Results for "Charles Ci Wen Lim"

total 15160took 0.13s
Optimality of semiquantum nonlocality in the presence of high inconclusive ratesNov 02 2015Jun 15 2016Quantum nonlocality is a counterintuitive phenomenon that lies beyond the purview of causal influences. Recently, Bell inequalities have been generalized to the case of quantum inputs, leading to a powerful family of semi-quantum Bell inequalities that ... More
Noise analysis of simultaneous quantum key distribution and classical communication scheme using a true local oscillatorAug 29 2017Dec 19 2017Recently, we proposed a simultaneous quantum and classical communication (SQCC) protocol, where random numbers for quantum key distribution (QKD) and bits for classical communication are encoded on the \emph{same} weak coherent pulse, and decoded by the ... More
Tight Finite-Key Analysis for Quantum CryptographyMar 21 2011Oct 17 2012Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final ... More
An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More
Reconfigurable generation and measurement of mutually unbiased bases for time-bin quditsJan 31 2018We propose a new method for implementing mutually unbiased generation and measurement of time-bin qudits using a cascade of electro-optic phase modulator -- coded fiber Bragg grating pairs. Our approach requires only a single spatial mode and can switch ... More
Finite-key security analysis of quantum key distribution with imperfect light sourcesApr 30 2015In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily awed optical receivers. The status for QKD systems with imperfect light sources is however ... More
Detector-device-independent QKD: security analysis and fast implementationJul 19 2016One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side- channel attacks. To overcome this problem, researchers proposed an elegant "time-reversal" QKD protocol called measurement-device-independent QKD (MDI-QKD), ... More
Finite-key analysis for measurement-device-independent quantum key distributionJul 03 2013May 20 2015Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect ... More
Characterising the correlations of prepare-and-measure quantum networksMar 13 2018Aug 19 2018Prepare-and-measure (P&M) quantum networks are the basic building blocks of quantum communication and cryptography. These networks crucially rely on non-orthogonal quantum encodings to distribute quantum correlations, thus enabling superior communication ... More
Detector-Device-Independent Quantum Key DistributionOct 07 2014Oct 15 2014Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all detector side-channel attacks. While mdiQKD is conceptually elegant and offers a supreme level ... More
Security of distributed-phase-reference quantum key distributionJul 23 2012Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this ... More
Almost-tight and versatile security analysis of measurement-device-independent quantum key distributionJan 07 2019Measurement-device-independent quantum key distribution (MDI-QKD) is the only known QKD scheme that can completely overcome the problem of detection side-channel attacks. Yet, despite its practical importance, there is no standard approach towards computing ... More
Securing quantum key distribution systems using fewer statesJan 10 2018May 02 2018Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually-unbiased bases: one to generate the key while the other monitors the presence ... More
Device-Independent Quantum Key Distribution with Local Bell TestJul 31 2012Dec 27 2013Device-independent quantum key distribution (DIQKD) in its current design requires a violation of Bell's inequality between two honest parties, Alice and Bob, who are connected by a quantum channel. However, in reality, quantum channels are lossy, and ... More
Practical measurement-device-independent entanglement quantificationSep 10 2017Nov 30 2018The robust estimation of entanglement is key to the validation of implementations of quantum systems. On the one hand, the evaluation of standard entanglement measures, either using quantum tomography or using quantitative entanglement witnesses requires ... More
Concise Security Bounds for Practical Decoy-State Quantum Key DistributionNov 27 2013Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world ... More
Scalable high-rate, high-dimensional quantum key distributionFeb 02 2019We propose and experimentally demonstrate a new scheme for measuring high-dimensional phase states using a two-photon interference technique, which we refer to as quantum-controlled measurement. Using this scheme, we implement a $d$-dimensional time-phase ... More
