4,452 research outputs found

    Double affine Hecke algebras, conformal coinvariants and Kostka polynomials

    Get PDF
    We study a class of representations called ``calibrated representations'' of the degenerate double affine Hecke algebra and those of the rational Cherednik algebra of type GLn{\mathrm{GL}}_n. We give a realization of calibrated irreducible modules as spaces of coinvariants constructed from integrable modules over the affine Lie algebra gl^m\hat{\mathfrak{gl}}_m. Moreover, we give a character formula of these irreducible modules in terms of a level-restricted Kostka polynomials. These results were conjectured by Arakawa, Suzuki and Tsuchiya based on the conformal field theory. The proofs using recent results on the representation theory of the double affine Hecke algebras will be presented in the forthcoming papers.Comment: 8 page

    International Benefit Transfer Related to Coastal Zones: Evidence from Northeast Asia

    Get PDF
    International benefit transfer from developed countries is often used to evaluate international aid projects due to the lack of primary study in the policy country, particularly when the policy country is a developing one. Three surveys with the same protocol were carried out around the same time in a coastal city in China, Japan, and South Korea to determine which benefits can be most readily transferred and how much uncertainty accompanies transfers from one country to another. The mean transfer errors were in the range of 97 to 243%. The benefits of economic promotion seem to have more transferability than those of environmental improvement and risk reduction. The benefit transfers from the developed country (Japan) to the developing one (China) had fewer transfer errors than vice versa. These results suggest that more attention needs to be paid to the effect of environmental settings on international benefit transfer.International benefit transfer, choice experiment, coastal zone, Northeast Asia, Environmental Economics and Policy, International Relations/Trade, Q5, R5,

    Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack

    Get PDF
    The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric between two operands. The asymmetric leakage is verified with experiments on FPGA and micro-controller platforms. Moreover, we show an experimental result in which success and failure of the attack is determined by the order of operands. Therefore, designing operand order can be a cost-effective countermeasure. Meanwhile we also show a case in which a particular countermeasure becomes ineffective when the asymmetric leakage is considered. In addition to the above main contribution, an extension of the attack by Hanley et al. using the signal-processing technique of Big Mac Attack is presented
    corecore