321 research outputs found
The p-adic L-functions of Evil Eisenstein Series
We compute the -adic -functions of evil Eisenstein series, showing that
they factor as products of two Kubota--Leopoldt -adic -functions times a
logarithmic term. This proves in particular a conjecture of Glenn Stevens.Comment: 49 page
Robustness of force and stress inference in an epithelial tissue
During morphogenesis, the shape of a tissue emerges from collective cellular
behaviors, which are in part regulated by mechanical and biochemical
interactions between cells. Quantification of force and stress is therefore
necessary to analyze the mechanisms controlling tissue morphogenesis. Recently,
a mechanical measurement method based on force inference from cell shapes and
connectivity has been developed. It is non-invasive, and can provide space-time
maps of force and stress within an epithelial tissue, up to prefactors. We
previously performed a comparative study of three force-inference methods,
which differ in their approach of treating indefiniteness in an inverse problem
between cell shapes and forces. In the present study, to further validate and
compare the three force inference methods, we tested their robustness by
measuring temporal fluctuation of estimated forces. Quantitative data of
cell-level dynamics in a developing tissue suggests that variation of forces
and stress will remain small within a short period of time (minutes).
Here, we showed that cell-junction tensions and global stress inferred by the
Bayesian force inference method varied less with time than those inferred by
the method that estimates only tension. In contrast, the amplitude of temporal
fluctuations of estimated cell pressures differs less between different
methods. Altogether, the present study strengthens the validity and robustness
of the Bayesian force-inference method.Comment: 4 pages, 4 figure
A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing
Cloud Computing is a computingmodel that allows ubiquitous, convenient and on-demand
access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications
and services). Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious
threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the
nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and
DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks,
and some possible detection and mitigation techniques are examined. This survey also provides
an overview of the existing defense solutions and investigates the experiments and metrics that are
usually designed and used to evaluate their performance, which is helpful for the future research in
the domain
Congruences with Eisenstein series and mu-invariants
We study the variation of mu-invariants in Hida families with residually
reducible Galois representations. We prove a lower bound for these invariants
which is often expressible in terms of the p-adic zeta function. This lower
bound forces these mu-invariants to be unbounded along the family, and
moreover, we conjecture that this lower bound is an equality. When U_p-1
generates the cuspidal Eisenstein ideal, we establish this conjecture and
further prove that the p-adic L-function is simply a power of p up to a unit
(i.e. lambda=0). On the algebraic side, we prove analogous statements for the
associated Selmer groups which, in particular, establishes the main conjecture
for such forms
Les protéines G hétérotrimériques au cours de la division asymétrique chez la drosophile
International audienc
- …