Security of quantum key distribution with iterative siftingOct 20 2016May 30 2017Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the ... More
A self-testing quantum random number generatorOct 10 2014Jan 18 2016The generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is to estimate the entropy of the data generated by a given device. Here we present a protocol ... More
Provably Secure and Practical Quantum Key Distribution over 307 km of Optical FibreJul 28 2014Proposed in 1984, quantum key distribution (QKD) allows two users to exchange provably secure keys via a potentially insecure quantum channel. Since then, QKD has attracted much attention and significant progress has been made in both theory and practice. ... More
Free-space reconfigurable quantum key distribution networkOct 16 2015We propose a free-space reconfigurable quantum key distribution (QKD) network to secure communication among mobile users. Depends on the trustworthiness of the network relay, the users can implement either the highly secure measurement-device-independent ... More
A fast and versatile QKD system with hardware key distillation and wavelength multiplexingSep 10 2013Sep 11 2013We present a 625 MHz clocked coherent one-way quantum key distribution (QKD) system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows ... More
Statistical problem of ideal gas in general 2-dimensional regionsDec 19 2014In this paper, based on the conformal mapping method and the perturbation theory, we develop a method to solve the statistical problem within general 2-dimensional regions. We consider some examples and the numerical results and fitting results are given. ... More
Advantage distillation for device-independent quantum key distributionMar 25 2019We derive a sufficient condition for advantage distillation to be secure against collective attacks in device-independent quantum key distribution (DIQKD), focusing on the repetition-code protocol. In addition, we describe a semidefinite programming method ... More
Provably-Secure and High-Rate Quantum Key Distribution with Time-Bin QuditsSep 18 2017The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although ... More
Loss-tolerant quantum secure positioning with weak laser sourcesJul 27 2016Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming ... More
Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key DistributionAug 27 2014Jan 30 2015In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks. In particular, by exploiting the internal working knowledge of practical detectors, it is possible to bring them to an operating region whereby ... More
Almost-tight and versatile security analysis of measurement-device-independent quantum key distributionJan 07 2019Mar 15 2019Measurement-device-independent quantum key distribution (MDI-QKD) is the only known QKD scheme that can completely overcome the problem of detection side-channel attacks. Yet, despite its practical importance, there is no standard approach towards proving ... More
Testing galaxy formation models with galaxy stellar mass functionsAug 17 2016We compare predictions of a number of empirical models and numerical simulations of galaxy formation to the conditional stellar mass functions (CSMF) of galaxies in groups of different masses obtained recently by Lan et al. to test how well different ... More
Finite-temperature quantum criticality in a complex-parameter planeJun 18 2015Dec 08 2015A conventional quantum phase transition (QPT) occurs not only at zero temperature, but also exhibits finite-temperature quantum criticality. Motivated by the discovery of the pseudo-Hermiticity of non-Hermitian systems, we explore the finite-temperature ... More
Generation of Bell, W and GHZ states via exceptional points in non-Hermitian quantum spin systemsMar 20 2015We study quantum phase transitions in non-Hermitian XY and transverse-field Ising spin chains, in which the non-Hermiticity arises from the imaginary magnetic field. Analytical and numerical results show that at exceptional points, coalescing eigenstates ... More
Testing galaxy formation models with galaxy stellar mass functionsAug 17 2016Oct 09 2016We compare predictions of a number of empirical models and numerical simulations of galaxy formation to the conditional stellar mass functions (CSMF)of galaxies in groups of different masses obtained recently by Lan et al. to test how well different models ... More
