12 research outputs found
Hyperon couplings from lattice QCD
We compute various (generalized) isovector charges of the octet baryons.
These include , and as well as the unpolarized, polarized and
transversity parton distribution function (PDF) momentum fractions , and . The simulations are carried out on a subset
of the (isospin symmetric) flavour Coordinated Lattice Simulations
(CLS) gauge ensembles with lattice spacings ranging from fm
down to fm. First results on the breaking of flavour symmetry
and the low energy constants and are presented. While SU(3) flavour
symmetry violations are found to be sizeable for , these are quite small for and .Comment: 7 pages, 5 figures, talk given at Lattice 2019, v2: corrected some
typo
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures
In this work, we analyze the so-called Beyond UnForgeability Features (BUFF) security of the submissions to the current standardization process of additional signatures by NIST. The BUFF notions formalize security against maliciously generated keys and have various real-world use cases, where security can be guaranteed despite misuse potential on a protocol level. Consequently, NIST declared the security against the BUFF notions as desirable features. Despite NIST\u27s interest, only out of schemes consider BUFF security at all, but none give a detailed analysis. We close this gap by analyzing the schemes based on codes, isogenies, lattices, and multivariate equations. The results vary from schemes that achieve neither notion (e.g., Wave) to schemes that achieve all notions (e.g., PROV). In particular, we dispute certain claims by SQUIRRELS and VOX regarding their BUFF security. Resulting from our analysis, we observe that three schemes (CROSS, HAWK and PROV) achieve BUFF security without having the hash of public key and message as part of the signature, as BUFF transformed schemes would have. HAWK and PROV essentially use the lighter PS-3 transform by Pornin and Stern (ACNS\u2705). We further point out whether this transform suffices for the other schemes to achieve the BUFF notions, with both positive and negative results
Mellin moments of spin dependent and independent PDFs of the pion and rho meson
We compute the second moments of pion and rho parton distribution functions in lattice QCD with Nf=2+1 flavors of improved Wilson fermions. We determine both singlet and nonsinglet flavor combinations and, for the first time, take disconnected contributions fully into account. In the case of the rho, we also calculate the additional contribution arising from the b1 structure function. The numerical analysis includes 26 ensembles, mainly generated by the CLS effort, with pion masses ranging from 420 down to 214 MeV and with 5 different lattice spacings in the range of 0.1 to 0.05 fm. This enables us to take the continuum limit, as well as to resolve the quark mass dependencies reliably. Additionally we discuss the contaminations of rho correlation functions by two-pion states
Chemical analysis of pottery demonstrates prehistoric origin for high-altitude alpine dairying
The European high Alps are internationally renowned for their dairy produce, which are of huge cultural and economic significance to the region. Although the recent history of alpine dairying has been well studied, virtually nothing is known regarding the origins of this practice. This is due to poor preservation of high altitude archaeological sites and the ephemeral nature of transhumance economic practices. Archaeologists have suggested that stone structures that appear around 3,000 years ago are associated with more intense seasonal occupation of the high Alps and perhaps the establishment of new economic strategies. Here, we report on organic residue analysis of small fragments of pottery sherds that are occasionally preserved both at these sites and earlier prehistoric rock-shelters. Based mainly on isotopic criteria, dairy lipids could only be identified on ceramics from the stone structures, which date to the Iron Age (ca. 3,000 - 2,500 BP), providing the earliest evidence of this practice in the high Alps. Dairy production in such a marginal environment implies a high degree of risk even by today’s standards. We postulate that this practice was driven by population increase and climate deterioration that put pressure on lowland agropastoral systems and the establishment of more extensive trade networks, leading to greater demand for highly nutritious and transportable dairy products
Cellular Neural Network Parallelization Rules ∗
ABSTRACT: We present “Rules of Thumb ” for efficient and simpl
gSET: Trust Management and Secure Accounting for Business in the Grid ∗
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust and privacy between entities in a Grid environment by adapting the concept of Secure Electronic Transactions (SET) used for electronic credit card transfers in eBusiness. Trust is necessary for Grid participants in a business environment. It is also necessary to support the dynamic manner of real markets. As distinguished function, in opposite to existing mechanisms as GSI/CAS/VOMS, gSET allows the user to obtain access to a service without disclosing his credentials to the service provider. This minimizes the service provider’s administrative effort needed for user account management. gSET consists of Grid Services implemented with WSRF/GT4. gSET is an enabling step to make Grids a platform for commercial workflows.
Business In the Grid: Project Results ∗
Abstract. In 2004 we have launched the Business In the Grid (BIG) project to, firstly, make business aware of Grid technology and, secondly, try to explore new business models. Personal interviews and an online survey were done to gain dissemination of Grid computing and collect information about the possibilities and challenges of business in the Grid. In this paper we present the preliminary results of the project and an outlook on business-adaptations of the Grid. 1