12 research outputs found

    Hyperon couplings from Nf=2+1N_f = 2 + 1 lattice QCD

    Get PDF
    We compute various (generalized) isovector charges of the octet baryons. These include gAg_A, gTg_T and gSg_S as well as the unpolarized, polarized and transversity parton distribution function (PDF) momentum fractions xu+d+\langle x\rangle_{u^+-d^+}, xΔuΔd\langle x\rangle_{\Delta u^--\Delta d^-} and xδu+δ+\langle x\rangle_{\delta u^+-\delta ^+}. The simulations are carried out on a subset of the (isospin symmetric) Nf=2+1N_f=2+1 flavour Coordinated Lattice Simulations (CLS) gauge ensembles with lattice spacings ranging from a0.086a\approx 0.086\,fm down to a0.050a\approx 0.050\,fm. First results on the breaking of flavour symmetry and the low energy constants FF and DD are presented. While SU(3) flavour symmetry violations are found to be sizeable for gA=1Δu+Δd+g_A=\langle 1\rangle_{\Delta u^+-\Delta d^+}, these are quite small for gT=1δuδdg_T=\langle 1\rangle_{\delta u^--\delta d^-} and xu+d+\langle x\rangle_{u^+-d^+}.Comment: 7 pages, 5 figures, talk given at Lattice 2019, v2: corrected some typo

    Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures

    Get PDF
    In this work, we analyze the so-called Beyond UnForgeability Features (BUFF) security of the submissions to the current standardization process of additional signatures by NIST. The BUFF notions formalize security against maliciously generated keys and have various real-world use cases, where security can be guaranteed despite misuse potential on a protocol level. Consequently, NIST declared the security against the BUFF notions as desirable features. Despite NIST\u27s interest, only 66 out of 4040 schemes consider BUFF security at all, but none give a detailed analysis. We close this gap by analyzing the schemes based on codes, isogenies, lattices, and multivariate equations. The results vary from schemes that achieve neither notion (e.g., Wave) to schemes that achieve all notions (e.g., PROV). In particular, we dispute certain claims by SQUIRRELS and VOX regarding their BUFF security. Resulting from our analysis, we observe that three schemes (CROSS, HAWK and PROV) achieve BUFF security without having the hash of public key and message as part of the signature, as BUFF transformed schemes would have. HAWK and PROV essentially use the lighter PS-3 transform by Pornin and Stern (ACNS\u2705). We further point out whether this transform suffices for the other schemes to achieve the BUFF notions, with both positive and negative results

    Mellin moments of spin dependent and independent PDFs of the pion and rho meson

    Get PDF
    We compute the second moments of pion and rho parton distribution functions in lattice QCD with Nf=2+1 flavors of improved Wilson fermions. We determine both singlet and nonsinglet flavor combinations and, for the first time, take disconnected contributions fully into account. In the case of the rho, we also calculate the additional contribution arising from the b1 structure function. The numerical analysis includes 26 ensembles, mainly generated by the CLS effort, with pion masses ranging from 420 down to 214 MeV and with 5 different lattice spacings in the range of 0.1 to 0.05 fm. This enables us to take the continuum limit, as well as to resolve the quark mass dependencies reliably. Additionally we discuss the contaminations of rho correlation functions by two-pion states

    Chemical analysis of pottery demonstrates prehistoric origin for high-altitude alpine dairying

    Get PDF
    The European high Alps are internationally renowned for their dairy produce, which are of huge cultural and economic significance to the region. Although the recent history of alpine dairying has been well studied, virtually nothing is known regarding the origins of this practice. This is due to poor preservation of high altitude archaeological sites and the ephemeral nature of transhumance economic practices. Archaeologists have suggested that stone structures that appear around 3,000 years ago are associated with more intense seasonal occupation of the high Alps and perhaps the establishment of new economic strategies. Here, we report on organic residue analysis of small fragments of pottery sherds that are occasionally preserved both at these sites and earlier prehistoric rock-shelters. Based mainly on isotopic criteria, dairy lipids could only be identified on ceramics from the stone structures, which date to the Iron Age (ca. 3,000 - 2,500 BP), providing the earliest evidence of this practice in the high Alps. Dairy production in such a marginal environment implies a high degree of risk even by today’s standards. We postulate that this practice was driven by population increase and climate deterioration that put pressure on lowland agropastoral systems and the establishment of more extensive trade networks, leading to greater demand for highly nutritious and transportable dairy products

    Cellular Neural Network Parallelization Rules ∗

    Full text link
    ABSTRACT: We present “Rules of Thumb ” for efficient and simpl

    gSET: Trust Management and Secure Accounting for Business in the Grid ∗

    Full text link
    We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust and privacy between entities in a Grid environment by adapting the concept of Secure Electronic Transactions (SET) used for electronic credit card transfers in eBusiness. Trust is necessary for Grid participants in a business environment. It is also necessary to support the dynamic manner of real markets. As distinguished function, in opposite to existing mechanisms as GSI/CAS/VOMS, gSET allows the user to obtain access to a service without disclosing his credentials to the service provider. This minimizes the service provider’s administrative effort needed for user account management. gSET consists of Grid Services implemented with WSRF/GT4. gSET is an enabling step to make Grids a platform for commercial workflows.

    Business In the Grid: Project Results ∗

    Full text link
    Abstract. In 2004 we have launched the Business In the Grid (BIG) project to, firstly, make business aware of Grid technology and, secondly, try to explore new business models. Personal interviews and an online survey were done to gain dissemination of Grid computing and collect information about the possibilities and challenges of business in the Grid. In this paper we present the preliminary results of the project and an outlook on business-adaptations of the Grid. 1
    corecore