Security of quantum key distribution with iterative siftingOct 20 2016Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. The quantum phase of the ... More
Role of Pyridine as a Biomimetic Organo-Hydride for Homogeneous Reduction of CO2 to MethanolAug 12 2014We use quantum chemical calculations to elucidate a viable homogeneous mechanism for pyridine-catalyzed reduction of CO2 to methanol. In the first component of the catalytic cycle, pyridine (Py) undergoes a H+ transfer (PT) to form pyridinium (PyH+) followed ... More
Design and Implementation of the End System to Intermediate System (ES-IS) Routing Information Exchange Protocol as a Loadable Kernel Module in Linux Kernel 2.6Apr 19 2012This paper presents a partial implementation of the ES-IS Routing Information Exchange Protocol packet processing in Linux Kernel 2.6, which is for use in conjunction with the Connectionless Network Protocol (CLNP) in Aeronautical Telecommunication Network ... More
Prevalence of Tidal Interactions among Local Seyfert GalaxiesFeb 27 2008Mar 04 2008No mechanisms have hitherto been conclusively demonstrated to be responsible for initiating optically-luminous nuclear (Seyfert) activity in local disk galaxies. Only a small minority of such galaxies are visibly disturbed in optical starlight, with the ... More
Prevalence of Tidal Interactions among Local Seyfert Galaxies: The Control ExperimentFeb 28 2008Apr 15 2008We test whether there is a relation between the observed tidal interactions and Seyfert activity by imaging in HI twenty inactive galaxies at the same spatial resolution and detection threshold as the Seyfert sample. This control sample of inactive galaxies ... More
Sensible Functional Linear Discriminant AnalysisJun 13 2016Sep 06 2017The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely re-corded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More
Covariate adjusted functional principal components analysis for longitudinal dataMar 01 2010Classical multivariate principal component analysis has been extended to functional data and termed functional principal component analysis (FPCA). Most existing FPCA approaches do not accommodate covariate information, and it is the goal of this paper ... More
Coalescing Majorana edge modes in non-Hermitian PT-symmetric Kitaev chainOct 21 2017A single unit cell contains all the information about the bulk system, including the topological feature. The topological invariant can be extracted from a finite system, which consists of several unit cells under certain environment, such as a non-Hermitian ... More
Equivalent spin-orbit interaction in two-polariton Jaynes-Cummings-Hubbard modelSep 25 2014A hybrid quantum system combines two or more distinct quantum components, exhibiting features not seen in these individual systems. In this work, we study the one-dimensional Jaynes-Cummings- Hubbard model in the two-excitation subspace. We find that ... More
Functional single index models for longitudinal dataMar 09 2011A new single-index model that reflects the time-dynamic effects of the single index is proposed for longitudinal and functional response data, possibly measured with errors, for both longitudinal and time-invariant covariates. With appropriate initial ... More
Multi-dimensional Functional Principal Component AnalysisOct 15 2015Mar 12 2016Functional principal component analysis is one of the most commonly employed approaches in functional and longitudinal data analysis and we extend it to analyze functional/longitudinal data observed on a general $d$-dimensional domain. The computational ... More
Sensible Functional Linear Discriminant AnalysisJun 13 2016The focus of this paper is to extend Fisher's linear discriminant analysis (LDA) to both densely recorded functional data and sparsely observed longitudinal data for general $c$-category classification problems. We propose an efficient approach to identify ... More
Two robust nonconforming H$^2-$elements for linear strain gradient elasticityApr 07 2016Apr 25 2017We propose two nonconforming finite elements to approximate a boundary value problem arising from strain gradient elasticity, which is a higher-order perturbation of the linearized elastic system. Our elements are H$^2-$nonconforming while H$^1-$conforming. ... More
