934 research outputs found

    From modular invariants to graphs: the modular splitting method

    Full text link
    We start with a given modular invariant M of a two dimensional su(n)_k conformal field theory (CFT) and present a general method for solving the Ocneanu modular splitting equation and then determine, in a step-by-step explicit construction, 1) the generalized partition functions corresponding to the introduction of boundary conditions and defect lines; 2) the quantum symmetries of the higher ADE graph G associated to the initial modular invariant M. Notice that one does not suppose here that the graph G is already known, since it appears as a by-product of the calculations. We analyze several su(3)_k exceptional cases at levels 5 and 9.Comment: 28 pages, 7 figures. Version 2: updated references. Typos corrected. su(2) example has been removed to shorten the paper. Dual annular matrices for the rejected exceptional su(3) diagram are determine

    From conformal embeddings to quantum symmetries: an exceptional SU(4) example

    Full text link
    We briefly discuss several algebraic tools that are used to describe the quantum symmetries of Boundary Conformal Field Theories on a torus. The starting point is a fusion category, together with an action on another category described by a quantum graph. For known examples, the corresponding modular invariant partition function, which is sometimes associated with a conformal embedding, provides enough information to recover the whole structure. We illustrate these notions with the example of the conformal embedding of SU(4) at level 4 into Spin(15) at level 1, leading to the exceptional quantum graph E4(SU(4)).Comment: 22 pages, 3 color figures. Version 2: We changed the color of figures (ps files) in such a way that they are still understood when converted to gray levels. Version 3: Several references have been adde

    Orders and dimensions for sl(2) or sl(3) module categories and Boundary Conformal Field Theories on a torus

    Full text link
    After giving a short description, in terms of action of categories, of some of the structures associated with sl(2) and sl(3) boundary conformal field theories on a torus, we provide tables of dimensions describing the semisimple and co-semisimple blocks of the corresponding weak bialgebras (quantum groupoids), tables of quantum dimensions and orders, and tables describing induction - restriction. For reasons of size, the sl(3) tables of induction are only given for theories with self-fusion (existence of a monoidal structure).Comment: 25 pages, 5 tables, 9 figures. Version 2: updated references. Typos corrected. Several proofs added. Examples of ADE and generalized ADE trigonometric identities have been removed to shorten the pape

    Data-Oblivious Graph Algorithms in Outsourced External Memory

    Full text link
    Motivated by privacy preservation for outsourced data, data-oblivious external memory is a computational framework where a client performs computations on data stored at a semi-trusted server in a way that does not reveal her data to the server. This approach facilitates collaboration and reliability over traditional frameworks, and it provides privacy protection, even though the server has full access to the data and he can monitor how it is accessed by the client. The challenge is that even if data is encrypted, the server can learn information based on the client data access pattern; hence, access patterns must also be obfuscated. We investigate privacy-preserving algorithms for outsourced external memory that are based on the use of data-oblivious algorithms, that is, algorithms where each possible sequence of data accesses is independent of the data values. We give new efficient data-oblivious algorithms in the outsourced external memory model for a number of fundamental graph problems. Our results include new data-oblivious external-memory methods for constructing minimum spanning trees, performing various traversals on rooted trees, answering least common ancestor queries on trees, computing biconnected components, and forming open ear decompositions. None of our algorithms make use of constant-time random oracles.Comment: 20 page

    Space-time patterns of soil pH in submountain beech ecosystems in the West Carpathians

    Get PDF
    Abstract: Janík R., Schieber B., Bublinec E. 2014: Space-time patterns of soil pH and conductivity in submountain beech ecosystems in the West Carpathians. Beskydy, 7 (2): 81-86 The results of pH values monitoring performed for 26 years (1988-2013) in Štiavnické vrchy Mts (middle Slovakia) are summarised. The accumulative trend of acidifying components of forest soils downwards the soil depth has been confirmed. The pH values of soil, exposed to a severe airborne pollution load in the past, were in general lower: from 5.42 in the surface humus decreasin
    • …
    corecore