114,747 research outputs found

    Hyperbolic ends with particles and grafting on singular surfaces

    Get PDF
    We prove that any 3-dimensional hyperbolic end with particles (cone singularities along infinite curves of anglesless than \pi) admits a unique foliation by constant Gauss curvature surfaces. Using a form of duality between hyperbolic ends with particles and convex globally hyperbolic maximal (GHM) de Sitter spacetime with particles, it follows that any convex GHM de Sitter spacetime with particles also admits a unique foliation by constant Gauss curvature surfaces. We prove that the grafting map from the product of Teichmüller space with the space of measured laminations to the space of complex projective structures is a homeomorphism for surfaces with cone singularities of angles less than \pi, as well as an analogue when grafting is replaced by “smooth grafting”

    Chiral geometry and rotational structure for 130^{130}Cs in the projected shell model

    Get PDF
    The projected shell model with configuration mixing for nuclear chirality is developed and applied to the observed rotational bands in the chiral nucleus 130^{130}Cs. For the chiral bands, the energy spectra and electromagnetic transition probabilities are well reproduced. The chiral geometry illustrated in the K plotK~plot and the azithumal plotazithumal~plot is confirmed to be stable against the configuration mixing. The other rotational bands are also described in the same framework

    The role of qqˉq\bar q components in the N(1440) resonance

    Full text link
    The role of 5-quark components in the pion and electromagnetic decays and transition form factors of the N(1440) is explored. The qqqqqˉqqqq\bar q components, where the 4-quark subsystem has the flavor-spin symmetries [4]FS[22]F[22]S[4]_{FS}[22]_F[22]_S and [4]FS[31]F[31]S[4]_{FS}[31]_F[31]_S, which are expected to have the lowest energy of all qqqqqˉqqqq\bar q configurations, are considered in detail with a nonrelativistic quark model. The matrix elements between the 5-quark components of the N(1440) and the nucleon, qqqqqˉqqqqqˉqqqq\bar q\to qqqq\bar q, play a minor role in these decays, while the transition matrix elements qqqqqˉqqqqqqq\bar q\to qqq and qqqqqqqqˉqqq\to qqqq\bar q that involve quark antiquark annihilation are very significant. Both for the electromagnetic and strong decay the change from the valence quark model value is dominated by the confinement triggered qqˉq\bar q annihilation transitions. In the case of pion decay the calculated decay width is enhanced substantially both by the direct qqˉπq\bar q \to \pi and also by the confinement triggered qqˉπq\bar q\to \pi transitions. Agreement with the empirical value for the pion decay width may be reached with a \sim 30% qqqqqˉqqqq\bar q component in the N(1440).Comment: 23 pages revte

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory
    corecore