UA-DETRAC: A New Benchmark and Protocol for Multi-Object Detection and TrackingNov 13 2015Sep 04 2016In recent years, numerous effective multi-object tracking (MOT) methods are developed because of the wide range of applications. Existing performance evaluations of MOT methods usually separate the object tracking step from the object detection step by ... More
Advantages of high-speed technique for quantum key distribution; reply to quant-ph/0407050Jul 18 2004We respond to a comment on our high-speed technique for the implementation of free-space quantum key distribution (QKD). The model used in the comment assigns inappropriately high link losses to the technique in question. We show that the use of reasonable ... More
Unconventional Spin Density Waves in Dipolar Fermi GasesSep 12 2012Sep 13 2012The conventional spin density wave (SDW) phase (Overhauser, 1962), as found in antiferromagnetic metal for example (Fawcett 1988), can be described as a condensate of particle-hole pairs with zero angular momentum, $\ell=0$, analogous to a condensate ... More
Bond order solid of two-dimensional dipolar fermionsNov 11 2011Feb 29 2012Recent experimental realization of dipolar Fermi gases near or below quantum degeneracy provides opportunity to engineer Hubbard-like models with long range interactions. Motivated by these experiments, we chart out the theoretical phase diagram of interacting ... More
Parameter-free prediction of DNA dynamics in planar extensional flow of semidilute solutionsApr 22 2016Dec 01 2016The dynamics of individual DNA molecules in semidilute solutions undergoing planar extensional flow is simulated using a multi-particle Brownian dynamics algorithm, which incorporates hydrodynamic and excluded volume interactions in the context of a coarse-grained ... More
In-network Congestion-aware Load Balancing at Transport LayerNov 24 2018Load balancing at transport layer is an important function in data centers, content delivery networks, and mobile networks. This function has unique requirements and greatly impacts the end users' experience. Recent studies in the field have identified ... More
Direct observation of DNA dynamics in semi-dilute solutions in extensional flowApr 22 2016Dec 02 2016The dynamic behavior of semi-dilute polymer solutions is governed by an interplay between solvent quality, concentration, molecular weight, and flow type. Semi-dilute solutions are characterized by large fluctuations in concentration, wherein polymer ... More
Large Strong Phases and CP Violation in the Annihilation Processes $\bar{B}^0\to K^+K^-$, $K^{*\pm}K^\mp$, $K^{*+}K^{*-}$Apr 10 2006Oct 17 2006The strong phases and CP violation in the rare $\bar{B}^0\to K^+K^-$, $K^{*\pm}K^\mp$, $K^{*+}K^{*-}$ decays are investigated. As these decays proceed only via annihilation type diagrams in the standard model (SM), a dynamical gluon mass is introduced ... More
User-Guided Deep Anime Line Art Colorization with Conditional Adversarial NetworksAug 09 2018Aug 10 2018Scribble colors based line art colorization is a challenging computer vision problem since neither greyscale values nor semantic information is presented in line arts, and the lack of authentic illustration-line art training pairs also increases difficulty ... More
Switchable metamaterial reflector/absorber for different polarized electromagnetic wavesOct 21 2010We demonstrate a controllable electromagnetic wave reflector/absorber for different polarizations with metamaterial involving electromagnetic resonant structures coupled with diodes. Through biasing at different voltages to turn ON and OFF the diodes, ... More
Globular Clusters As Tracers of Fine Structure in the Dramatic Shell Galaxy NGC 474Dec 13 2016Globular clusters (GCs) are some of the most visible tracers of the merging and accretion history of galaxy halos. Metal-poor GCs, in particular, are thought to arrive in massive galaxies largely through dry, minor merging events, but it is rare to see ... More
Mechanical Switching of Nanoscale Multiferroic Phase BoundariesSep 27 2017Tuning the lattice degree of freedom in nanoscale functional crystals is critical to exploit the emerging functionalities such as piezoelectricity, shape-memory effect, or piezomagnetism, which are attributed to the intrinsic lattice-polar or lattice-spin ... More
Vulnerability Analysis of GWirelessAug 09 2015Wireless networking has become very popular in recent years due to the increase in adoption of mobile devices. As more and more employees demand for Wi-Fi access for their devices, more companies have been jumping onto the "Bring Your Own Device" (BYOD) ... More
