321 research outputs found

    The p-adic L-functions of Evil Eisenstein Series

    Full text link
    We compute the pp-adic LL-functions of evil Eisenstein series, showing that they factor as products of two Kubota--Leopoldt pp-adic LL-functions times a logarithmic term. This proves in particular a conjecture of Glenn Stevens.Comment: 49 page

    Robustness of force and stress inference in an epithelial tissue

    Full text link
    During morphogenesis, the shape of a tissue emerges from collective cellular behaviors, which are in part regulated by mechanical and biochemical interactions between cells. Quantification of force and stress is therefore necessary to analyze the mechanisms controlling tissue morphogenesis. Recently, a mechanical measurement method based on force inference from cell shapes and connectivity has been developed. It is non-invasive, and can provide space-time maps of force and stress within an epithelial tissue, up to prefactors. We previously performed a comparative study of three force-inference methods, which differ in their approach of treating indefiniteness in an inverse problem between cell shapes and forces. In the present study, to further validate and compare the three force inference methods, we tested their robustness by measuring temporal fluctuation of estimated forces. Quantitative data of cell-level dynamics in a developing tissue suggests that variation of forces and stress will remain small within a short period of time (\simminutes). Here, we showed that cell-junction tensions and global stress inferred by the Bayesian force inference method varied less with time than those inferred by the method that estimates only tension. In contrast, the amplitude of temporal fluctuations of estimated cell pressures differs less between different methods. Altogether, the present study strengthens the validity and robustness of the Bayesian force-inference method.Comment: 4 pages, 4 figure

    A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing

    Get PDF
    Cloud Computing is a computingmodel that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services). Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain

    Congruences with Eisenstein series and mu-invariants

    Full text link
    We study the variation of mu-invariants in Hida families with residually reducible Galois representations. We prove a lower bound for these invariants which is often expressible in terms of the p-adic zeta function. This lower bound forces these mu-invariants to be unbounded along the family, and moreover, we conjecture that this lower bound is an equality. When U_p-1 generates the cuspidal Eisenstein ideal, we establish this conjecture and further prove that the p-adic L-function is simply a power of p up to a unit (i.e. lambda=0). On the algebraic side, we prove analogous statements for the associated Selmer groups which, in particular, establishes the main conjecture for such forms
    corecore