2,022 research outputs found
Weakening of the stratospheric polar vortex by Arctic sea-ice loss
Successive cold winters of severely low temperatures in recent years have had critical social and economic impacts on the mid-latitude continents in the Northern Hemisphere. Although these cold winters are thought to be partly driven by dramatic losses of Arctic sea-ice, the mechanism that links sea-ice loss to cold winters remains a subject of debate. Here, by conducting observational analyses and model experiments, we show how Arctic sea-ice loss and cold winters in extra-polar regions are dynamically connected through the polar stratosphere. We find that decreased sea-ice cover during early winter months (November-December), especially over the Barents-Kara seas, enhances the upward propagation of planetary-scale waves with wavenumbers of 1 and 2, subsequently weakening the stratospheric polar vortex in mid-winter (January-February). The weakened polar vortex preferentially induces a negative phase of Arctic Oscillation at the surface, resulting in low temperatures in mid-latitudes.open11167174Ysciescopu
Magnetic ordering at the edges of graphitic fragments: Magnetic tail interactions between the edge-localized states
To understand the formation mechanism of magnetic moments at the edges of graphitic fragments, we carry out first-principles density-functional calculations for the electronic and magnetic structures of graphitic fragments with various spin and geometric configurations. We find that interedge and interlayer interactions between the localized moments can be explained in terms of interactions between the magnetic tails of the edge-localized states. In addition, the dihydrogenated edge states as well as Fe ad-atoms at the edge are studied in regard to the magnetic order and proximity effects.open28621
CHERI: A hybrid capability-system architecture for scalable software compartmentalization
CHERI extends a conventional RISC Instruction-
Set Architecture, compiler, and operating system to support
fine-grained, capability-based memory protection to mitigate
memory-related vulnerabilities in C-language TCBs. We describe
how CHERI capabilities can also underpin a hardware-software
object-capability model for application compartmentalization
that can mitigate broader classes of attack. Prototyped as an
extension to the open-source 64-bit BERI RISC FPGA softcore
processor, FreeBSD operating system, and LLVM compiler,
we demonstrate multiple orders-of-magnitude improvement in
scalability, simplified programmability, and resulting tangible
security benefits as compared to compartmentalization based on
pure Memory-Management Unit (MMU) designs. We evaluate
incrementally deployable CHERI-based compartmentalization
using several real-world UNIX libraries and applications.We thank our colleagues Ross Anderson, Ruslan Bukin,
Gregory Chadwick, Steve Hand, Alexandre Joannou, Chris
Kitching, Wojciech Koszek, Bob Laddaga, Patrick Lincoln,
Ilias Marinos, A Theodore Markettos, Ed Maste, Andrew W.
Moore, Alan Mujumdar, Prashanth Mundkur, Colin Rothwell,
Philip Paeps, Jeunese Payne, Hassen Saidi, Howie Shrobe, and
Bjoern Zeeb, our anonymous reviewers, and shepherd Frank
Piessens, for their feedback and assistance. This work is part of
the CTSRD and MRC2 projects sponsored by the Defense Advanced
Research Projects Agency (DARPA) and the Air Force
Research Laboratory (AFRL), under contracts FA8750-10-C-
0237 and FA8750-11-C-0249. The views, opinions, and/or
findings contained in this paper are those of the authors and
should not be interpreted as representing the official views
or policies, either expressed or implied, of the Department
of Defense or the U.S. Government. We acknowledge the EPSRC
REMS Programme Grant [EP/K008528/1], Isaac Newton
Trust, UK Higher Education Innovation Fund (HEIF), Thales
E-Security, and Google, Inc.This is the author accepted manuscript. The final version is available at http://dx.doi.org/10.1109/SP.2015.
Black holes and black branes in Lifshitz spacetimes
We construct analytic solutions describing black holes and black branes in
asymptotically Lifshitz spacetimes with arbitrary dynamical exponent z and for
arbitrary number of dimensions. The model considered consists of Einstein
gravity with negative cosmological constant, a scalar, and N U(1) gauge fields
with dilatonic-like couplings. We study the phase diagrams and thermodynamic
instabilities of the solution, and find qualitative differences between the
cases with 12.Comment: 27 pages, 10 figures; v2 references added, minor comments adde
Lifshitz black holes in string theory
We provide the first black hole solutions with Lifshitz asymptotics found in
string theory. These are expected to be dual to models enjoying anisotropic
scale invariance with dynamical exponent z=2 at finite temperature. We employ a
consistent truncation of type IIB supergravity to four dimensions with an
arbitrary 5-dimensional Einstein manifold times a circle as internal geometry.
