1,071 research outputs found
Quantum interference in deformed carbon nanotube waveguides
Quantum interference (QI) in two types of deformed carbon nanotubes (CNTs),
i.e., axially stretched and AFM tip-deformed CNTs, has been investigated by the
pi-electron only and four-orbital tight-binding (TB) method. It is found that
the rapid conductance oscillation (RCO) period is very sensitive to the applied
strains, and decreases in an inverse proportion to the deformation degree,
which could be used as a powerful experimental tool to detect precisely the
deformation degree of the deformed CNTs. Also, the sigma-pi coupling effect is
found to be negligible under axially stretched strain, while it works on the
transport properties of the tip-deformed CNTs.Comment: 14 pages and 5 figure
Linux kernel compaction through cold code swapping
There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented by most, embedded systems. However, there is still room for improvement: it has been shown that even after application of the aforementioned techniques more than 50% of the kernel code remains unexecuted under normal system operation. We introduce a new technique that reduces the Linux kernel code memory footprint, through on-demand code loading of infrequently executed code, for systems that support virtual memory. In this paper, we describe our general approach, and we study code placement algorithms to minimize the performance impact of the code loading. A code, size reduction of 68% is achieved, with a 2.2% execution speedup of the system-mode execution time, for a case study based on the MediaBench II benchmark suite
Possible origin of the 0.5 plateau in the ballistic conductance of quantum point contacts
A non-equilibrium Green function formalism (NEGF) is used to study the
conductance of a side-gated quantum point contact (QPC) in the presence of
lateral spin-orbit coupling (LSOC). A small difference of bias voltage between
the two side gates (SGs) leads to an inversion asymmetry in the LSOC between
the opposite edges of the channel. In single electron modeling of transport,
this triggers a spontaneous but insignificant spin polarization in the QPC.
However, the spin polarization of the QPC is enhanced substantially when the
effect of electron-electron interaction is included. The spin polarization is
strong enough to result in the occurrence of a conductance plateau at 0.5G0 (G0
= 2e2/h) in the absence of any external magnetic field. In our simulations of a
model QPC device, the 0.5 plateau is found to be quite robust and survives up
to a temperature of 40K. The spontaneous spin polarization and the resulting
magnetization of the QPC can be reversed by flipping the polarity of the source
to drain bias or the potential difference between the two SGs. These numerical
simulations are in good agreement with recent experimental results for
side-gated QPCs made from the low band gap semiconductor InAs
Inelastic scattering and heating in a molecular spin pump
We consider a model for a spin field-effect molecular transistor, where a
directed pure spin current is controlled by an external electric field.
Inelastic scattering effects of such molecular device are discussed within a
framework of full counting statistics for a multi-level molecular system. We
propose that the heating of the molecular junction can be controlled by
external electric and magnetic fields. Characteristic features of the model are
demonstrated by numerical calculations.Comment: 9 pages, 5 figure
A Semantics-Based Approach to Malware Detection
Malware detection is a crucial aspect of software security. Current malware detectors work by checking for signatures, which attempt to capture the syntactic characteristics of the machine-level byte sequence of the malware. This reliance on a syntactic approach makes current detectors vulnerable to code obfuscations, increasingly used by malware writers, that alter the syntactic properties of the malware byte sequence without significantly affecting their execution behavior. This paper takes the position that the key to malware identification lies in their semantics. It proposes a semantics-based framework for reasoning about malware detectors and proving properties such as soundness and completeness of these detectors. Our approach uses a trace semantics to characterize the behavior of malware as well as that of the program being checked for infection, and uses abstract interpretation to ``hide'' irrelevant aspects of these behaviors. As a concrete application of our approach, we show that (1) standard signature matching detection schemes are generally sound but not complete, (2) the semantics-aware malware detector proposed byChristodorescu et al. is complete with respect to a number of common obfuscations used by malware writers and (3) the malware detection scheme proposed by Kinder et al. and based on standard model-checking techniques is sound in general and complete on some, but not all, obfuscations handled by the semantics-aware malware detector
Verification of Java Bytecode using Analysis and Transformation of Logic Programs
State of the art analyzers in the Logic Programming (LP) paradigm are
nowadays mature and sophisticated. They allow inferring a wide variety of
global properties including termination, bounds on resource consumption, etc.
The aim of this work is to automatically transfer the power of such analysis
tools for LP to the analysis and verification of Java bytecode (JVML). In order
to achieve our goal, we rely on well-known techniques for meta-programming and
program specialization. More precisely, we propose to partially evaluate a JVML
interpreter implemented in LP together with (an LP representation of) a JVML
program and then analyze the residual program. Interestingly, at least for the
examples we have studied, our approach produces very simple LP representations
of the original JVML programs. This can be seen as a decompilation from JVML to
high-level LP source. By reasoning about such residual programs, we can
automatically prove in the CiaoPP system some non-trivial properties of JVML
programs such as termination, run-time error freeness and infer bounds on its
resource consumption. We are not aware of any other system which is able to
verify such advanced properties of Java bytecode
Ballistic electron transport in stubbed quantum waveguides: experiment and theory
We present results of experimental and theoretical investigations of electron
transport through stub-shaped waveguides or electron stub tuners (ESTs) in the
ballistic regime. Measurements of the conductance G as a function of voltages,
applied to different gates V_i (i=bottom, top, and side) of the device, show
oscillations in the region of the first quantized plateau which we attribute to
reflection resonances. The oscillations are rather regular and almost periodic
when the height h of the EST cavity is small compared to its width. When h is
increased, the oscillations become less regular and broad depressions in G
appear. A theoretical analysis, which accounts for the electrostatic potential
formed by the gates in the cavity region, and a numerical computation of the
transmission probabilities successfully explains the experimental observations.
An important finding for real devices, defined by surface Schottky gates, is
that the resonance nima result from size quantization along the transport
direction of the EST.Comment: Text 20 pages in Latex/Revtex format, 11 Postscript figures. Phys.
Rev. B,in pres
- …