Counting overlattices in automorphism groups of treesJun 11 2005We give an upper bound for the number of ``overlattices'' in the automorphism group of a tree, containing a fixed lattice with index n. For an example of a lattice in the automorphism group of a 2p-regular tree whose quotient is a loop, we obtain a lower ... More
ALMA Observations of the Spatial Distribution of three C$_2$H$_4$O$_2$ Isomers towards Sgr B2(N)Dec 17 2018Dec 21 2018The C$_2$H$_4$O$_2$ isomers have been previously investigated primarily via disparate sets of observations involving single dish and array measurements. The only attempt at using a uniform set of observations was performed with the IRAM 30 m observation ... More
Topological nodal points in two coupled SSH chainsApr 14 2017We study two coupled Su-Schrieffer-Heeger (SSH) chains system, which is shown to contain rich quantum phases associated with topological invariants protected by symmetries. In the weak coupling region, the system supports two non-trivial topological insulating ... More
A functional approach to deconvolve dynamic neuroimaging dataNov 07 2014Positron Emission Tomography (PET) is an imaging technique which can be used to investigate chemical changes in human biological processes such as cancer development or neurochemical reactions. Most dynamic PET scans are currently analyzed based on the ... More
Inverse regression for longitudinal dataMay 23 2014Oct 23 2015Sliced inverse regression (Duan and Li [Ann. Statist. 19 (1991) 505-530], Li [J. Amer. Statist. Assoc. 86 (1991) 316-342]) is an appealing dimension reduction method for regression models with multivariate covariates. It has been extended by Ferr\'{e} ... More
On-chip Rotated Polarization Directional Coupler Fabricated by Femtosecond Laser Direct WritingDec 19 2018We present a rotated polarization directional coupler (RPDC) on a photonic chip. We demonstrate a double-track approach to modify the distribution of refractive index between adjacent tracks and form a single waveguide with arbitrary birefringent optical ... More
Decoherence of two qubits coupled with one-mode cavity without rotating-wave approximationJun 24 2008Jul 13 2008The decoherence of two qubits, coupled with one-mode cavity separately, has been investigated exactly. The results show that, for the resonant case, the decoherence behavior of system is similar to Markovian case when the coupling strength is weak, while ... More
Vacuum Rabi oscillation of an atom without rotating-wave approximationJun 24 2008Jul 16 2008We have investigated vacuum Rabi oscillation of an atom coupled with single-mode cavity field exactly, and compared the results with that of J-C model. The results show that, there is damping Rabi oscillation for an atom, even in strong coupling regime. ... More
First Confirmed Detection of a Bipolar Molecular Outflow from a Young Brown DwarfOct 15 2008Oct 30 2008Studying the earliest stages in the birth of stars is crucial for understanding how they form. Brown dwarfs with masses between that of stars and planets are not massive enough to maintain stable hydrogen-burning fusion reactions during most of their ... More
Young-Stieltjes integrals with respect to Volterra covariance functionsJun 06 2018Complementary regularity between the integrand and integrator is a well known condition for the integral $\int_0^T f(r) \, \mathrm{d} g(r)$ to exist in the Riemann-Stieltjes sense. This condition also applies to the multi-dimensional case, in particular ... More
Optimal martingale transport between radially symmetric marginals in general dimensionsDec 11 2014Feb 16 2018We determine the optimal structure of couplings for the \emph{Martingale transport problem} between radially symmetric initial and terminal laws $\mu, \nu$ on $\R^d$ and show the uniqueness of optimizer. Here optimality means that such solutions will ... More
Measurement of electrons from heavy-flavor decays from $p$+$p$, $d$+Au, and Cu+Cu collisions in the PHENIX experimentAug 18 2014Charm and bottom quarks are formed predominantly by gluon fusion in the initial hard scatterings at RHIC, making them good probes of the full medium evolution. Previous measurements at RHIC have shown large suppression and azimuthal anisotropy of open ... More
Minimal volume entropy on graphsJun 11 2005Among the normalized metrics on a graph, we show the existence and the uniqueness of an entropy-minimizing metric, and give explicit formulas for the minimal volume entropy and the metric realizing it.
