847 research outputs found

    Mathematics of the Quantum Zeno Effect

    Full text link
    We present an overview of the mathematics underlying the quantum Zeno effect. Classical, functional analytic results are put into perspective and compared with more recent ones. This yields some new insights into mathematical preconditions entailing the Zeno paradox, in particular a simplified proof of Misra's and Sudarshan's theorem. We empahsise the complex-analytic structures associated to the issue of existence of the Zeno dynamics. On grounds of the assembled material, we reason about possible future mathematical developments pertaining to the Zeno paradox and its counterpart, the anti-Zeno paradox, both of which seem to be close to complete characterisations.Comment: 32 pages, 1 figure, AMSLaTeX. In: Mathematical Physics Research at the Leading Edge, Charles V. Benton ed. Nova Science Publishers, Hauppauge NY, pp. 111-141, ISBN 1-59033-905-3, 2003; revision contains corrections from the published corrigenda to Reference [64

    Incentive Systems in Multi-Level Markets for Virtual Goods

    Full text link
    As an alternative to rigid DRM measures, ways of marketing virtual goods through multi-level or networked marketing have raised some interest. This report is a first approach to multi-level markets for virtual goods from the viewpoint of theoretical economy. A generic, kinematic model for the monetary flow in multi-level markets, which quantitatively describes the incentives that buyers receive through resales revenues, is devised. Building on it, the competition of goods is examined in a dynamical, utility-theoretic model enabling, in particular, a treatment of the free-rider problem. The most important implications for the design of multi-level market mechanisms for virtual goods, or multi-level incentive management systems, are outlined.Comment: 18 pages, 5 figures; graphics with reduced resolution. Full resolution available on author's homepage. Accepted contribution to the Workshop 'Virtual Goods' at the Conference AXMEDIS 2005, 30. November - 2. December, Florence, Ital

    Asymptotic Hyperfunctions, Tempered Hyperfunctions, and Asymptotic Expansions

    Get PDF
    We introduce new subclasses of Fourier hyperfunctions of mixed type, satisfying polynomial growth conditions at infinity, and develop their sheaf and duality theory. We use Fourier transformation and duality to examine relations of these 'asymptotic' and 'tempered' hyperfunctions to known classes of test functions and distributions, especially the Gelfand-Shilov-Spaces. Further it is shown that the asymptotic hyperfunctions, which decay faster than any negative power, are precisely the class that allow asymptotic expansions at infinity. These asymptotic expansions are carried over to the higher-dimensional case by applying the Radon transformation for hyperfunctions.Comment: 31 pages, 1 figure, typos corrected, references adde

    Authorised Translations of Electronic Documents

    Full text link
    A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied as an XML data structure, which attests to the correctness of the translation and the authorisation of the translator. The seal contains a digital signature binding together original and translated document, thus enabling forensic inspection and therefore legal security in the appropriation of the translation. Organisational aspects of possible implementation variants of electronic authorised translations are discussed and a realisation as a stand-alone web-service is presented.Comment: In: Peer-reviewed Proceedings of the Information Security South Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006, Sandton, South Afric

    Trustworthy content push

    Full text link
    Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry. These systems are facing security challenges regarding data transport to, and storage of the data on the end user equipment. The emerging Trusted Computing technology offers new answers to these open questions.Comment: 4 pages, 4 eps figure

    Non-Repudiation in Internet Telephony

    Full text link
    We present a concept to achieve non-repudiation for natural language conversations over the Internet. The method rests on chained electronic signatures applied to pieces of packet-based, digital, voice communication. It establishes the integrity and authenticity of the bidirectional data stream and its temporal sequence and thus the security context of a conversation. The concept is close to the protocols for Voice over the Internet (VoIP), provides a high level of inherent security, and extends naturally to multilateral non-repudiation, e.g., for conferences. Signatures over conversations can become true declarations of will in analogy to electronically signed, digital documents. This enables binding verbal contracts, in principle between unacquainted speakers, and in particular without witnesses. A reference implementation of a secure VoIP archive is exhibited.Comment: Accepted full research paper at IFIP sec2007, Sandton, South Africa, 14-16 May 200
    • …
    corecore