910 research outputs found
Breakdown of staggered fermions at nonzero chemical potential
The staggered fermion determinant is complex when the quark chemical
potential mu is nonzero. Its fourth root, used in simulations with dynamical
fermions, will have phase ambiguities that become acute when Re mu is
sufficiently large. We show how to resolve these ambiguities, but our
prescription only works very close to the continuum limit. We argue that this
regime is far from current capabilities. Other procedures require being even
closer to the continuum limit, or fail altogether, because of unphysical
discontinuities in the measure. At zero temperature the breakdown is expected
when Re mu is greater than approximately half the pion mass. Estimates of the
location of the breakdown at nonzero temperature are less certain.Comment: 6 pages RevTeX, 2 figures. Returning to v5 after erroneous
replacement. Apologie
Using secret sharing for searching in encrypted data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. We present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML elements are translated to polynomials. A polynomial is split into two parts: a random polynomial for the client and the difference between the original polynomial and the client polynomial for the server. Since the client polynomials are generated by a random sequence generator only the seed has to be stored on the client. In a combined effort of both the server and the client a query can be evaluated without traversing the whole tree and without the server learning anything about the data or the query
Algebraic renormalization of supersymmetric gauge theories with dimensionful parameters
It is usually believed that there are no perturbative anomalies in
supersymmetric gauge theories beyond the well-known chiral anomaly. In this
paper we revisit this issue, because previously given arguments are incomplete.
Specifically, we rule out the existence of soft anomalies, i.e., quantum
violations of supersymmetric Ward identities proportional to a mass parameter
in a classically supersymmetric theory. We do this by combining a previously
proven theorem on the absence of hard anomalies with a spurion analysis, using
the methods of Algebraic Renormalization. We work in the on-shell component
formalism throughout. In order to deal with the nonlinearity of on-shell
supersymmetry transformations, we take the spurions to be dynamical, and show
how they nevertheless can be decoupled.Comment: Final version, typoes fixed. Revtex, 48 page
A Protocol for Generating Random Elements with their Probabilities
We give an AM protocol that allows the verifier to sample elements x from a
probability distribution P, which is held by the prover. If the prover is
honest, the verifier outputs (x, P(x)) with probability close to P(x). In case
the prover is dishonest, one may hope for the following guarantee: if the
verifier outputs (x, p), then the probability that the verifier outputs x is
close to p. Simple examples show that this cannot be achieved. Instead, we show
that the following weaker condition holds (in a well defined sense) on average:
If (x, p) is output, then p is an upper bound on the probability that x is
output. Our protocol yields a new transformation to turn interactive proofs
where the verifier uses private random coins into proofs with public coins. The
verifier has better running time compared to the well-known Goldwasser-Sipser
transformation (STOC, 1986). For constant-round protocols, we only lose an
arbitrarily small constant in soundness and completeness, while our public-coin
verifier calls the private-coin verifier only once
Inguinal Hernia and Airport Scanners: An Emerging Indication for Repair?
The use of advanced imaging technology at international airports is increasing in popularity as a corollary to heightened security concerns across the globe. Operators of airport scanners should be educated about common medical disorders such as inguinal herniae in order to avoid unnecessary harassment of travelers since they will encounter these with increasing frequency
Analysis of Different Types of Regret in Continuous Noisy Optimization
The performance measure of an algorithm is a crucial part of its analysis.
The performance can be determined by the study on the convergence rate of the
algorithm in question. It is necessary to study some (hopefully convergent)
sequence that will measure how "good" is the approximated optimum compared to
the real optimum. The concept of Regret is widely used in the bandit literature
for assessing the performance of an algorithm. The same concept is also used in
the framework of optimization algorithms, sometimes under other names or
without a specific name. And the numerical evaluation of convergence rate of
noisy algorithms often involves approximations of regrets. We discuss here two
types of approximations of Simple Regret used in practice for the evaluation of
algorithms for noisy optimization. We use specific algorithms of different
nature and the noisy sphere function to show the following results. The
approximation of Simple Regret, termed here Approximate Simple Regret, used in
some optimization testbeds, fails to estimate the Simple Regret convergence
rate. We also discuss a recent new approximation of Simple Regret, that we term
Robust Simple Regret, and show its advantages and disadvantages.Comment: Genetic and Evolutionary Computation Conference 2016, Jul 2016,
Denver, United States. 201
Software design for panoramic astronomical pipeline processing
We describe the software requirement and design specifications for all-sky
panoramic astronomical pipelines. The described software aims to meet the
specific needs of super-wide angle optics, and includes cosmic-ray hit
rejection, image compression, star recognition, sky opacity analysis, transient
detection and a web server allowing access to real-time and archived data. The
presented software is being regularly used for the pipeline processing of 11
all-sky cameras located in some of the world's premier observatories. We
encourage all-sky camera operators to use our software and/or our hosting
services and become part of the global Night Sky Live network.Comment: 1 figure. Accepted for publication in MNRA
Recommended from our members
The Central Timna Valley Project: 5 Years of Ongoing Textile Research
In its initial five years of activity the Central Timna Valley Project has dedicated its efforts to the excavation of several Late Bronze and Iron Age sites (13th-9th centuries BC) in the southern Arabah Valley of Israel (fig. 1).1 The project, headed by Erez Ben-Yosef of Tel Aviv University, explores the ancient exploitation of copper ores at Timna; these were utilised for the production of copper ingots that were traded throughout the southern Levant and possibly the greater Mediterranean region. It is within the strata of several newly excavated sites that a few hundred individual textile, cordage and rope fragments were uncovered
Gradient-Free Methods for Saddle-Point Problem
In the paper, we generalize the approach Gasnikov et. al, 2017, which allows
to solve (stochastic) convex optimization problems with an inexact
gradient-free oracle, to the convex-concave saddle-point problem. The proposed
approach works, at least, like the best existing approaches. But for a special
set-up (simplex type constraints and closeness of Lipschitz constants in 1 and
2 norms) our approach reduces times the required number of
oracle calls (function calculations). Our method uses a stochastic
approximation of the gradient via finite differences. In this case, the
function must be specified not only on the optimization set itself, but in a
certain neighbourhood of it. In the second part of the paper, we analyze the
case when such an assumption cannot be made, we propose a general approach on
how to modernize the method to solve this problem, and also we apply this
approach to particular cases of some classical sets
- …