203 research outputs found

    Traintrack Calabi-Yaus from Twistor Geometry

    Get PDF
    We describe the geometry of the leading singularity locus of the traintrack integral family directly in momentum twistor space. For the two-loop case, known as the elliptic double box, the leading singularity locus is a genus one curve, which we obtain as an intersection of two quadrics in P3\mathbb{P}^{3}. At three loops, we obtain a K3 surface which arises as a branched surface over two genus-one curves in P1×P1\mathbb{P}^{1} \times \mathbb{P}^{1}. We present an analysis of its properties. We also discuss the geometry at higher loops and the supersymmetrization of the construction.Comment: 23 pages, 5 figure

    A Quantum Check of Non-Supersymmetric AdS/dCFT

    Get PDF
    Via a challenging field-theory computation, we confirm a supergravity prediction for the non-supersymmetric D3-D7 probe-brane system with probe geometry AdS_4 x S^2 x S^2, stabilized by fluxes. Supergravity predicts, in a certain double-scaling limit, the value of the one-point functions of chiral primaries of the dual defect version of N=4 SYM theory, where the fluxes translate into SO(3) x SO(3)-symmetric, Lie-algebra-valued vacuum expectation values for all six scalar fields. Using a generalization of the technique based on fuzzy spherical harmonics developed for the related D3-D5 probe-brane system, we diagonalize the resulting mass matrix of the field theory. Subsequently, we calculate the planar one-loop correction to the vacuum expectation values of the scalars in dimensional reduction and find that it is UV finite and non-vanishing. We then proceed to calculating the one-loop correction to the planar one-point function of any single-trace scalar operator and explicitly evaluate this correction for a 1/2-BPS operator of length L at two leading orders in the double-scaling limit, finding exact agreement with the supergravity prediction.Comment: 33+14 pages, 5 figures; v2: typos corrected, reference added, version published in JHE

    Advancing Dynamic Fault Tree Analysis

    Full text link
    This paper presents a new state space generation approach for dynamic fault trees (DFTs) together with a technique to synthesise failures rates in DFTs. Our state space generation technique aggressively exploits the DFT structure --- detecting symmetries, spurious non-determinism, and don't cares. Benchmarks show a gain of more than two orders of magnitude in terms of state space generation and analysis time. Our approach supports DFTs with symbolic failure rates and is complemented by parameter synthesis. This enables determining the maximal tolerable failure rate of a system component while ensuring that the mean time of failure stays below a threshold

    Wilson lines in AdS/dCFT

    Get PDF
    We consider the expectation value of Wilson lines in two defect versions of N = 4 SYM, both with supersymmetry completely broken, where one is described in terms of an integrable boundary state, the other one not. For both cases, imposing a certain double scaling limit, we find agreement to two leading orders between the expectation values calculated from respectively the field theory and the string theory side of the AdS/dCFT correspondence.Comment: 8 pages, 2 figures; typos correcte

    Accelerating Parametric Probabilistic Verification

    Full text link
    We present a novel method for computing reachability probabilities of parametric discrete-time Markov chains whose transition probabilities are fractions of polynomials over a set of parameters. Our algorithm is based on two key ingredients: a graph decomposition into strongly connected subgraphs combined with a novel factorization strategy for polynomials. Experimental evaluations show that these approaches can lead to a speed-up of up to several orders of magnitude in comparison to existing approache

    Facing Big Data System Architecture Deployments: Towards an Automated Approach Using Container Technologies for Rapid Prototyping

    Get PDF
    Within the last decade, big data became a promising trend for many application areas, offering immense potential and a competitive edge for various organizations. As the technical foundation for most of today´s data-intensive projects, not only corresponding infrastructures and facilities but also the appropriate knowledge is required. Currently, several projects and services exist that not only allow enterprises to utilize but also to deploy related technologies and systems. However, at the same time, the use of these is accompanied by various challenges that may result in huge monetary expenditures, a lack of modifiability, or a risk of vendor lock-ins. To overcome these shortcomings, in the contribution at hand, modern container and task automation technologies are used to wrap complex big data technologies into re-usable and portable resources. Those are subsequently incorporated in a framework to automate the deployment of big data architectures in private and limited resources

    Low-code Development Platform Usage: Towards Bringing Citizen Development and Enterprise IT into Harmony

    Get PDF
    The ongoing digitization of our world leads to many areas of our lives being more pleasant and improved. New technologies and paradigms are emerging to support the development of software and systems. Their proliferation not only leads to higher complexity of potential solutions, but also to the problem of finding qualified people. Especially enterprises, which are constantly confronted with this problem, are increasingly considering low-code development platforms (LCDP) to allow the development of software by inexperienced and untrained citizen developers. However, at this point, non-functional requirements, such as performance and security, can require a thorough system understanding. In this work, we identify issues that may occur when citizen developers use LCDPs, allowing to deduce success factors for their implementation. Eventually, this shall help decision makers when introducing LCDPs into their environments

    Exploring the Applicability of Test Driven Development in the Big Data Domain

    Get PDF
    Big data analytics and the according applications have gained huge importance in daily life. This results on the one hand from their versatility and on the other hand from their capability to greatly improve an organization’s performance when utilized appropriately. However, despite their prevalence and the corresponding attention through practitioners as well as the scientific world, the actual implementation still remains a challenging task. Therefore, without the adequate testing, the reliability of the systems and thus the obtained outputs is uncertain. This might reduce their utilization, or even worse, lead to a diminished decision-making quality. The publication at hand explores the adoption of test driven development as a potential approach for addressing this issue. Subsequently, using the design science research methodology, a microservice-based test driven development concept for big data (MBTDD-BD) is proposed. In the end, possible avenues for future research endeavours are indicated

    Conformally-regulated direct integration of the two-loop heptagon remainder

    Get PDF
    We reproduce the two-loop seven-point remainder function in planar, maximally supersymmetric Yang-Mills theory by direct integration of conformally-regulated chiral integrands. The remainder function is obtained as part of the two-loop logarithm of the MHV amplitude, the regularized form of which we compute directly in this scheme. We compare the scheme-dependent anomalous dimensions and related quantities in the conformal regulator with those found for the Higgs regulator.Comment: 22 pages, 1 figure. Detailed results available in an ancillary fil

    B-type anomaly coefficients for the D3-D5 domain wall

    Full text link
    We compute type-B Weyl anomaly coefficients for the domain wall version of N = 4 SYM that is holographically dual to the D3-D5 probe-brane system with flux. Our starting point is the explicit expression for the improved energy momentum tensor of N = 4 SYM. We determine the two-point function of this operator in the presence of the domain wall and extract the anomaly coefficients from the result. In the same process we determine the two-point function of the displacement operator.Comment: 6 page
    corecore