910 research outputs found

    Breakdown of staggered fermions at nonzero chemical potential

    Full text link
    The staggered fermion determinant is complex when the quark chemical potential mu is nonzero. Its fourth root, used in simulations with dynamical fermions, will have phase ambiguities that become acute when Re mu is sufficiently large. We show how to resolve these ambiguities, but our prescription only works very close to the continuum limit. We argue that this regime is far from current capabilities. Other procedures require being even closer to the continuum limit, or fail altogether, because of unphysical discontinuities in the measure. At zero temperature the breakdown is expected when Re mu is greater than approximately half the pion mass. Estimates of the location of the breakdown at nonzero temperature are less certain.Comment: 6 pages RevTeX, 2 figures. Returning to v5 after erroneous replacement. Apologie

    Using secret sharing for searching in encrypted data

    Get PDF
    When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. We present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML elements are translated to polynomials. A polynomial is split into two parts: a random polynomial for the client and the difference between the original polynomial and the client polynomial for the server. Since the client polynomials are generated by a random sequence generator only the seed has to be stored on the client. In a combined effort of both the server and the client a query can be evaluated without traversing the whole tree and without the server learning anything about the data or the query

    Algebraic renormalization of supersymmetric gauge theories with dimensionful parameters

    Full text link
    It is usually believed that there are no perturbative anomalies in supersymmetric gauge theories beyond the well-known chiral anomaly. In this paper we revisit this issue, because previously given arguments are incomplete. Specifically, we rule out the existence of soft anomalies, i.e., quantum violations of supersymmetric Ward identities proportional to a mass parameter in a classically supersymmetric theory. We do this by combining a previously proven theorem on the absence of hard anomalies with a spurion analysis, using the methods of Algebraic Renormalization. We work in the on-shell component formalism throughout. In order to deal with the nonlinearity of on-shell supersymmetry transformations, we take the spurions to be dynamical, and show how they nevertheless can be decoupled.Comment: Final version, typoes fixed. Revtex, 48 page

    A Protocol for Generating Random Elements with their Probabilities

    Full text link
    We give an AM protocol that allows the verifier to sample elements x from a probability distribution P, which is held by the prover. If the prover is honest, the verifier outputs (x, P(x)) with probability close to P(x). In case the prover is dishonest, one may hope for the following guarantee: if the verifier outputs (x, p), then the probability that the verifier outputs x is close to p. Simple examples show that this cannot be achieved. Instead, we show that the following weaker condition holds (in a well defined sense) on average: If (x, p) is output, then p is an upper bound on the probability that x is output. Our protocol yields a new transformation to turn interactive proofs where the verifier uses private random coins into proofs with public coins. The verifier has better running time compared to the well-known Goldwasser-Sipser transformation (STOC, 1986). For constant-round protocols, we only lose an arbitrarily small constant in soundness and completeness, while our public-coin verifier calls the private-coin verifier only once

    Inguinal Hernia and Airport Scanners: An Emerging Indication for Repair?

    Get PDF
    The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency

    Analysis of Different Types of Regret in Continuous Noisy Optimization

    Get PDF
    The performance measure of an algorithm is a crucial part of its analysis. The performance can be determined by the study on the convergence rate of the algorithm in question. It is necessary to study some (hopefully convergent) sequence that will measure how "good" is the approximated optimum compared to the real optimum. The concept of Regret is widely used in the bandit literature for assessing the performance of an algorithm. The same concept is also used in the framework of optimization algorithms, sometimes under other names or without a specific name. And the numerical evaluation of convergence rate of noisy algorithms often involves approximations of regrets. We discuss here two types of approximations of Simple Regret used in practice for the evaluation of algorithms for noisy optimization. We use specific algorithms of different nature and the noisy sphere function to show the following results. The approximation of Simple Regret, termed here Approximate Simple Regret, used in some optimization testbeds, fails to estimate the Simple Regret convergence rate. We also discuss a recent new approximation of Simple Regret, that we term Robust Simple Regret, and show its advantages and disadvantages.Comment: Genetic and Evolutionary Computation Conference 2016, Jul 2016, Denver, United States. 201

    Software design for panoramic astronomical pipeline processing

    Full text link
    We describe the software requirement and design specifications for all-sky panoramic astronomical pipelines. The described software aims to meet the specific needs of super-wide angle optics, and includes cosmic-ray hit rejection, image compression, star recognition, sky opacity analysis, transient detection and a web server allowing access to real-time and archived data. The presented software is being regularly used for the pipeline processing of 11 all-sky cameras located in some of the world's premier observatories. We encourage all-sky camera operators to use our software and/or our hosting services and become part of the global Night Sky Live network.Comment: 1 figure. Accepted for publication in MNRA

    Gradient-Free Methods for Saddle-Point Problem

    Full text link
    In the paper, we generalize the approach Gasnikov et. al, 2017, which allows to solve (stochastic) convex optimization problems with an inexact gradient-free oracle, to the convex-concave saddle-point problem. The proposed approach works, at least, like the best existing approaches. But for a special set-up (simplex type constraints and closeness of Lipschitz constants in 1 and 2 norms) our approach reduces nlogn\frac{n}{\log n} times the required number of oracle calls (function calculations). Our method uses a stochastic approximation of the gradient via finite differences. In this case, the function must be specified not only on the optimization set itself, but in a certain neighbourhood of it. In the second part of the paper, we analyze the case when such an assumption cannot be made, we propose a general approach on how to modernize the method to solve this problem, and also we apply this approach to particular cases of some classical sets
    corecore