42,870 research outputs found
On higher derivative corrections to Wess-Zumino and Tachyonic actions in type II super string theory
We evaluate in detail the string scattering amplitude to compute different
interactions of two massless scalars, one tachyon and one closed string
Ramond-Ramond field in type II super string theory. In particular we find two
scalar field and two tachyon couplings to all orders of up to
on-shell ambiguity. We then obtain the momentum expansion of this amplitude and
apply this infinite number of couplings to actually check that the infinite
number of tachyon poles of S-matrix element of this amplitude for the
case (where is the spatial dimension of a D-brane and is the rank
of a Ramond-Ramond field strength) to all orders of is precisely
equal to the infinite number of tachyon poles of the field theory. In addition
to confirming the couplings of closed string Ramond-Ramond field to the
world-volume gauge field and scalar fields including commutators, we also
propose an extension of the Wess-Zumino action which naturally reproduces these
new couplings in field theory such that they could be confirmed with direct
S-matrix computations. Finally we show that the infinite number of massless
poles and contact terms of this amplitude for the case can be
reproduced by Chern-Simons, higher derivative corrections of the Wess-Zumino
and symmetrized trace tachyon DBI actions.Comment: 51 pages, some refs and comments added, typos are removed. Almost all
ambiguities in BPS and non-BPS effective actions have been addresse
Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem
We present the first formal mathematical presentation of the generalized
Russian cards problem, and provide rigorous security definitions that capture
both basic and extended versions of weak and perfect security notions. In the
generalized Russian cards problem, three players, Alice, Bob, and Cathy, are
dealt a deck of cards, each given , , and cards, respectively.
The goal is for Alice and Bob to learn each other's hands via public
communication, without Cathy learning the fate of any particular card. The
basic idea is that Alice announces a set of possible hands she might hold, and
Bob, using knowledge of his own hand, should be able to learn Alice's cards
from this announcement, but Cathy should not. Using a combinatorial approach,
we are able to give a nice characterization of informative strategies (i.e.,
strategies allowing Bob to learn Alice's hand), having optimal communication
complexity, namely the set of possible hands Alice announces must be equivalent
to a large set of -designs, where . We also provide some
interesting necessary conditions for certain types of deals to be
simultaneously informative and secure. That is, for deals satisfying
for some , where and the strategy is assumed to satisfy
a strong version of security (namely perfect -security), we show that and hence . We also give a precise characterization of informative
and perfectly -secure deals of the form satisfying involving -designs
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
We consider user-private information retrieval (UPIR), an interesting
alternative to private information retrieval (PIR) introduced by Domingo-Ferrer
et al. In UPIR, the database knows which records have been retrieved, but does
not know the identity of the query issuer. The goal of UPIR is to disguise user
profiles from the database. Domingo-Ferrer et al.\ focus on using a
peer-to-peer community to construct a UPIR scheme, which we term P2P UPIR. In
this paper, we establish a strengthened model for P2P UPIR and clarify the
privacy goals of such schemes using standard terminology from the field of
privacy research. In particular, we argue that any solution providing privacy
against the database should attempt to minimize any corresponding loss of
privacy against other users. We give an analysis of existing schemes, including
a new attack by the database. Finally, we introduce and analyze two new
protocols. Whereas previous work focuses on a special type of combinatorial
design known as a configuration, our protocols make use of more general
designs. This allows for flexibility in protocol set-up, allowing for a choice
between having a dynamic scheme (in which users are permitted to enter and
leave the system), or providing increased privacy against other users.Comment: Updated version, which reflects reviewer comments and includes
expanded explanations throughout. Paper is accepted for publication by
Advances in Mathematics of Communication
Observables of the generalized 2D Yang-Mills theories on arbitrary surfaces: a path integral approach
Using the path integral method, we calculate the partition function and the
generating functional (of the field strengths) of the generalized 2D Yang-Mills
theories in the Schwinger--Fock gauge. Our calculation is done for arbitrary 2D
orientable, and also nonorientable surfaces.Comment: 6 pages, LaTe
Applications of Hilbert Module Approach to Multivariable Operator Theory
A commuting -tuple of bounded linear operators on a
Hilbert space \clh associate a Hilbert module over
in the following sense: where and
. A companion survey provides an introduction to the theory
of Hilbert modules and some (Hilbert) module point of view to multivariable
operator theory. The purpose of this survey is to emphasize algebraic and
geometric aspects of Hilbert module approach to operator theory and to survey
several applications of the theory of Hilbert modules in multivariable operator
theory. The topics which are studied include: generalized canonical models and
Cowen-Douglas class, dilations and factorization of reproducing kernel Hilbert
spaces, a class of simple submodules and quotient modules of the Hardy modules
over polydisc, commutant lifting theorem, similarity and free Hilbert modules,
left invertible multipliers, inner resolutions, essentially normal Hilbert
modules, localizations of free resolutions and rigidity phenomenon.
This article is a companion paper to "An Introduction to Hilbert Module
Approach to Multivariable Operator Theory".Comment: 46 pages. This is a companion paper to arXiv:1308.6103. To appear in
Handbook of Operator Theory, Springe
Can Universe Experience Many Cycles with Different Vacua ?
Recently, the notion that the number of vacua is enormous has received
increased attentions, which may be regarded as a possible anthropical
explanation to incredible small cosmological constant. Further, a dynamical
mechanisms to implement this possibility is required. We show in an operable
model of cyclic universe that the universe can experience many cycles with
different vacua, which is a generic behavior independent of the details of the
model. This might provide a distinct dynamical approach to an anthropically
favorable vacuum.Comment: RevTex, 10 pages, 4 eps figures, accepted by PRD(R), new title and
changes in the text to match publicatio
A Laplace transform approach to the quantum harmonic oscillator
The one-dimensional quantum harmonic oscillator problem is examined via the
Laplace transform method. The stationary states are determined by requiring
definite parity and good behaviour of the eigenfunction at the origin and at
infinity
Experimental investigation of thermal annealing of nuclear-reactor-induced coloration in fused silica
Spectral transmission characteristics of fused silica over range of temperature prior to nuclear irradiation and during thermal annealing of reactor-induced coloratio
- …