1,856 research outputs found
Is Lawfare Worth Defining - Report of the Cleveland Experts Meeting - September 11, 2010
This is the report of the Cleveland Experts Meeting
Is Lawfare Worth Defining - Report of the Cleveland Experts Meeting - September 11, 2010
This is the report of the Cleveland Experts Meeting
Mass Expansions of Screened Perturbation Theory
The thermodynamics of massless phi^4-theory is studied within screened
perturbation theory (SPT). In this method the perturbative expansion is
reorganized by adding and subtracting a mass term in the Lagrangian. We
analytically calculate the pressure and entropy to three-loop order and the
screening mass to two-loop order, expanding in powers of m/T. The truncated
m/T-expansion results are compared with numerical SPT results for the pressure,
entropy and screening mass which are accurate to all orders in m/T. It is shown
that the m/T-expansion converges quickly and provides an accurate description
of the thermodynamic functions for large values of the coupling constant.Comment: 22 pages, 10 figure
Screened Perturbation Theory to Three Loops
The thermal physics of a massless scalar field with a phi^4 interaction is
studied within screened perturbation theory (SPT). In this method the
perturbative expansion is reorganized by adding and subtracting a mass term in
the lagrangian. We consider several different mass prescriptions that
generalize the one-loop gap equation to two-loop order. We calculate the
pressure and entropy to three-loop order and the screening mass to two-loop
order. In contrast to the weak-coupling expansion, the SPT-improved
approximations appear to converge even for rather large values of the coupling
constant.Comment: 30 pages, 10 figure
Quantile forecasts of daily exchange rate returns from forecasts of realized volatility
Quantile forecasts are central to risk management decisions because of the widespread
use of Value-at-Risk. A quantile forecast is the product of two factors: the model used to
forecast volatility, and the method of computing quantiles from the volatility forecasts. In
this paper we calculate and evaluate quantile forecasts of the daily exchange rate returns
of five currencies. The forecasting models that have been used in recent analyses of the
predictability of daily realized volatility permit a comparison of the predictive power of
different measures of intraday variation and intraday returns in forecasting exchange rate
variability. The methods of computing quantile forecasts include making distributional
assumptions for future daily returns as well as using the empirical distribution of predicted
standardized returns with both rolling and recursive samples. Our main findings are that the
Heterogenous Autoregressive model provides more accurate volatility and quantile forecasts
for currencies which experience shifts in volatility, such as the Canadian dollar, and that
the use of the empirical distribution to calculate quantiles can improve forecasts when there
are shifts
The Equation of State for Dense QCD and Quark Stars
We calculate the equation of state for degenerate quark matter to leading
order in hard-dense-loop (HDL) perturbation theory. We solve the
Tolman-Oppenheimer-Volkov equations to obtain the mass-radius relation for
dense quark stars. Both the perturbative QCD and the HDL equations of state
have a large variation with respect to the renormalization scale for quark
chemical potential below 1 GeV which leads to large theoretical uncertainties
in the quark star mass-radius relation.Comment: 7 pages, 3 figure
Recommended from our members
Decentralized Authorization with Private Delegation
Authentication and authorization systems can be found in almost every software system, and consequently affects every aspect of our lives. Despite the variety in the software that relies on authorization, the authorization subsystem itself is almost universally architected following a common pattern with unfortunate characteristics.The first of these is that there usually exists a set of centralized servers that hosts the set of users and their permissions. This results in a number of security threats, such as permitting the operator of the authorization system to view or even change the permission data for all users. Secondly, these systems do not permit federation across administrative domains, as there is no safe choice of system operator: any operator would have visibility and control in all administrative domains, which is unacceptable. Thirdly, these systems do not offer transitive delegation: when a user grants permission to another user, the permissions of the recipient are not predicated upon the permissions of the granter. This makes it very difficult to reason about permissions as the complexity of the system grows, especially in the federation across domains case where no party can have absolute visibility into all permissions.Whilst several other systems, such as financial systems (e.g. blockchains) and communication systems (e.g. Signal / WhatsApp) have recently been reinvented to incorporate decentralization and privacy, there has been little attention paid to improving the authorization systems. This work aims to address that by asking the question ``How can we