Signal of New Physics and Test of Isospin-SU(3) Relations and CP Violation in Charmless B DecaysJun 02 2006A model-independent analytical analysis for charmless B decays is presented. It is demonstrated that the CP-averaging branching ratio difference $\Delta R = R_c - R_n$ in $B\to \pi K$ decays with $R_c = 2Br(\pi^0K^-)/Br(\pi^-\bar{K}^0)$ and $R_n =Br(\pi^+K^-)/2Br(\pi^0\bar{K}^0)$ ... More
Open heavy flavor measurements in $d$$+$Au collisions at PHENIX experimentFeb 28 2014The heavy quarks produced in the early stage of heavy-ion collisions are very effective probes of the dense partonic medium produced at RHIC. PHENIX has the ability to measure heavy quark production through single electrons in the central arm spectrometers ... More
Exclusive $B \to VV $ Decays and CP Violation in the General two-Higgs-doublet ModelJan 17 2008Jan 22 2008Using the general factorization approach, we present a detailed investigation for the branching ratios, CP asymmetries and longitudinal polarization fractions in all charmless hadronic $B \to VV$ decays (except for the pure annihilation processes) within ... More
Pentavalent symmetric graphs of order four times an odd square-free integerFeb 19 2017A graph is said to be symmetric if its automorphism group is transitive on its arcs. Guo et al. (Electronic J. Combin. 18, \#P233, 2011) and Pan et al. (Electronic J. Combin. 20, \#P36, 2013) determined all pentavalent symmetric graphs of order $4pq$. ... More
All-dielectric active photonics driven by bound states in the continuumMar 06 2018Recently emerged dielectric resonators and metasurfaces offer a low-loss platform for efficient manipulation of electromagnetic waves from microwave to visible. Such flat meta-optics can focus electromagnetic waves, generate structured beams and vortices, ... More
Experimental signatures of phase interference and sub-femtosecond time dynamics on the incident energy axis of resonant inelastic X-ray scatteringDec 03 2016Core hole resonance is used in X-ray spectroscopy to incisively probe the local electronic states of many-body systems. Here, resonant inelastic X-ray scattering (RIXS) is studied as a function of incident photon energy on Mott insulators SrCuO2 and NiO ... More
Multi-martingale optimal transportNov 04 2016Beiglb\"ock-Juillet, Beiglb\"ock-Nutz-Touzi showed that the duality is attained in a suitable sense for the martingale optimal transport problem on the real line, that is, when there is one underlying martingale process. We generalize the duality result ... More
Optimal martingale transport between radially symmetric marginals in general dimensionsDec 11 2014May 17 2016We determine the optimal structure of couplings for the \emph{Martingale transport problem} between radially symmetric initial and terminal laws $\mu, \nu$ on $\R^d$ and show the uniqueness of optimizer. Here optimality means that such solutions will ... More
Two Embedding Theorems for Data with Equivalences under Finite Group ActionJul 30 2012Oct 15 2012There is recent interest in compressing data sets for non-sequential settings, where lack of obvious orderings on their data space, require notions of data equivalences to be considered. For example, Varshney & Goyal (DCC, 2006) considered multiset equivalences, ... More
Convolutional Attention-based Seq2Seq Neural Network for End-to-End ASROct 12 2017This thesis introduces the sequence to sequence model with Luong's attention mechanism for end-to-end ASR. It also describes various neural network algorithms including Batch normalization, Dropout and Residual network which constitute the convolutional ... More
Android Tapjacking VulnerabilityJul 30 2015Android is an open source mobile operating system that is developed mainly by Google. It is used on a significant portion of mobile devices worldwide. In this paper, I will be looking at an attack commonly known as tapjacking. I will be taking the attack ... More
Instanton homology and the Alexander polynomialJul 24 2009Jul 25 2009We prove that the instanton knot homology KHI(K) as defined by Kronheimer and Mrowka (Knots, sutures and excision, preprint), recovers the Alexander polynomial for knots K in the 3-sphere.
Dark Matter in Ultra-Diffuse Galaxies in the Virgo Cluster from their Globular Cluster PopulationsMar 26 2018We present Keck/DEIMOS spectroscopy of globular clusters (GCs) around the ultra-diffuse galaxies (UDGs) VLSB-B, VLSB-D, and VCC615 located in the central regions of the Virgo cluster. We spectroscopically identify 4, 12, and 7 GC satellites of these UDGs, ... More
A Transport Model for Nuclear Reactions Induced by Radioactive BeamsApr 25 2005Major ingredients of an isospin and momentum dependent transport model for nuclear reactions induced by radioactive beams are outlined. Within the IBUU04 version of this model we study several experimental probes of the equation of state of neutron-rich ... More
