2,105 research outputs found
Extreme Supernova Models for the Superluminous Transient ASASSN-15lh
The recent discovery of the unprecedentedly superluminous transient
ASASSN-15lh (or SN 2015L) with its UV-bright secondary peak challenges all the
power-input models that have been proposed for superluminous supernovae. Here
we examine some of the few viable interpretations of ASASSN-15lh in the context
of a stellar explosion, involving combinations of one or more power inputs. We
model the lightcurve of ASASSN-15lh with a hybrid model that includes
contributions from magnetar spin-down energy and hydrogen-poor circumstellar
interaction. We also investigate models of pure circumstellar interaction with
a massive hydrogen-deficient shell and discuss the lack of interaction features
in the observed spectra. We find that, as a supernova ASASSN-15lh can be best
modeled by the energetic core-collapse of a ~40 Msun star interacting with a
hydrogen-poor shell of ~20 Msun. The circumstellar shell and progenitor mass
are consistent with a rapidly rotating pulsational pair-instability supernova
progenitor as required for strong interaction following the final supernova
explosion. Additional energy injection by a magnetar with initial period of 1-2
ms and magnetic field of 0.1-1 x 10^14 G may supply the excess luminosity
required to overcome the deficit in single-component models, but this requires
more fine-tuning and extreme parameters for the magnetar, as well as the
assumption of efficient conversion of magnetar energy into radiation. We thus
favor a single-input model where the reverse shock formed in a strong SN
ejecta-CSM interaction following a very powerful core-collapse SN explosion can
supply the luminosity needed to reproduce the late-time UV-bright plateau.Comment: 8 pages, 3 figure
A Rational Approach to Cryptographic Protocols
This work initiates an analysis of several cryptographic protocols from a
rational point of view using a game-theoretical approach, which allows us to
represent not only the protocols but also possible misbehaviours of parties.
Concretely, several concepts of two-person games and of two-party cryptographic
protocols are here combined in order to model the latters as the formers. One
of the main advantages of analysing a cryptographic protocol in the game-theory
setting is the possibility of describing improved and stronger cryptographic
solutions because possible adversarial behaviours may be taken into account
directly. With those tools, protocols can be studied in a malicious model in
order to find equilibrium conditions that make possible to protect honest
parties against all possible strategies of adversaries
Concurrent bandits and cognitive radio networks
We consider the problem of multiple users targeting the arms of a single
multi-armed stochastic bandit. The motivation for this problem comes from
cognitive radio networks, where selfish users need to coexist without any side
communication between them, implicit cooperation or common control. Even the
number of users may be unknown and can vary as users join or leave the network.
We propose an algorithm that combines an -greedy learning rule with a
collision avoidance mechanism. We analyze its regret with respect to the
system-wide optimum and show that sub-linear regret can be obtained in this
setting. Experiments show dramatic improvement compared to other algorithms for
this setting
Impact of the capping layers on lateral confinement in InAs/InP quantum dots for 1.55 um laser applications srudied by magneto-photoluminescence.
We have used magnetophotoluminescence to study the impact of different capping layer material combinations (InP, GaInAsP quaternary alloy, or both InP and quaternary alloy) on lateral confinement in InAs/InP quantum dots (QDs) grown on (311)B orientated substrates. Exciton effective masses, Bohr radii, and binding energies are measured for these samples. Conclusions regarding the strength of the lateral confinement in the different samples are supported by photoluminescence at high excitation power. Contrary to theoretical predictions, InAs QDs in quaternary alloy are found to have better confinement properties than InAs/InP QDs. This is attributed to a lack of lateral intermixing with the quaternary alloy, which is present when InP is used to (partially) cap the dots. The implications of the results for reducing the temperature sensitivity of QD lasers are discussed. ©2005 American Institute of Physic
Pseudorandomness for Regular Branching Programs via Fourier Analysis
We present an explicit pseudorandom generator for oblivious, read-once,
permutation branching programs of constant width that can read their input bits
in any order. The seed length is , where is the length of the
branching program. The previous best seed length known for this model was
, which follows as a special case of a generator due to
Impagliazzo, Meka, and Zuckerman (FOCS 2012) (which gives a seed length of
for arbitrary branching programs of size ). Our techniques
also give seed length for general oblivious, read-once branching
programs of width , which is incomparable to the results of
Impagliazzo et al.Our pseudorandom generator is similar to the one used by
Gopalan et al. (FOCS 2012) for read-once CNFs, but the analysis is quite
different; ours is based on Fourier analysis of branching programs. In
particular, we show that an oblivious, read-once, regular branching program of
width has Fourier mass at most at level , independent of the
length of the program.Comment: RANDOM 201
- âŠ