construct an authorization system that supports first-class transitive delegation across administrative domains without trusting a central authority or compromising on privacy?''We survey several models for authorization and find that Graph Based Authorization, where principals are vertices in a graph and delegation between principals are edges in the graph, is capable of capturing transitive delegation as a first class primitive, whilst also retaining compatibility with existing techniques such as Discretionary Access Control or Role Based Access Control. A proof of permission in the Graph Based Authorization model is represented by a path through the graph formed from the concatenation of individual edges. Whilst prior implementations of Graph Based Authorization do not meet the decentralization or privacy-preserving goals, we find that this is not intrinsic, and can be remedied by introducing two new techniques. The first is the construction of a global storage tier that cryptographically proves its integrity, and the second is an encryption technique that preserves the privacy of attestations in global storage.The horizontally-scalable storage tier is based on a new data structure, the Unequivocable Log Derived Map, which is composed of three Merkle trees. Consistency proofs over these trees allow a server to prove that objects exist or do not exist within storage, as well as proving that the storage is append-only (no previously inserted objects have been removed). Our scheme advances prior work in this field by permitting efficient auditing that scales with the number of additions to the storage rather than scaling with the total number of stored objects. By utilizing cryptographic proofs of integrity, we force storage servers to either behave honestly, or become detected as compromised. Thus, even though the architecture is centralized for availability and performance, it is does not introduce any central authorities.The design of the storage does not ensure the privacy of the permission data stored within it. We address this through the introduction of Reverse Discoverable Encryption. This technique uses the objects representing grants of permission as a key dissemination channel, thus operating without communication between participants. By using Wildcard Key Derivation Identity Based Encryption in a non-standard way (with no central Private Key Generator) we allow for permission objects to be encrypted using the authorization policy as a key. Thus, RDE permits the recipient of some permissions to decrypt other compatible permissions granted to the grantee that could be concatenated together to form a valid proof. RDE therefore protects the privacy of permission objects in storage whilst still permitting decryption of those objects by authorized parties.We construct an implementation of these techniques, named WAVE, and evaluate its performance. We find that WAVE has similar performance to the widely used OAuth system and performs better than the equally widely used LDAP system, despite offering significantly better security properties. We present an advancement to Graph Based Authorization which efficiently represents complex authorization proofs as a compact subgraph rather than a sequence of linear paths, and present a technique for efficient discovery of such proofs.To validate our techniques and ensure their efficacy in practice, we pose an additional question: ``How can we leverage WAVE to improve the security of IoT communications?'' We present a microservice architecture that abstracts the interfaces of IoT devices to permit a uniform security policy to be applied to heterogeneous devices of similar function. This is achieved by enforcing security policy at the communication bus and using hardware abstraction microservices to adapt the interfaces that devices expose on this communication bus. We construct and evaluate an instance of this communication bus, WAVEMQ and find that, with appropriate caching, its performance is comparable to that of prior publish/subscribe information busses. We discover that by enforcing WAVE's security model in the core of the network, we gain a resistance to denial of service attacks. This is particularly valuable in the IoT context where devices are typically resource constrained or connected by a bandwidth-limited link
Dynamics of Quark-Gluon-Plasma Instabilities in Discretized Hard-Loop Approximation
Non-Abelian plasma instabilities have been proposed as a possible explanation
for fast isotropization of the quark-gluon plasma produced in relativistic
heavy-ion collisions. We study the real-time evolution of these instabilities
in non-Abelian plasmas with a momentum-space anisotropy using a hard-loop
effective theory that is discretized in the velocities of hard particles. We
extend our previous results on the evolution of the most unstable modes, which
are constant in directions transverse to the direction of anisotropy, from
gauge group SU(2) to SU(3). We also present first full 3+1-dimensional
simulation results based on velocity-discretized hard loops. In contrast to the
effectively 1+1-dimensional transversely constant modes we find subexponential
behaviour at late times.Comment: 30 pages, 16 figures. v3 typos fixe
- …