2,484 research outputs found

    Structure properties of 226{}^{226}Th and 256,258,260{}^{256,258,260}Fm fission fragments: mean field analysis with the Gogny force

    Full text link
    The constrained Hartree-Fock-Bogoliubov method is used with the Gogny interaction D1S to calculate potential energy surfaces of fissioning nuclei 226{}^{226}Th and 256,258,260{}^{256,258,260}Fm up to very large deformations. The constraints employed are the mass quadrupole and octupole moments. In this subspace of collective coordinates, many scission configurations are identified ranging from symmetric to highly asymmetric fragmentations. Corresponding fragment properties at scission are derived yielding fragment deformations, deformation energies, energy partitioning, neutron binding energies at scission, neutron multiplicities, charge polarization and total fragment kinetic energies.Comment: 15 pages, 23 figures, accepted for publication in Phys. Rev. C (2007

    Effect of Loss on Multiplexed Single-Photon Sources

    Full text link
    An on-demand single-photon source is a key requirement for scaling many optical quantum technologies. A promising approach to realize an on-demand single-photon source is to multiplex an array of heralded single-photon sources using an active optical switching network. However, the performance of multiplexed sources is degraded by photon loss in the optical components and the non-unit detection efficiency of the heralding detectors. We provide a theoretical description of a general multiplexed single-photon source with lossy components and derive expressions for the output probabilities of single-photon emission and multi-photon contamination. We apply these expressions to three specific multiplexing source architectures and consider their tradeoffs in design and performance. To assess the effect of lossy components on near- and long-term experimental goals, we simulate the multiplexed sources when used for many-photon state generation under various amounts of component loss. We find that with a multiplexed source composed of switches with ~0.2-0.4 dB loss and high efficiency number-resolving detectors, a single-photon source capable of efficiently producing 20-40 photon states with low multi-photon contamination is possible, offering the possibility of unlocking new classes of experiments and technologies.Comment: Journal versio

    GOTCHA Password Hackers!

    Full text link
    We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two key properties: (1) The puzzles are easy for the human to solve. (2) The puzzles are hard for a computer to solve even if it has the random bits used by the computer to generate the final puzzle --- unlike a CAPTCHA. Our main theorem demonstrates that GOTCHAs can be used to mitigate the threat of offline dictionary attacks against passwords by ensuring that a password cracker must receive constant feedback from a human being while mounting an attack. Finally, we provide a candidate construction of GOTCHAs based on Inkblot images. Our construction relies on the usability assumption that users can recognize the phrases that they originally used to describe each Inkblot image --- a much weaker usability assumption than previous password systems based on Inkblots which required users to recall their phrase exactly. We conduct a user study to evaluate the usability of our GOTCHA construction. We also generate a GOTCHA challenge where we encourage artificial intelligence and security researchers to try to crack several passwords protected with our scheme.Comment: 2013 ACM Workshop on Artificial Intelligence and Security (AISec

    Digital nomads: A new form of leisure class?

    Get PDF
    Digital nomadism refers to a mobile lifestyle in which freelancers, digital entrepreneurs and remote workers combine work with continuous travel. In this chapter, we draw from Veblen’s Theory of the Leisure Class (1899) to explore whether digital nomads can be seen to constitute a new form of leisure class. In particular, this entails problematising digital nomadism through four dimensions, namely differentiation, emulation, visibility and institutionalisation. Drawing from a qualitative analysis of the mainstream promotional discourse underlying digital nomadism, we show the existence of a whole set of economic activities based on selling a dreamed work/lifestyle to others. These commercial propositions, which rely on online storytelling and visibility, constitute efficient means of emulation that contribute to framing images of success. Our ‘Veblen-inspired’ analysis, we contend, generates a source of questions not only relevant to the study of digital nomadism, but also to miscellaneous aspects of the new world of work

    Bose-Einstein Condensation and Spin Mixtures of Optically Trapped Metastable Helium

    Full text link
    We report the realization of a BEC of metastable helium-4 atoms (4He*) in an all optical potential. Up to 10^5 spin polarized 4He* atoms are condensed in an optical dipole trap formed from a single, focused, vertically propagating far off-resonance laser beam. The vertical trap geometry is chosen to best match the resolution characteristics of a delay-line anode micro-channel plate detector capable of registering single He* atoms. We also confirm the instability of certain spin state combinations of 4He* to two-body inelastic processes, which necessarily affects the scope of future experiments using optically trapped spin mixtures. In order to better quantify this constraint, we measure spin state resolved two-body inelastic loss rate coefficients in the optical trap

    Revisiting Security Vulnerabilities in Commercial Password Managers

    Get PDF
    In this work we analyse five popular commercial password managers for security vulnerabilities. Our analysis is twofold. First, we compile a list of previously disclosed vulnerabilities through a comprehensive review of the academic and non-academic sources and test each password manager against all the previously disclosed vulnerabilities. We find a mixed picture of fixed and persisting vulnerabilities. Then we carry out systematic functionality tests on the considered password managers and find four new vulnerabilities. Notably, one of the new vulnerabilities we identified allows a malicious app to impersonate a legitimate app to two out of five widely-used password managers we tested and as a result steal the user's password for the targeted service. We implement a proof-of-concept attack to show the feasibility of this vulnerability in a real-life scenario. Finally, we report and reflect on our experience of responsible disclosure of the newly discovered vulnerabilities to the corresponding password manager vendors

    Lattice energy-momentum tensor with Symanzik improved actions

    Get PDF
    We define the energy-momentum tensor on lattice for the λϕ4\lambda \phi^4 and for the nonlinear σ\sigma-model Symanzik tree-improved actions, using Ward identities or an explicit matching procedure. The resulting operators give the correct one loop scale anomaly, and in the case of the sigma model they can have applications in Monte Carlo simulations.Comment: Self extracting archive fil
    • 

    corecore