairment was related to cognitive deficits in these patients. Preclinical HD patients were unimpaired in ToM tasks and empathy measures compared to their controls. Our results are consistent with the idea that impaired affective and cognitive mentalising emerges with the clinical manifestation of HD, but is not necessarily part of the preclinical stage. Furthermore, these impairments appear independent of executive dysfunction and empathy
    corecore