999 research outputs found

    Determination of Delta G/G from Open Charm events at COMPASS

    Full text link
    One of the main goals of the COMPASS experiment at CERN is the determination of the gluon polarisation in the nucleon, Delta G/G. It is determined from spin asymmetries in the scattering of 160 GeV/c polarised muons on a polarised LiD target. The gluon polarisation is accessed by the selection of photon-gluon fusion (PGF) events. A very clean selection of PGF events can be obtained with charmed mesons in the final state. Their detection is based on the reconstruction of D* and D0 mesons in the COMPASS spectrometer. The analysis method for the first measurement of Delta G/G from the open charm channel is described and the result from COMPASS for the 2002-2004 data taking period is presented.Comment: Talk given at the XV International Workshop on Deep-Inelastic Scattering and Related Subjects, April 16-20, 2007, Munich, Germany http://www.mppmu.mpg.de/dis200

    Metadata Federation with AMGA

    Get PDF

    On the relation between p-adic and ordinary strings

    Get PDF
    The amplitudes for the tree-level scattering of the open string tachyons, generalised to the field of p-adic numbers, define the p-adic string theory. There is empirical evidence of its relation to the ordinary string theory in the p_to_1 limit. We revisit this limit from a worldsheet perspective and argue that it is naturally thought of as a continuum limit in the sense of the renormalisation group.Comment: 13 pages harvmac (b), 2 eps figures; v2: revtex, shortened, published versio

    On rationality of the intersection points of a line with a plane quartic

    Full text link
    We study the rationality of the intersection points of certain lines and smooth plane quartics C defined over F_q. For q \geq 127, we prove the existence of a line such that the intersection points with C are all rational. Using another approach, we further prove the existence of a tangent line with the same property as soon as the characteristic of F_q is different from 2 and q \geq 66^2+1. Finally, we study the probability of the existence of a rational flex on C and exhibit a curious behavior when the characteristic of F_q is equal to 3.Comment: 17 pages. Theorem 2 now includes the characteristic 2 case; Conjecture 1 from the previous version is proved wron

    A Search for Instantons at HERA

    Get PDF
    A search for QCD instanton (I) induced events in deep-inelastic scattering (DIS) at HERA is presented in the kinematic range of low x and low Q^2. After cutting into three characteristic variables for I-induced events yielding a maximum suppression of standard DIS background to the 0.1% level while still preserving 10% of the I-induced events, 549 data events are found while 363^{+22}_{-26} (CDM) and 435^{+36}_{-22} (MEPS) standard DIS events are expected. More events than expected by the standard DIS Monte Carlo models are found in the data. However, the systematic uncertainty between the two different models is of the order of the expected signal, so that a discovery of instantons can not be claimed. An outlook is given on the prospect to search for QCD instanton events using a discriminant based on range searching in the kinematical region Q^2\gtrsim100\GeV^2 where the I-theory makes safer predictions and the QCD Monte Carlos are expected to better describe the inclusive data.Comment: Invited talk given at the Ringberg Workshop on HERA Physics on June 19th, 2001 on behalf of the H1 collaboratio

    Factorizing Numbers with the Gauss Sum Technique: NMR Implementations

    Get PDF
    Several physics-based algorithms for factorizing large number were recently published. A notable recent one by Schleich et al. uses Gauss sums for distinguishing between factors and non-factors. We demonstrate two NMR techniques that evaluate Gauss sums and thus implement their algorithm. The first one is based on differential excitation of a single spin magnetization by a cascade of RF pulses. The second method is based on spatial averaging and selective refocusing of magnetization for Gauss sums corresponding to factors. All factors of 16637 and 52882363 are successfully obtained.Comment: 4 pages, 4 figures; Abstract and Conclusion are slightly modified. References added and formatted with Bibte

    Detecting brute-force attacks on cryptocurrency wallets

    Full text link
    Blockchain is a distributed ledger, which is protected against malicious modifications by means of cryptographic tools, e.g. digital signatures and hash functions. One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin. In this work, we consider a particular attack on wallets for collecting assets in a cryptocurrency network based on brute-force search attacks. Using Bitcoin as an example, we demonstrate that if the attack is implemented successfully, a legitimate user is able to prove that fact of this attack with a high probability. We also consider two options for modification of existing cryptocurrency protocols for dealing with this type of attacks. First, we discuss a modification that requires introducing changes in the Bitcoin protocol and allows diminishing the motivation to attack wallets. Second, an alternative option is the construction of special smart-contracts, which reward the users for providing evidence of the brute-force attack. The execution of this smart-contract can work as an automatic alarm that the employed cryptographic mechanisms, and (particularly) hash functions, have an evident vulnerability.Comment: 10 pages, 2 figures; published versio

    On pattern structures of the N-soliton solution of the discrete KP equation over a finite field

    Full text link
    The existence and properties of coherent pattern in the multisoliton solutions of the dKP equation over a finite field is investigated. To that end, starting with an algebro-geometric construction over a finite field, we derive a "travelling wave" formula for NN-soliton solutions in a finite field. However, despite it having a form similar to its analogue in the complex field case, the finite field solutions produce patterns essentially different from those of classical interacting solitons.Comment: 12 pages, 3 figure

    Efficient algorithms for pairing-based cryptosystems

    Get PDF
    We describe fast new algorithms to implement recent cryptosystems based on the Tate pairing. In particular, our techniques improve pairing evaluation speed by a factor of about 55 compared to previously known methods in characteristic 3, and attain performance comparable to that of RSA in larger characteristics.We also propose faster algorithms for scalar multiplication in characteristic 3 and square root extraction over Fpm, the latter technique being also useful in contexts other than that of pairing-based cryptography
    • 

    corecore