360 research outputs found

    Field theoretic approach to the counting problem of Hamiltonian cycles of graphs

    Full text link
    A Hamiltonian cycle of a graph is a closed path that visits each site once and only once. I study a field theoretic representation for the number of Hamiltonian cycles for arbitrary graphs. By integrating out quadratic fluctuations around the saddle point, one obtains an estimate for the number which reflects characteristics of graphs well. The accuracy of the estimate is verified by applying it to 2d square lattices with various boundary conditions. This is the first example of extracting meaningful information from the quadratic approximation to the field theory representation.Comment: 5 pages, 3 figures, uses epsf.sty. Estimates for the site entropy and the gamma exponent indicated explicitl

    Some Controversial Opinions on Software-Defined Data Plane Services

    Get PDF
    Several recent proposals, namely Software Defined Networks (SDN), Network Functions Virtualization (NFV) and Network Service Chaining (NSC), aim to transform the network into a programmable platform, focusing respectively on the control plane (SDN) and on the data plane (NFV/NSC). This paper sits on the same line of the NFV/NSC proposals but with a more long-term horizon, and it presents its considerations on some controversial aspects that arise when considering the programmability of the data plane. Particularly, this paper discusses the relevance of data plane vs control plane services, the importance of the hardware platform, and the necessity to standardize northbound and southbound interfaces in future software-defined data plane service

    The effects of the pre-pulse on capillary discharge extreme ultraviolet laser

    Full text link
    In the past few years collisionally pumped extreme ultraviolet (XUV) lasers utilizing a capillary discharge were demonstrated. An intense current pulse is applied to a gas filled capillary, inducing magnetic collapse (Z-pinch) and formation of a highly ionized plasma column. Usually, a small current pulse (pre-pulse) is applied to the gas in order to pre-ionize it prior to the onset of the main current pulse. In this paper we investigate the effects of the pre-pulse on a capillary discharge Ne-like Ar XUV laser (46.9nm). The importance of the pre-pulse in achieving suitable initial conditions of the gas column and preventing instabilities during the collapse is demonstrated. Furthermore, measurements of the amplified spontaneous emission (ASE) properties (intensity, duration) in different pre-pulse currents revealed unexpected sensitivity. Increasing the pre-pulse current by a factor of two caused the ASE intensity to decrease by an order of magnitude - and to nearly disappear. This effect is accompanied by a slight increase in the lasing duration. We attribute this effect to axial flow in the gas during the pre-pulse.Comment: 4 pages, 4 figure

    The Effect of Neutral Atoms on Capillary Discharge Z-pinch

    Get PDF
    We study the effect of neutral atoms on the dynamics of a capillary discharge Z-pinch, in a regime for which a large soft-x-ray amplification has been demonstrated. We extended the commonly used one-fluid magneto-hydrodynamics (MHD) model by separating out the neutral atoms as a second fluid. Numerical calculations using this extended model yield new predictions for the dynamics of the pinch collapse, and better agreement with known measured data.Comment: 4 pages, 4 postscript figures, to be published in Phys. Rev. Let

    Offloading personal security applications to a secure and trusted network node

    Get PDF
    The current device-centric protection model against security threats has serious limitations from the final user perspective, among the other the necessity to keep each device updated with the latest security updates and the necessity to replicate all the security polices across all devices. In our model, the protection is decoupled from the users terminals and it is provided through a Trusted Virtual Domain (TVD) instantiated in future edge routers. Each TVD provides unified and homogeneous security for a single user, irrespective of the terminal employed. This paper shows a first prototype implementing this concept through a network element, called Network Edge Device, capable of running the proposed virtualized architecture and making extensive use of SDN technologies, with the aim at providing a uniform security level for the final user

    A new picture of the Lifshitz critical behavior

    Full text link
    New field theoretic renormalization group methods are developed to describe in a unified fashion the critical exponents of an m-fold Lifshitz point at the two-loop order in the anisotropic (m not equal to d) and isotropic (m=d close to 8) situations. The general theory is illustrated for the N-vector phi^4 model describing a d-dimensional system. A new regularization and renormalization procedure is presented for both types of Lifshitz behavior. The anisotropic cases are formulated with two independent renormalization group transformations. The description of the isotropic behavior requires only one type of renormalization group transformation. We point out the conceptual advantages implicit in this picture and show how this framework is related to other previous renormalization group treatments for the Lifshitz problem. The Feynman diagrams of arbitrary loop-order can be performed analytically provided these integrals are considered to be homogeneous functions of the external momenta scales. The anisotropic universality class (N,d,m) reduces easily to the Ising-like (N,d) when m=0. We show that the isotropic universality class (N,m) when m is close to 8 cannot be obtained from the anisotropic one in the limit d --> m near 8. The exponents for the uniaxial case d=3, N=m=1 are in good agreement with recent Monte Carlo simulations for the ANNNI model.Comment: 48 pages, no figures, two typos fixe
    • …
    corecore