42,870 research outputs found

    On higher derivative corrections to Wess-Zumino and Tachyonic actions in type II super string theory

    Full text link
    We evaluate in detail the string scattering amplitude to compute different interactions of two massless scalars, one tachyon and one closed string Ramond-Ramond field in type II super string theory. In particular we find two scalar field and two tachyon couplings to all orders of α′\alpha' up to on-shell ambiguity. We then obtain the momentum expansion of this amplitude and apply this infinite number of couplings to actually check that the infinite number of tachyon poles of S-matrix element of this amplitude for the p=np=n case (where pp is the spatial dimension of a Dp_p-brane and nn is the rank of a Ramond-Ramond field strength) to all orders of α′\alpha' is precisely equal to the infinite number of tachyon poles of the field theory. In addition to confirming the couplings of closed string Ramond-Ramond field to the world-volume gauge field and scalar fields including commutators, we also propose an extension of the Wess-Zumino action which naturally reproduces these new couplings in field theory such that they could be confirmed with direct S-matrix computations. Finally we show that the infinite number of massless poles and contact terms of this amplitude for the p=n+1p=n+1 case can be reproduced by Chern-Simons, higher derivative corrections of the Wess-Zumino and symmetrized trace tachyon DBI actions.Comment: 51 pages, some refs and comments added, typos are removed. Almost all ambiguities in BPS and non-BPS effective actions have been addresse

    Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem

    Get PDF
    We present the first formal mathematical presentation of the generalized Russian cards problem, and provide rigorous security definitions that capture both basic and extended versions of weak and perfect security notions. In the generalized Russian cards problem, three players, Alice, Bob, and Cathy, are dealt a deck of nn cards, each given aa, bb, and cc cards, respectively. The goal is for Alice and Bob to learn each other's hands via public communication, without Cathy learning the fate of any particular card. The basic idea is that Alice announces a set of possible hands she might hold, and Bob, using knowledge of his own hand, should be able to learn Alice's cards from this announcement, but Cathy should not. Using a combinatorial approach, we are able to give a nice characterization of informative strategies (i.e., strategies allowing Bob to learn Alice's hand), having optimal communication complexity, namely the set of possible hands Alice announces must be equivalent to a large set of t−(n,a,1)t-(n, a, 1)-designs, where t=a−ct=a-c. We also provide some interesting necessary conditions for certain types of deals to be simultaneously informative and secure. That is, for deals satisfying c=a−dc = a-d for some d≥2d \geq 2, where b≥d−1b \geq d-1 and the strategy is assumed to satisfy a strong version of security (namely perfect (d−1)(d-1)-security), we show that a=d+1a = d+1 and hence c=1c=1. We also give a precise characterization of informative and perfectly (d−1)(d-1)-secure deals of the form (d+1,b,1)(d+1, b, 1) satisfying b≥d−1b \geq d-1 involving d−(n,d+1,1)d-(n, d+1, 1)-designs

    Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval

    Get PDF
    We consider user-private information retrieval (UPIR), an interesting alternative to private information retrieval (PIR) introduced by Domingo-Ferrer et al. In UPIR, the database knows which records have been retrieved, but does not know the identity of the query issuer. The goal of UPIR is to disguise user profiles from the database. Domingo-Ferrer et al.\ focus on using a peer-to-peer community to construct a UPIR scheme, which we term P2P UPIR. In this paper, we establish a strengthened model for P2P UPIR and clarify the privacy goals of such schemes using standard terminology from the field of privacy research. In particular, we argue that any solution providing privacy against the database should attempt to minimize any corresponding loss of privacy against other users. We give an analysis of existing schemes, including a new attack by the database. Finally, we introduce and analyze two new protocols. Whereas previous work focuses on a special type of combinatorial design known as a configuration, our protocols make use of more general designs. This allows for flexibility in protocol set-up, allowing for a choice between having a dynamic scheme (in which users are permitted to enter and leave the system), or providing increased privacy against other users.Comment: Updated version, which reflects reviewer comments and includes expanded explanations throughout. Paper is accepted for publication by Advances in Mathematics of Communication

    Observables of the generalized 2D Yang-Mills theories on arbitrary surfaces: a path integral approach

    Get PDF
    Using the path integral method, we calculate the partition function and the generating functional (of the field strengths) of the generalized 2D Yang-Mills theories in the Schwinger--Fock gauge. Our calculation is done for arbitrary 2D orientable, and also nonorientable surfaces.Comment: 6 pages, LaTe

    Applications of Hilbert Module Approach to Multivariable Operator Theory

    Full text link
    A commuting nn-tuple (T1,…,Tn)(T_1, \ldots, T_n) of bounded linear operators on a Hilbert space \clh associate a Hilbert module H\mathcal{H} over C[z1,…,zn]\mathbb{C}[z_1, \ldots, z_n] in the following sense: C[z1,…,zn]×H→H,(p,h)↦p(T1,…,Tn)h,\mathbb{C}[z_1, \ldots, z_n] \times \mathcal{H} \rightarrow \mathcal{H}, \quad \quad (p, h) \mapsto p(T_1, \ldots, T_n)h,where p∈C[z1,…,zn]p \in \mathbb{C}[z_1, \ldots, z_n] and h∈Hh \in \mathcal{H}. A companion survey provides an introduction to the theory of Hilbert modules and some (Hilbert) module point of view to multivariable operator theory. The purpose of this survey is to emphasize algebraic and geometric aspects of Hilbert module approach to operator theory and to survey several applications of the theory of Hilbert modules in multivariable operator theory. The topics which are studied include: generalized canonical models and Cowen-Douglas class, dilations and factorization of reproducing kernel Hilbert spaces, a class of simple submodules and quotient modules of the Hardy modules over polydisc, commutant lifting theorem, similarity and free Hilbert modules, left invertible multipliers, inner resolutions, essentially normal Hilbert modules, localizations of free resolutions and rigidity phenomenon. This article is a companion paper to "An Introduction to Hilbert Module Approach to Multivariable Operator Theory".Comment: 46 pages. This is a companion paper to arXiv:1308.6103. To appear in Handbook of Operator Theory, Springe

    Can Universe Experience Many Cycles with Different Vacua ?

    Full text link
    Recently, the notion that the number of vacua is enormous has received increased attentions, which may be regarded as a possible anthropical explanation to incredible small cosmological constant. Further, a dynamical mechanisms to implement this possibility is required. We show in an operable model of cyclic universe that the universe can experience many cycles with different vacua, which is a generic behavior independent of the details of the model. This might provide a distinct dynamical approach to an anthropically favorable vacuum.Comment: RevTex, 10 pages, 4 eps figures, accepted by PRD(R), new title and changes in the text to match publicatio

    A Laplace transform approach to the quantum harmonic oscillator

    Full text link
    The one-dimensional quantum harmonic oscillator problem is examined via the Laplace transform method. The stationary states are determined by requiring definite parity and good behaviour of the eigenfunction at the origin and at infinity

    Experimental investigation of thermal annealing of nuclear-reactor-induced coloration in fused silica

    Get PDF
    Spectral transmission characteristics of fused silica over range of temperature prior to nuclear irradiation and during thermal annealing of reactor-induced coloratio
    • …
    corecore