216 research outputs found
Influence of static Jahn-Teller distortion on the magnetic excitation spectrum of PrO2: A synchrotron x-ray and neutron inelastic scattering study
A synchrotron x-ray diffraction study of the crystallographic structure of
PrO2 in the Jahn-Teller distorted phase is reported. The distortion of the
oxygen sublattice, which was previously ambiguous, is shown to be a chiral
structure in which neighbouring oxygen chains have opposite chiralities. A
temperature dependent study of the magnetic excitation spectrum, probed by
neutron inelastic scattering, is also reported. Changes in the energies and
relative intensities of the crystal field transitions provide an insight into
the interplay between the static and dynamic Jahn-Teller effects.Comment: 7 pages, 6 figure
Mean-field model of the ferromagnetic ordering in the superconducting phase of ErNi_2B_2C
A mean-field model explaining most of the details in the magnetic phase
diagram of ErNi_2B_2C is presented. The low-temperature magnetic properties are
found to be dominated by the appearance of long-period commensurate structures.
The stable structure at low temperatures and zero field is found to have a
period of 40 layers along the a direction, and upon cooling it undergoes a
first-order transition at T_C = 2.3 K to a different 40-layered structure
having a net ferromagnetic component of about 0.4 mu_B/Er. The
neutron-diffraction patterns predicted by the two 40-layered structures, above
and below T_C, are in agreement with the observations of Choi et al.Comment: 4 pages, 3 figures (Revtex4
Formal Proof of SCHUR Conjugate Function
The main goal of our work is to formally prove the correctness of the key
commands of the SCHUR software, an interactive program for calculating with
characters of Lie groups and symmetric functions. The core of the computations
relies on enumeration and manipulation of combinatorial structures. As a first
"proof of concept", we present a formal proof of the conjugate function,
written in C. This function computes the conjugate of an integer partition. To
formally prove this program, we use the Frama-C software. It allows us to
annotate C functions and to generate proof obligations, which are proved using
several automated theorem provers. In this paper, we also draw on methodology,
discussing on how to formally prove this kind of program.Comment: To appear in CALCULEMUS 201
The structure of the Au(111)/methylthiolate interface : new insights from near-edge X-ray absorption spectroscopy and X-ray standing waves
The local structure of the Au(111)([square root of]3×[square root of]3)R30°-methylthiolate surface phase has been investigated by S K-edge near-edge s-ray absorption fine structure (NEXAFS) both experimentally and theoretically and by experimental normal-incidence x-ray standing waves (NIXSW) at both the C and S atomic sites. NEXAFS shows not only excitation into the intramolecular sigma* S–C resonance but also into a sigma* S–Au orbital perpendicular to the surface, clearly identifying the local S headgroup site as atop a Au atom. Simulations show that it is not possible, however, to distinguish between the two possible adatom reconstruction models; a single thiolate species atop a hollow-site Au adatom or a dithiolate moiety comprising two thiolate species bonded to a bridge-bonded Au adatom. Within this dithiolate moiety a second sigma* S–Au orbital that lies near parallel to the surface has a higher energy that overlaps that of the sigma* S–C resonance. The new NIXSW data show the S–C bond to be tilted by 61° relative to the surface normal, with a preferred azimuthal orientation in , corresponding to the intermolecular nearest-neighbor directions. This azimuthal orientation is consistent with the thiolate being atop a hollow-site Au adatom, but not consistent with the originally proposed Au-adatom-dithiolate moiety. However, internal conformational changes within this species could, perhaps, render this model also consistent with the experimental data
Triple-q octupolar ordering in NpO_2
We report the results of resonant X-ray scattering experiments performed at
the Np M_4,5 edges in NpO_2. Below T_0 = 25 K, the development of long-range
order of Np electric quadrupoles is revealed by the growth of superlattice
Bragg peaks. The electronic transition is not accompanied by any measurable
crystallographic distortion, either internal or external, so the symmetry of
the system remains cubic. The polarization and azimuthal dependence of the
intensity of the resonant peaks is well reproduced assuming Templeton
scattering from a triple-q longitudinal antiferroquadrupolar structure.
