13,573 research outputs found

    Monte Carlo simulations of bosonic reaction-diffusion systems and comparison to Langevin equation description

    Full text link
    Using the Monte Carlo simulation method for bosonic reaction-diffusion systems introduced recently [S.-C. Park, Phys. Rev. E {\bf 72}, 036111 (2005)], one dimensional bosonic models are studied and compared to the corresponding Langevin equations derived from the coherent state path integral formalism. For the single species annihilation model, the exact asymptotic form of the correlation functions is conjectured and the full equivalence of the (discrete variable) master equation and the (continuous variable) Langevin equation is confirmed numerically. We also investigate the cyclically coupled model of bosons which is related to the pair contact process with diffusion (PCPD). From the path integral formalism, Langevin equations which are expected to describe the critical behavior of the PCPD are derived and compared to the Monte Carlo simulations of the discrete model.Comment: Proceedings of the 3rd International Conference NEXT-SigmaPh

    δ\delta-exceedance records and random adaptive walks

    Full text link
    We study a modified record process where the kk'th record in a series of independent and identically distributed random variables is defined recursively through the condition Yk>Yk1δk1Y_k > Y_{k-1} - \delta_{k-1} with a deterministic sequence δk>0\delta_k > 0 called the handicap. For constant δkδ\delta_k \equiv \delta and exponentially distributed random variables it has been shown in previous work that the process displays a phase transition as a function of δ\delta between a normal phase where the mean record value increases indefinitely and a stationary phase where the mean record value remains bounded and a finite fraction of all entries are records (Park \textit{et al} 2015 {\it Phys. Rev.} E \textbf{91} 042707). Here we explore the behavior for general probability distributions and decreasing and increasing sequences δk\delta_k, focusing in particular on the case when δk\delta_k matches the typical spacing between subsequent records in the underlying simple record process without handicap. We find that a continuous phase transition occurs only in the exponential case, but a novel kind of first order transition emerges when δk\delta_k is increasing. The problem is partly motivated by the dynamics of evolutionary adaptation in biological fitness landscapes, where δk\delta_k corresponds to the change of the deterministic fitness component after kk mutational steps. The results for the record process are used to compute the mean number of steps that a population performs in such a landscape before being trapped at a local fitness maximum.Comment: minor changes. Publishe

    Integrity protection for code-on-demand mobile agents in e-commerce

    Get PDF
    The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
    corecore