19,604 research outputs found

    A potential approach to solutions for set games

    Get PDF
    Concerning the solution theory for set games, the paper introduces a new solution by allocating, to any player, the items (taken from an universe) that are attainable for the player, but can not be blocked (by any coalition not containing the player). The resulting value turns out to be an utmost important concept for set games to characterize the family of set game solutions that possess a so-called potential representation (similar to the potential approaches applied in both physics and cooperative game theory). An axiomatization of the new value, called Driessen--Sun value, is given by three properties, namely one type of an efficiency property, the substitution property and one type of a monotonocity property

    A uniform approach to semi-marginalistic values for set games

    Get PDF
    Concerning the solution theory for set games, the paper focuses on a family of solutions, each of which allocates to any player some type of marginalistic contribution with respect to any coalition containing the player. Here the marginalistic contribution may be interpreted as an individual one, or a coalitionally one. For any value of the relevant family, an axiomatization is given by three properties, namely one type of an efficiency property, the substitution property and one type of a monotonocity property. We present two proof techniques, each of which is based on the decomposition of any arbitrary set game into a union of either simple set games or elementary set games, the solutions of which are much easier to determine. A simple respectively elementary set game is associated with an arbitrary, but fixed item of the universe respectively coalition

    Approximate Treatment of Hermitian Effective Interactions and a Bound on the Error

    Full text link
    The Hermitian effective interaction can be well-approximated by (R+R^dagger)/2 if the eigenvalues of omega^dagger omega are small or state-independent(degenerate), where R is the standard non-Hermitian effective interaction and omega maps the model-space states onto the excluded space. An error bound on this approximation is given.Comment: 13 page

    Thermopower of gapped bilayer graphene

    Full text link
    We calculate thermopower of clean and impure bilayer graphene systems. Opening a band gap through the application of an external electric field is shown to greatly enhance the thermopower of bilayer graphene, which is more than four times that of the monolayer graphene and gapless bilayer graphene at room temperature. The effect of scattering by dilute charged impurities is discussed in terms of the self-consistent Born approximation. Temperature dependence of the thermopower is also analyzed.Comment: 8 pages, 5 figures; An inconsistency in the definitions of Eq.(17) and (18) in version 1 is found and correcte

    Enhancement of singly and multiply strangeness in p-Pb and Pb-Pb collisions at 158A GeV/c

    Get PDF
    The idea that the reduction of the strange quark suppression in string fragmentation leads to the enhancement of strange particle yield in nucleus-nucleus collisions is applied to study the singly and multiply strange particle production in p-Pb and Pb-Pb collisions at 158A GeV/c. In this mechanism the strange quark suppression factor is related to the effective string tension, which increases in turn with the increase of the energy, of the centrality and of the mass of colliding system. The WA97 observation that the strange particle enhancement increases with the increasing of centrality and of strange quark content in multiply strange particles in Pb-Pb collisions with respect to p-Pb collisions was accounted reasonably.Comment: 8 pages, 3 PostScript figures, in Latex form. submitted to PR

    Gravitational Corrections to Φ4\Phi^{4} Theory with Spontaneously Broken Symmetry

    Full text link
    We consider a complex scalar Φ4\Phi^4 theory with spontaneously broken global U(1) symmetry, minimally coupling to perturbatively quantized Einstein gravity which is treated as an effective theory at the energy well below the Planck scale. Both the lowest order pure real scalar correction and the gravitational correction to the renormalization of the Higgs sector in this model have been investigated. Our results show that the gravitational correction renders the renormalization of the Higgs sector in this model inconsistent while the pure real scalar correction to it leads to a compatible renormalization.Comment: 11 pages, 24 figure

    Numerical Simulation of Magnetic Interactions in Polycrystalline YFeO3

    Full text link
    The magnetic behavior of polycrystalline yttrium orthoferrite was studied from the experimental and theoretical points of view. Magnetization measurements up to 170 kOe were carried out on a single-phase YFeO3 sample synthesized from heterobimetallic alkoxides. The complex interplay between weak-ferromagnetic and antiferromagnetic interactions, observed in the experimental M(H) curves, was successfully simulated by locally minimizing the magnetic energy of two interacting Fe sublattices. The resulting values of exchange field (H_E = 5590 kOe), anisotropy field (H_A = 0.5 kOe) and Dzyaloshinsky-Moriya antisymmetric field (H_D = 149 kOe) are in good agreement with previous reports on this system.Comment: 26 pages, 9 figure

    Key exchange with the help of a public ledger

    Full text link
    Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman or ECDH. Essentially, the MitM attack creates an inconsistency in the world views of the two honest parties, and they can detect it with the help of the ledger. Thus, there is no need for prior knowledge or trusted third parties apart from the distributed ledger. To prevent impersonation attacks, we require user interaction. It appears that, in some applications, the required user interaction is reduced in comparison to other user-assisted key-exchange protocols
    • …
    corecore