Electric quadrupole order in NpO_2 could be driven by the ordering at T_0 of
magnetic octupoles of Gamma_5 symmetry, splitting the Np ground state quartet
and leading to a singlet ground state with zero dipole magnetic moment.Comment: 4 Pages, 3 Figures, submitted to Phys. Rev. Lett. v2: resubmitted
after referee report
Small-Angle Neutron Scattering and Magnetization Study of HoNi2B2C
The superconducting and magnetic properties of HoNi2B2C single crystals are
investigated through transport, magnetometry and small-angle neutron scattering
measurements. In the magnetic phases that enter below the superconducting
critical temperature, the small-angle neutron scattering data uncover networks
of magnetic surfaces. These likely originate from uncompensated moments e.g. at
domain walls pinned to crystallographic grain boundaries. The field and
temperature dependent behaviour appears consistent with the metamagnetic
transitions reported in earlier works.Comment: 11 pages , 4 figures, submitted to Low Temperature Physic
Predicate Abstraction for Linked Data Structures
We present Alias Refinement Types (ART), a new approach to the verification
of correctness properties of linked data structures. While there are many
techniques for checking that a heap-manipulating program adheres to its
specification, they often require that the programmer annotate the behavior of
each procedure, for example, in the form of loop invariants and pre- and
post-conditions. Predicate abstraction would be an attractive abstract domain
for performing invariant inference, existing techniques are not able to reason
about the heap with enough precision to verify functional properties of data
structure manipulating programs. In this paper, we propose a technique that
lifts predicate abstraction to the heap by factoring the analysis of data
structures into two orthogonal components: (1) Alias Types, which reason about
the physical shape of heap structures, and (2) Refinement Types, which use
simple predicates from an SMT decidable theory to capture the logical or
semantic properties of the structures. We prove ART sound by translating types
into separation logic assertions, thus translating typing derivations in ART
into separation logic proofs. We evaluate ART by implementing a tool that
performs type inference for an imperative language, and empirically show, using
a suite of data-structure benchmarks, that ART requires only 21% of the
annotations needed by other state-of-the-art verification techniques
An open extensible tool environment for Event-B
Abstract. We consider modelling indispensable for the development of complex systems. Modelling must be carried out in a formal notation to reason and make meaningful conjectures about a model. But formal modelling of complex systems is a difficult task. Even when theorem provers improve further and get more powerful, modelling will remain difficult. The reason for this that modelling is an exploratory activity that requires ingenuity in order to arrive at a meaningful model. We are aware that automated theorem provers can discharge most of the onerous trivial proof obligations that appear when modelling systems. In this article we present a modelling tool that seamlessly integrates modelling and proving similar to what is offered today in modern integrated development environments for programming. The tool is extensible and configurable so that it can be adapted more easily to different application domains and development methods.
Magnetic Phase Diagram of GdNi2B2C: Two-ion Magnetoelasticity and Anisotropic Exchange Couplings
Extensive magnetization and magnetostriction measurements were carried out on
a single crystal of GdNi2B2C along the main tetragonal axes. Within the
paramagnetic phase, the magnetic and strain susceptibilities revealed a weak
anisotropy in the exchange couplings and two-ion tetragonal-preserving
alpha-strain modes. Within the ordered phase, magnetization and
magnetostriction revealed a relatively strong orthorhombic distortion mode and
rich field-temperature phase diagrams. For H//(100) phase diagram, three
field-induced transformations were observed, namely, at: Hd(T), related to the
domain alignment; Hr(T), associated with reorientation of the moment towards
the c-axis; and Hs(T), defining the saturation process wherein the exchange
field is completely counterbalanced. On the other hand, For H//(001) phase
diagram, only two field-induced transformations were observed, namely at: Hr(T)
and Hs(T). For both phase diagrams, Hs(T) follows the relation
Hs[1-(T/Tn)^2]^(1/2)kOe with Hs(T-->0)=128.5(5) kOe and Tn(H=0)=19.5 K. In
contrast, the thermal evolution of Hr(T) along the c-axis (much simpler than
along the a-axis) follows the relation Hr[1-T/Tr]^(1/3) kOe where
Hr(T-->0)=33.5(5) kOe and Tr(H=0)=13.5 K. It is emphasized that the
magnetoelastic interaction and the anisotropic exchange coupling are important
perturbations and therefore should be explicitly considered if a complete
analysis of the magnetic properties of the borocarbides is desired
Practical realisation and elimination of an ECC-related software bug attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the entire (static) private key from an associated SSL server via adaptive queries when the NIST curve P-256 is used. One can view it as a software-oriented analogue of the bug attack concept due to Biham et al. and, consequently, as the first bug attack to be successfully applied against a real-world system. In addition to the attack and a posteriori countermeasures, we show that formal verification, while rarely used at present, is a viable means of detecting the features which the attack hinges on. Based on the security implications of the attack and the extra justification posed by the possibility of intentionally incorrect implementations in collaborative software development, we conclude that applying and extending the coverage of formal verification to augment existing test strategies for OpenSSL-like software should be deemed a worthwhile, long-term challenge.This work has been supported in part by EPSRC via grant EP/H001689/1 and by project SMART, funded by ENIAC Joint Undertaking (GA 120224)
- …