20,580 research outputs found

    Euclidean analysis of the entropy functional formalism

    Full text link
    The attractor mechanism implies that the supersymmetric black hole near horizon solution is defined only in terms of the conserved charges and is therefore independent of asymptotic moduli. Starting only with the near horizon geometry, Sen's entropy functional formalism computes the entropy of an extreme black hole by means of a Legendre transformation where the electric fields are defined as conjugated variables to the electric charges. However, traditional Euclidean methods require the knowledge of the full geometry to compute the black hole thermodynamic quantities. We establish the connection between the entropy functional formalism and the standard Euclidean formalism taken at zero temperature. We find that Sen's entropy function 'f' (on-shell) matches the zero temperature limit of the Euclidean action. Moreover, Sen's near horizon angular and electric fields agree with the chemical potentials that are defined from the zero-temperature limit of the Euclidean formalism.Comment: 37 pages. v3: Footnote and Reference added. Published versio

    A system of mobile agents to model social networks

    Full text link
    We propose a model of mobile agents to construct social networks, based on a system of moving particles by keeping track of the collisions during their permanence in the system. We reproduce not only the degree distribution, clustering coefficient and shortest path length of a large data base of empirical friendship networks recently collected, but also some features related with their community structure. The model is completely characterized by the collision rate and above a critical collision rate we find the emergence of a giant cluster in the universality class of two-dimensional percolation. Moreover, we propose possible schemes to reproduce other networks of particular social contacts, namely sexual contacts.Comment: Phys. Rev. Lett. (in press

    Encrypted statistical machine learning: new privacy preserving methods

    Full text link
    We present two new statistical machine learning methods designed to learn on fully homomorphic encrypted (FHE) data. The introduction of FHE schemes following Gentry (2009) opens up the prospect of privacy preserving statistical machine learning analysis and modelling of encrypted data without compromising security constraints. We propose tailored algorithms for applying extremely random forests, involving a new cryptographic stochastic fraction estimator, and na\"{i}ve Bayes, involving a semi-parametric model for the class decision boundary, and show how they can be used to learn and predict from encrypted data. We demonstrate that these techniques perform competitively on a variety of classification data sets and provide detailed information about the computational practicalities of these and other FHE methods.Comment: 39 page

    Experience with the Open Source based implementation for ATLAS Conditions Data Management System

    Get PDF
    Conditions Data in high energy physics experiments is frequently seen as every data needed for reconstruction besides the event data itself. This includes all sorts of slowly evolving data like detector alignment, calibration and robustness, and data from detector control system. Also, every Conditions Data Object is associated with a time interval of validity and a version. Besides that, quite often is useful to tag collections of Conditions Data Objects altogether. These issues have already been investigated and a data model has been proposed and used for different implementations based in commercial DBMSs, both at CERN and for the BaBar experiment. The special case of the ATLAS complex trigger that requires online access to calibration and alignment data poses new challenges that have to be met using a flexible and customizable solution more in the line of Open Source components. Motivated by the ATLAS challenges we have developed an alternative implementation, based in an Open Source RDBMS. Several issues were investigated land will be described in this paper: -The best way to map the conditions data model into the relational database concept considering what are foreseen as the most frequent queries. -The clustering model best suited to address the scalability problem. -Extensive tests were performed and will be described. The very promising results from these tests are attracting the attention from the HEP community and driving further developments.Comment: 8 pages, 4 figures, 3 tables, conferenc
    • …
    corecore