Gauge-singlet dark matter in a left-right symmetric model with spontaneous CP violationNov 17 2008Nov 26 2008We propose a dark matter (DM) scenario in an extension of a left-right symmetric model with a gauge-singlet scalar field. The gauge-singlet scalar can automatically become a DM candidate, provided that both P and CP symmetries are only broken spontaneously. ... More
Pairings of harmonic Maass-Jacobi forms involving special values of partial $L$-functionsDec 29 2014In this paper, considering the Eichler-Shimura cohomology theory for Jacobi forms, we study connections between harmonic Maass-Jacobi forms and Jacobi integrals. As an application we study a pairing between two Jacobi integrals, which is defined by special ... More
The Extended Zel'dovich Mass Functions of Clusters and Isolated Clusters in the Presence of Primordial Non-GaussianityJul 15 2014We present new formulae for the mass functions of the clusters and the isolated clusters with non Gaussian initial conditions. For this study, we adopt the Extended Zel'dovich (EZL) model as a basic framework, focusing on the case of primordial non-Gaussianity ... More
Developmental time windows for axon growth influence neuronal network topologyMar 13 2015Early brain connectivity development consists of multiple stages: birth of neurons, their migration and the subsequent growth of axons and dendrites. Each stage occurs within a certain period of time depending on types of neurons and cortical layers. ... More
The Eichler cohomology theorem for Jacobi formsNov 13 2012Jan 07 2013Let $\Gamma$ be a finitely generated Fuchsian group of the first kind which has at least one parabolic class. Eichler introduced a cohomology theory for Fuchsian groups, called as "Eichler cohomology theory", and established the $\CC$-linear isomorphism ... More
Limits of traces of singular moduliSep 09 2018Let $f$ and $g$ be weakly holomorphic modular functions on $\Gamma_0(N)$ with the trivial character. For an integer $d$, let $\Tr_d(f)$ denote the modular trace of $f$ of index $d$. Let $r$ be a rational number equivalent to $i\infty$ under the action ... More
Notes on the values of the volume entropyMay 29 2018Sep 21 2018Volume entropy is an important invariant of metric graphs as well as Riemannian manifolds. In this note, we calculate the change of volume entropy when an edge is added to a metric graph. Using the first result, we investigate the change of volume entropy ... More
Congruences involving the $U_{\ell}$ operator for weakly holomorphic modular formsFeb 18 2019Let $\lambda$ be an integer, and $f(z)=\sum_{n\gg-\infty} a(n)q^n$ be a weakly holomorphic modular form of weight $\lambda+\frac 12$ on $\Gamma_0(4)$ with integral coefficients. Let $\ell\geq 5$ be a prime. Assume that the constant term $a(0)$ is not ... More
Extending TCP for Accelerating Replication on Cluster File Systems over SDNsDec 27 2018Mar 07 2019This paper explores the changes required of TCP to efficiently support cluster file systems such as Hadoop Distributed File System (HDFS) where the storage nodes are connected through a software defined networking (SDN). Traditional chain replications ... More
Self-concordance is NP-hardMar 29 2013We give an elementary proof of a somewhat curious result, namely, that deciding whether a convex function is self-concordant is in general an intractable problem.
Asymptotic analysis for superfocusing of the electric field in between two nearly touching metallic spheresDec 08 2014Feb 15 2015We consider the enhancement of electric field in the presence of two perfectly conducting spheres. When the two spheres get closer, the electric field have a much larger magnitude compared to the external field in the small gap region between the two ... More
On the divisibility of class numbers and discriminants of imaginary quadratic fieldsJan 20 2016Apr 21 2016Let $n$ be a squarefree positive odd integer. We will show that there exist infinitely many imaginary quadratic number fields with discriminant divisible by $n$ and-at the same time-having an element of order $n$ in the class group. We then apply our ... More
HierLPR: Decision making in hierarchical multi-label classification with local precision ratesOct 18 2018In this article we propose a novel ranking algorithm, referred to as HierLPR, for the multi-label classification problem when the candidate labels follow a known hierarchical structure. HierLPR is motivated by a new metric called eAUC that we design to ... More
Polarization modulation by tunable electromagnetic metamaterial reflector/absorberOct 21 2010We propose a polarization modulation scheme of electromagnetic (EM) waves through reflection of a tunable metamaterial reflector/absorber. By constructing the metamaterial with resonant unit cells coupled by diodes, we demonstrate that the EM reflections ... More
Mean field theory and coherent structures for vortex dynamics on the planeApr 20 1999We present a new derivation of the Onsager-Joyce-Montgomery (OJM) equilibrium statistical theory for point vortices on the plane, using the Bogoliubov-Feynman inequality for the free energy, Gibbs entropy function and Landau's approximation. This formulation ... More