1,071 research outputs found

    Quantum interference in deformed carbon nanotube waveguides

    Full text link
    Quantum interference (QI) in two types of deformed carbon nanotubes (CNTs), i.e., axially stretched and AFM tip-deformed CNTs, has been investigated by the pi-electron only and four-orbital tight-binding (TB) method. It is found that the rapid conductance oscillation (RCO) period is very sensitive to the applied strains, and decreases in an inverse proportion to the deformation degree, which could be used as a powerful experimental tool to detect precisely the deformation degree of the deformed CNTs. Also, the sigma-pi coupling effect is found to be negligible under axially stretched strain, while it works on the transport properties of the tip-deformed CNTs.Comment: 14 pages and 5 figure

    Linux kernel compaction through cold code swapping

    Get PDF
    There is a growing trend to use general-purpose operating systems like Linux in embedded systems. Previous research focused on using compaction and specialization techniques to adapt a general-purpose OS to the memory-constrained environment, presented by most, embedded systems. However, there is still room for improvement: it has been shown that even after application of the aforementioned techniques more than 50% of the kernel code remains unexecuted under normal system operation. We introduce a new technique that reduces the Linux kernel code memory footprint, through on-demand code loading of infrequently executed code, for systems that support virtual memory. In this paper, we describe our general approach, and we study code placement algorithms to minimize the performance impact of the code loading. A code, size reduction of 68% is achieved, with a 2.2% execution speedup of the system-mode execution time, for a case study based on the MediaBench II benchmark suite

    Revolution in the Revolution?

    Get PDF

    Possible origin of the 0.5 plateau in the ballistic conductance of quantum point contacts

    Full text link
    A non-equilibrium Green function formalism (NEGF) is used to study the conductance of a side-gated quantum point contact (QPC) in the presence of lateral spin-orbit coupling (LSOC). A small difference of bias voltage between the two side gates (SGs) leads to an inversion asymmetry in the LSOC between the opposite edges of the channel. In single electron modeling of transport, this triggers a spontaneous but insignificant spin polarization in the QPC. However, the spin polarization of the QPC is enhanced substantially when the effect of electron-electron interaction is included. The spin polarization is strong enough to result in the occurrence of a conductance plateau at 0.5G0 (G0 = 2e2/h) in the absence of any external magnetic field. In our simulations of a model QPC device, the 0.5 plateau is found to be quite robust and survives up to a temperature of 40K. The spontaneous spin polarization and the resulting magnetization of the QPC can be reversed by flipping the polarity of the source to drain bias or the potential difference between the two SGs. These numerical simulations are in good agreement with recent experimental results for side-gated QPCs made from the low band gap semiconductor InAs

    Inelastic scattering and heating in a molecular spin pump

    Full text link
    We consider a model for a spin field-effect molecular transistor, where a directed pure spin current is controlled by an external electric field. Inelastic scattering effects of such molecular device are discussed within a framework of full counting statistics for a multi-level molecular system. We propose that the heating of the molecular junction can be controlled by external electric and magnetic fields. Characteristic features of the model are demonstrated by numerical calculations.Comment: 9 pages, 5 figure

    A Semantics-Based Approach to Malware Detection

    Get PDF
    Malware detection is a crucial aspect of software security. Current malware detectors work by checking for signatures, which attempt to capture the syntactic characteristics of the machine-level byte sequence of the malware. This reliance on a syntactic approach makes current detectors vulnerable to code obfuscations, increasingly used by malware writers, that alter the syntactic properties of the malware byte sequence without significantly affecting their execution behavior. This paper takes the position that the key to malware identification lies in their semantics. It proposes a semantics-based framework for reasoning about malware detectors and proving properties such as soundness and completeness of these detectors. Our approach uses a trace semantics to characterize the behavior of malware as well as that of the program being checked for infection, and uses abstract interpretation to ``hide'' irrelevant aspects of these behaviors. As a concrete application of our approach, we show that (1) standard signature matching detection schemes are generally sound but not complete, (2) the semantics-aware malware detector proposed byChristodorescu et al. is complete with respect to a number of common obfuscations used by malware writers and (3) the malware detection scheme proposed by Kinder et al. and based on standard model-checking techniques is sound in general and complete on some, but not all, obfuscations handled by the semantics-aware malware detector

    Verification of Java Bytecode using Analysis and Transformation of Logic Programs

    Full text link
    State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including termination, bounds on resource consumption, etc. The aim of this work is to automatically transfer the power of such analysis tools for LP to the analysis and verification of Java bytecode (JVML). In order to achieve our goal, we rely on well-known techniques for meta-programming and program specialization. More precisely, we propose to partially evaluate a JVML interpreter implemented in LP together with (an LP representation of) a JVML program and then analyze the residual program. Interestingly, at least for the examples we have studied, our approach produces very simple LP representations of the original JVML programs. This can be seen as a decompilation from JVML to high-level LP source. By reasoning about such residual programs, we can automatically prove in the CiaoPP system some non-trivial properties of JVML programs such as termination, run-time error freeness and infer bounds on its resource consumption. We are not aware of any other system which is able to verify such advanced properties of Java bytecode

    Ballistic electron transport in stubbed quantum waveguides: experiment and theory

    Full text link
    We present results of experimental and theoretical investigations of electron transport through stub-shaped waveguides or electron stub tuners (ESTs) in the ballistic regime. Measurements of the conductance G as a function of voltages, applied to different gates V_i (i=bottom, top, and side) of the device, show oscillations in the region of the first quantized plateau which we attribute to reflection resonances. The oscillations are rather regular and almost periodic when the height h of the EST cavity is small compared to its width. When h is increased, the oscillations become less regular and broad depressions in G appear. A theoretical analysis, which accounts for the electrostatic potential formed by the gates in the cavity region, and a numerical computation of the transmission probabilities successfully explains the experimental observations. An important finding for real devices, defined by surface Schottky gates, is that the resonance nima result from size quantization along the transport direction of the EST.Comment: Text 20 pages in Latex/Revtex format, 11 Postscript figures. Phys. Rev. B,in pres
    corecore