525 research outputs found
Temiar Reduplication in One-Level Prosodic Morphology
Temiar reduplication is a difficult piece of prosodic morphology. This paper
presents the first computational analysis of Temiar reduplication, using the
novel finite-state approach of One-Level Prosodic Morphology originally
developed by Walther (1999b, 2000). After reviewing both the data and the basic
tenets of One-level Prosodic Morphology, the analysis is laid out in some
detail, using the notation of the FSA Utilities finite-state toolkit (van Noord
1997). One important discovery is that in this approach one can easily define a
regular expression operator which ambiguously scans a string in the left- or
rightward direction for a certain prosodic property. This yields an elegant
account of base-length-dependent triggering of reduplication as found in
Temiar.Comment: 9 pages, 2 figures. Finite-State Phonology: SIGPHON-2000, Proceedings
of the Fifth Workshop of the ACL Special Interest Group in Computational
Phonology, pp.13-21. Aug. 6, 2000. Luxembour
Tapering of fs Laser-written Waveguides
The vast development of integrated quantum photonic technology enables the
implementation of compact and stable interferometric networks. In particular
laser-written waveguide structures allow for complex 3D-circuits and
polarization-encoded qubit manipulation. However, the main limitation for the
scale-up of integrated quantum devices is the single-photon loss due to
mode-profile mismatch when coupling to standard fibers or other optical
platforms. Here we demonstrate tapered waveguide structures, realized by an
adapted femtosecond laser writing technique. We show that coupling to standard
single-mode fibers can be enhanced up to 77% while keeping the fabrication
effort negligible. This improvement provides an important step for processing
multi-photon states on chip
Ray-tracing based Inference Attacks on Physical Layer Security
In wireless network security, physical layer security provides a viable alternative to classical cryptography, which deliver high security guarantees with minimal energy expenditure. Nevertheless, these cryptograhpic primitives are based on assumptions about physical conditions which in practice may not be fulfilled.In this work we present a ray-tracing based attack, which challenges the basic assumption of uncorrelated channel properties for eavesdroppers. We realize this attack and evaluate it with real world measurement, and thereby show that such attacks can predict channel properties better than previous attacks and are also more generally applicable
- …