2,004 research outputs found

    Complex Gaussian multiplicative chaos

    Full text link
    In this article, we study complex Gaussian multiplicative chaos. More precisely, we study the renormalization theory and the limit of the exponential of a complex log-correlated Gaussian field in all dimensions (including Gaussian Free Fields in dimension 2). Our main working assumption is that the real part and the imaginary part are independent. We also discuss applications in 2D string theory; in particular we give a rigorous mathematical definition of the so-called Tachyon fields, the conformally invariant operators in critical Liouville Quantum Gravity with a c=1 central charge, and derive the original KPZ formula for these fields.Comment: 66 pages, 5 figures, contains open problems and application in 2 dimensional string theory. The new version contains the KPZ formula for the Tachyon fields and further discussions about application

    Semiclassical limit of Liouville Field Theory

    Full text link
    Liouville Field Theory (LFT for short) is a two dimensional model of random surfaces, which is for instance involved in 2d2d string theory or in the description of the fluctuations of metrics in 2d2d Liouville quantum gravity. This is a probabilistic model that consists in weighting the classical Free Field action with an interaction term given by the exponential of a Gaussian multiplicative chaos. The main input of our work is the study of the semiclassical limit of the theory, which is a prescribed asymptotic regime of LFT of interest in physics literature (see \cite{witten} and references therein). We derive exact formulas for the Laplace transform of the Liouville field in the case of flat metric on the unit disk with Dirichlet boundary conditions. As a consequence, we prove that the Liouville field concentrates on the solution of the classical Liouville equation with explicit negative scalar curvature. We also characterize the leading fluctuations, which are Gaussian and massive, and establish a large deviation principle. Though considered as an ansatz in the whole physics literature, it seems that it is the first rigorous probabilistic derivation of the semiclassical limit of LFT. On the other hand, we carry out the same analysis when we further weight the Liouville action with heavy matter operators. This procedure appears when computing the nn-points correlation functions of LFT.Comment: 42 pages; 3 figures; Typos correcte

    Trace Equivalence Decision: Negative Tests and Non-determinism

    Get PDF
    We consider security properties of cryptographic protocols that can be modeled using the notion of trace equivalence. The notion of equivalence is crucial when specifying privacy-type properties, like anonymity, vote-privacy, and unlinkability. In this paper, we give a calculus that is close to the applied pi calculus and that allows one to capture most existing protocols that rely on classical cryptographic primitives. First, we propose a symbolic semantics for our calculus relying on constraint systems to represent infinite sets of possible traces, and we reduce the decidability of trace equivalence to deciding a notion of symbolic equivalence between sets of constraint systems. Second, we develop an algorithm allowing us to decide whether two sets of constraint systems are in symbolic equivalence or not. Altogether, this yields the first decidability result of trace equivalence for a general class of processes that may involve else branches and/or private channels (for a bounded number of sessions)

    The physics and metaphysics of primitive stuff

    Get PDF
    The paper sets out a primitive ontology of the natural world in terms of primitive stuff, that is, stuff that has as such no physical properties at all, but that is not a bare substratum either, being individuated by metrical relations. We focus on quantum physics and employ identity-based Bohmian mechanics to illustrate this view, but point out that it applies all over physics. Properties then enter into the picture exclusively through the role that they play for the dynamics of the primitive stuff. We show that such properties can be local (classical mechanics), as well as holistic (quantum mechanics), and discuss two metaphysical options to conceive them, namely Humeanism and modal realism in the guise of dispositionalism

    Enforcing Secure Object Initialization in Java

    Get PDF
    Sun and the CERT recommend for secure Java development to not allow partially initialized objects to be accessed. The CERT considers the severity of the risks taken by not following this recommendation as high. The solution currently used to enforce object initialization is to implement a coding pattern proposed by Sun, which is not formally checked. We propose a modular type system to formally specify the initialization policy of libraries or programs and a type checker to statically check at load time that all loaded classes respect the policy. This allows to prove the absence of bugs which have allowed some famous privilege escalations in Java. Our experimental results show that our safe default policy allows to prove 91% of classes of java.lang, java.security and javax.security safe without any annotation and by adding 57 simple annotations we proved all classes but four safe. The type system and its soundness theorem have been formalized and machine checked using Coq

    Modelling solar coronal magnetic fields with physics-informed neural networks

    Full text link
    We present a novel numerical approach aiming at computing equilibria and dynamics structures of magnetized plasmas in coronal environments. A technique based on the use of neural networks that integrates the partial differential equations of the model, and called Physics-Informed Neural Networks (PINNs), is introduced. The functionality of PINNs is explored via calculation of different magnetohydrodynamic (MHD) equilibrium configurations, and also obtention of exact two-dimensional steady-state magnetic reconnection solutions (Craig & Henton 1995). Advantages and drawbacks of PINNs compared to traditional numerical codes are discussed in order to propose future improvements. Interestingly, PINNs is a meshfree method in which the obtained solution and associated different order derivatives are quasi-instantaneously generated at any point of the spatial domain. We believe that our results can help to pave the way for future developments of time dependent MHD codes based on PINNsComment: accepted in MNRA

    A PROBABILISTIC APPROACH OF ULTRAVIOLET RENORMALISATION IN THE BOUNDARY SINE-GORDON MODEL

    Get PDF
    The Sine-Gordon model is obtained by tilting the law of a log-correlated Gaussian field X defined on a subset of R d by the exponential of its cosine, namely exp(α ∫ cos(βX)). It is an important model in quantum field theory or in statistic physics like in the study of log-gases. In spite of its relatively simple definition, the model has a very rich phenomenology. While the integral ∫ cos(βX) can properly be defined when β 2 < d using the standard Wick normalisation of cos(βX), a more involved renormalization procedure is needed when β 2 ∈ [d, 2d). In particular it exhibits a countable sequence of phase transition accumulating to the left of β = √ 2d, each transitions corresponding to the addition of an extra term in the renormalization scheme. The final threshold β = √ 2 corresponds to the Kosterlitz-Thouless (KT) phase transition of the log-gas. In this paper, we present a novel probabilistic approach to renormalization of the two-dimensional boundary (or 1-dimensional) Sine-Gordon model up to the KT threshold β = √ 2. The purpose of this approach is to propose a simple and flexible method to treat this problem which, unlike the existing renormalization group techniques, does not rely on translation invariance for the covariance kernel of X or the reference measure along which cos(βX) is integrated. To this purpose we establish by induction a general formula for the cumulants of a random variable defined on a filtered probability space expressed in terms of brackets of a family of martingales; to the best of our knowledge, the recursion formula is new and might have other applications. We apply this formula to study the cumulants of (approximations of) ∫ cos(βX). To control all terms produced by the induction proceedure, we prove a refinement of classical electrostatic inequalities, which allows to bound the energy of configurations in terms of the Wasserstein distance between + and − charges
    • …
    corecore