373 research outputs found

    Compressed Representations of Conjunctive Query Results

    Full text link
    Relational queries, and in particular join queries, often generate large output results when executed over a huge dataset. In such cases, it is often infeasible to store the whole materialized output if we plan to reuse it further down a data processing pipeline. Motivated by this problem, we study the construction of space-efficient compressed representations of the output of conjunctive queries, with the goal of supporting the efficient access of the intermediate compressed result for a given access pattern. In particular, we initiate the study of an important tradeoff: minimizing the space necessary to store the compressed result, versus minimizing the answer time and delay for an access request over the result. Our main contribution is a novel parameterized data structure, which can be tuned to trade off space for answer time. The tradeoff allows us to control the space requirement of the data structure precisely, and depends both on the structure of the query and the access pattern. We show how we can use the data structure in conjunction with query decomposition techniques, in order to efficiently represent the outputs for several classes of conjunctive queries.Comment: To appear in PODS'18; 35 pages; comments welcom

    Asymptotic Dynamics in Quantum Field Theory

    Get PDF
    A crucial element of scattering theory and the LSZ reduction formula is the assumption that the coupling vanishes at large times. This is known not to hold for the theories of the Standard Model and in general such asymptotic dynamics is not well understood. We give a description of asymptotic dynamics in field theories which incorporates the important features of weak convergence and physical boundary conditions. Applications to theories with three and four point interactions are presented and the results are shown to be completely consistent with the results of perturbation theory.Comment: 18 pages, 3 figure

    QCD sum rules in the effective heavy quark theory

    Get PDF
    We derive sum rules for the leptonic decay constant of a heavy-light meson in the effective heavy quark theory. We show that the summation of logarithms in the heavy quark mass by the renormalization group technique enhances considerably radiative corrections. Our result for the decay constant in the static limit agrees well with recent lattice calculations. Finite quark mass corrections are estimated

    Image Encryption Based on Diffusion and Multiple Chaotic Maps

    Full text link
    In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption technique using multiple chaotic based circular mapping. In this paper, first, a pair of sub keys is given by using chaotic logistic maps. Second, the image is encrypted using logistic map sub key and in its transformation leads to diffusion process. Third, sub keys are generated by four different chaotic maps. Based on the initial conditions, each map may produce various random numbers from various orbits of the maps. Among those random numbers, a particular number and from a particular orbit are selected as a key for the encryption algorithm. Based on the key, a binary sequence is generated to control the encryption algorithm. The input image of 2-D is transformed into a 1- D array by using two different scanning pattern (raster and Zigzag) and then divided into various sub blocks. Then the position permutation and value permutation is applied to each binary matrix based on multiple chaos maps. Finally the receiver uses the same sub keys to decrypt the encrypted images. The salient features of the proposed image encryption method are loss-less, good peak signal-to-noise ratio (PSNR), Symmetric key encryption, less cross correlation, very large number of secret keys, and key-dependent pixel value replacement.Comment: 14 pages,9 figures and 5 tables; http://airccse.org/journal/jnsa11_current.html, 201

    Collective vs local measurements in qubit mixed state estimation

    Get PDF
    We discuss the problem of estimating a general (mixed) qubit state. We give the optimal guess that can be inferred from any given set of measurements. For collective measurements and for a large number NN of copies, we show that the error in the estimation goes as 1/N. For local measurements we focus on the simpler case of states lying on the equatorial plane of the Bloch sphere. We show that standard tomographic techniques lead to an error proportional to 1/N1/41/N^{1/4}, while with our optimal data processing it is proportional to 1/N3/41/N^{3/4}.Comment: 4 pages, 1 figure, minor style changes, refs. adde

    Infra-Red Finite Charge Propagation

    Get PDF
    The Coulomb gauge has a long history and many uses. It is especially useful in bound state applications. An important feature of this gauge is that the matter fields have an infra-red finite propagator in an on-shell renormalisation scheme. This is, however, only the case if the renormalisation point is chosen to be the static point on the mass shell, p = (m, 0, 0, 0). In this letter we show how to extend this key property of the Coulomb gauge to an arbitrary relativistic renormalisation point. This is achieved through the introduction of a new class of gauges of which the Coulomb gauge is a limiting case. A physical explanation for this result is given.Comment: 8 pages, plain TeX, to appear in Modern Physics Letters

    Interquark Potential in Schrodinger Representation

    Get PDF
    Static charges are introduced in Yang-Mills theory via coupling to heavy fermions. The states containing static color charges are constructed using integration over gauge transformations. A functional representation for interquark potential is obtained. This representation provides a simple criterion for confinement.Comment: 9pp., Late
    • …
    corecore