New interesting features are found that significantly differ from previous
results in phenomenological models. In particular, small black holes are shown
to be thermodynamically unstable, analogously to the usual AdS-Schwarzschild
black holes, and extremality is never reached. This signals a possible
Hawking-Page like phase transition at low temperatures.Comment: 19 pages, 7 figures. v2 references adde
Recommended from our members
Efficient tagged memory
We characterize the cache behavior of an in-memory tag table and
demonstrate that an optimized implementation can typically achieve a near-zero memory traffic overhead. Both industry and academia have repeatedly demonstrated tagged memory as a key mechanism to enable enforcement of powerful security invariants, including capabilities pointer integrity, watchpoints, and information-flow tracking. A single-bit tag shadowspace is the most commonly proposed requirement, as one bit is the minimum metadata needed to distinguish between an untyped data word and any number of new hardware-enforced types. We survey various tag shadowspace approaches and identify their common requirements and positive features of their implementations. To avoid non-standard memory widths, we identify the most practical implementation for tag storage to be an in-memory table managed next to the DRAM controller. We characterize the caching performance of such a tag table and demonstrate a DRAM traffic overhead below 5\% for the vast majority of applications. We identify spatial locality on a page scale as the primary factor that enables surprisingly high table cache-ability. We then demonstrate tag-table compression for a set of common applications. A hierarchical structure with elegantly simple optimizations reduces DRAM traffic overhead to below 1\% for most applications. These insights and optimizations pave the way for commercial applications making use of single-bit tags stored in commodity memory
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture
Capability Hardware Enhanced RISC Instructions (CHERI) supplement the conventional memory management unit (MMU) with instruction-set architecture (ISA) extensions that implement a capability system model in the address space. CHERI can also underpin a hardware-software object-capability model for scalable application compartmentalization that can mitigate broader classes of attack. This article describes ISA additions to CHERI that support fast protection-domain switching, not only in terms of low cycle count, but also efficient memory sharing with mutual distrust. The authors propose ISA support for sealed capabilities, hardware-assisted checking during protection-domain switching, a lightweight capability flow-control model, and fast register clearing, while retaining the flexibility of a software-defined protection-domain transition model. They validate this approach through a full-system experimental design, including ISA extensions, a field-programmable gate array prototype (implemented in Bluespec SystemVerilog), and a software stack including an OS (based on FreeBSD), compiler (based on LLVM), software compartmentalization model, and open-source applications.This work is part of the CTSRD and MRC2 projects sponsored by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL), under contracts FA8750-10-C-0237 and FA8750-11-C-0249. We also acknowledge the Engineering and Physical Sciences Research Council (EPSRC) REMS Programme Grant [EP/K008528/1], the EPSRC Impact Acceleration Account [EP/K503757/1], EPSRC/ARM iCASE studentship [13220009], Microsoft studentship [MRS2011-031], the Isaac Newton Trust, the UK Higher Education Innovation Fund (HEIF), Thales E-Security, and Google, Inc.This is the author accepted manuscript. The final version of the article can be found at: http://ieeexplore.ieee.org/document/7723791
Physical Passaging of Embryoid Bodies Generated from Human Pluripotent Stem Cells
Spherical three-dimensional cell aggregates called embryoid bodies (EBs), have been widely used in in vitro differentiation protocols for human pluripotent stem cells including human embryonic stem cells (hESCs) and human induced pluripotent stem cells (hiPSCs). Recent studies highlight the new devices and techniques for hEB formation and expansion, but are not involved in the passaging or subculture process. Here, we provide evidence that a simple periodic passaging markedly improved hEB culture condition and thus allowed the size-controlled, mass production of human embryoid bodies (hEBs) derived from both hESCs and hiPSCs. hEBs maintained in prolonged suspension culture without passaging (>2 weeks) showed a progressive decrease in the cell growth and proliferation and increase in the apoptosis compared to 7-day-old hEBs. However, when serially passaged in suspension, hEB cell populations were significantly increased in number while maintaining the normal rates of cell proliferation and apoptosis and the differentiation potential. Uniform-sized hEBs produced by manual passaging using a 1∶4 split ratio have been successfully maintained for over 20 continuous passages. The passaging culture method of hEBs, which is simple, readily expandable, and reproducible, could be a powerful tool for improving a robust and scalable in vitro differentiation system of human pluripotent stem cells
Holographic Lovelock Gravities and Black Holes
We study holographic implications of Lovelock gravities in AdS spacetimes.
For a generic Lovelock gravity in arbitrary spacetime dimensions we formulate
the existence condition for asymptotically AdS black holes. We consider small
fluctuations around these black holes and determine the constraint on Lovelock
parameters by demanding causality of the boundary theory. For the case of cubic
Lovelock gravity in seven spacetime dimensions we compute the holographic Weyl
anomaly and determine the three point functions of the stress energy tensor in
the boundary CFT. Remarkably, these correlators happen to satisfy the same
relation as the one imposed by supersymmetry. We then compute the energy flux;
requiring it to be positive is shown to be completely equivalent to requiring
causality of the finite temperature CFT dual to the black hole. These
constraints are not stringent enough to place any positive lower bound on the
value of viscosity. Finally, we conjecture an expression for the energy flux
valid for any Lovelock theory in arbitrary dimensions.Comment: 31 pages, 1 figure, harvmac, references added, calculation of
viscosity/entropy ratio include
Wilsonian Approach to Fluid/Gravity Duality
The problem of gravitational fluctuations confined inside a finite cutoff at
radius outside the horizon in a general class of black hole geometries
is considered. Consistent boundary conditions at both the cutoff surface and
the horizon are found and the resulting modes analyzed. For general cutoff
the dispersion relation is shown at long wavelengths to be that of a
linearized Navier-Stokes fluid living on the cutoff surface. A cutoff-dependent
line-integral formula for the diffusion constant is derived. The
dependence on is interpreted as renormalization group (RG) flow in the
fluid. Taking the cutoff to infinity in an asymptotically AdS context, the
formula for reproduces as a special case well-known results derived
using AdS/CFT. Taking the cutoff to the horizon, the effective speed of sound
goes to infinity, the fluid becomes incompressible and the Navier-Stokes
dispersion relation becomes exact. The resulting universal formula for the
diffusion constant reproduces old results from the membrane
paradigm. Hence the old membrane paradigm results and new AdS/CFT results are
related by RG flow. RG flow-invariance of the viscosity to entropy ratio is shown to follow from the first law of thermodynamics together with
isentropy of radial evolution in classical gravity. The ratio is expected to
run when quantum gravitational corrections are included.Comment: 34 pages, harvmac, clarified boundary conditio
- …