1,945 research outputs found
Lattices of oscillator groups
This paper is concerned with discrete, uniform subgroups (lattices) of
oscillator groups, which are certain semidirect products of the Heisenberg
group and the additive group of real numbers. The present paper rectifies the
uncertainties in [1] of Medina and Revoy and gives a complete classification of
the lattices of the 4-dimensional oscillator group up to isomorphism.
[1] Medina, A.; Revoy, P. Les groups oscillateurs et leurs reseaux
Manuscripta Mathematica, 1985, 52, 81-9
Vincia for Hadron Colliders
We present the first public implementation of antenna-based QCD initial- and
final-state showers. The shower kernels are antenna functions, which
capture not only the collinear dynamics but also the leading soft (coherent)
singularities of QCD matrix elements. We define the evolution measure to be
inversely proportional to the leading poles, hence gluon emissions are evolved
in a measure inversely proportional to the eikonal, while processes
that only contain a single pole (e.g., ) are evolved in
virtuality. Non-ordered emissions are allowed, suppressed by an additional
power of . Recoils and kinematics are governed by exact on-shell phase-space factorisations. This first implementation is limited to massless
QCD partons and colourless resonances. Tree-level matrix-element corrections
are included for QCD up to (4 jets), and for
Drell-Yan and Higgs production up to ( + 3
jets). The resulting algorithm has been made publicly available in Vincia 2.0
Resilience of Virtualized Embedded IoT Networks
Embedded IoT networks are the backbone of safetycritical systems like smart factories, autonomous vehicles, and airplanes. Therefore, their resilience against failures and attacks should be a prior concern. The design of more capable IoT devices enables the flexible deployment of network services by virtualization but it also increases the complexity of the systems and makes them more error-prone. In this paper, we discuss the issues and challenges to ensure resilience in virtualized embedded IoT networks by presenting proactive and reactive measures
Scan Correlation -- Revealing distributed scan campaigns
Public networks are exposed to port scans from the Internet. Attackers search
for vulnerable services they can exploit. In large scan campaigns, attackers
often utilize different machines to perform distributed scans, which impedes
their detection and might also camouflage the actual goal of the scanning
campaign. In this paper, we present a correlation algorithm to detect scans,
identify potential relations among them, and reassemble them to larger
campaigns. We evaluate our approach on real-world Internet traffic and our
results indicate that it can summarize and characterize standalone and
distributed scan campaigns based on their tools and intention.Comment: Accepted for publication at DISSECT '2
- …