total 23241took 0.16s

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScriptJul 24 2015Apr 05 2016A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell ... More

Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUsMay 14 2019Meltdown and Spectre exploit microarchitectural changes the CPU makes during transient out-of-order execution. Using side-channel techniques, these attacks enable leaking arbitrary data from memory. As state-of-the-art software mitigations for Meltdown ... More

ConTExT: Leakage-Free Transient ExecutionMay 22 2019Out-of-order execution and speculative execution are among the biggest contributors to performance and efficiency of modern processors. However, they are inconsiderate, leaking secret data during the transient execution of instructions. Many solutions ... More

A Systematic Evaluation of Transient Execution Attacks and DefensesNov 13 2018May 15 2019Research on transient execution attacks including Spectre and Meltdown showed that exception or branch misprediction events might leave secret-dependent traces in the CPU's microarchitectural state. This observation led to a proliferation of new Spectre ... More

Graphene deflectometry for sensing molecular processes at the nanoscaleApr 08 2018Single-molecule sensing is at the core of modern biophysics and nanoscale science, from revolutionizing healthcare through rapid, low-cost sequencing to understanding various physical, chemical, and biological processes at their most basic level. However, ... More

Practical Enclave Malware with Intel SGXFeb 08 2019Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel's threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat model is realistic. ... More

Landauer's formula with finite-time relaxation: Kramers' crossover in electronic transportApr 11 2016Landauer's formula is the standard theoretical tool to examine ballistic transport in nano- and meso-scale junctions, but it necessitates that any variation of the junction with time must be slow compared to characteristic times of the system, e.g., the ... More

NetSpectre: Read Arbitrary Memory over NetworkJul 27 2018In this paper, we present NetSpectre, a generic remote Spectre variant 1 attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over network, leaking 15 bits per hour. Beyond retrofitting existing attacks to ... More

Flush+Flush: A Fast and Stealthy Cache AttackNov 14 2015Apr 05 2016Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. ... More

Interaction-induced conducting-nonconducting transition of ultra-cold atoms in 1D optical latticesMar 22 2012Jun 26 2013The study of time-dependent, many-body transport phenomena is increasingly within reach of ultra-cold atom experiments. We show that the introduction of spatially inhomogeneous interactions, e.g., generated by optically-controlled collisions, induce negative ... More

An energy-resolved atomic scanning probeOct 06 2016The density of states is a concept that is ubiquitous in classical and quantum physics, since it quantifies the energy distribution of states available in a system. Spectroscopic means allow its measurement over the entirety of a system's energy spectrum, ... More

DRAMA: Exploiting DRAM Addressing for Cross-CPU AttacksNov 27 2015Jun 28 2016In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the ... More

Malware Guard Extension: Using SGX to Conceal Cache AttacksFeb 28 2017Mar 01 2017In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical ... More

ARMageddon: Cache Attacks on Mobile DevicesNov 16 2015Jun 19 2016In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM ... More

Large Charge Four-Dimensional Non-Extremal N=2 Black Holes with R^2-TermsFeb 22 2009Nov 08 2009We consider N=2 supergravity in four dimensions with small R^2 curvature corrections. We construct large charge non-extremal black hole solutions in all space, with either a supersymmetric or a non-supersymmetric extremal limit, and analyze their thermodynamic ... More

A Suggestion for a Teleological Interpretation of Quantum MechanicsJun 14 2000Aug 04 2000We suggest solving the measurement problem by postulating the existence of a special future final boundary condition for the universe. Although this is an extension of the way boundary conditions are usually chosen (in terrestrial laboratories), it is ... More

ZombieLoad: Cross-Privilege-Boundary Data SamplingMay 14 2019In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space by exploiting side-effects from transient instructions. While this attack has been mitigated through stronger isolation boundaries between user and kernel space, ... More

Black Holes in Hořava Gravity with Higher Derivative Magnetic TermsMay 09 2010Jun 07 2011We consider Horava gravity coupled to Maxwell and higher derivative magnetic terms. We construct static spherically symmetric black hole solutions in the low-energy approximation. We calculate the horizon locations and temperatures in the near-extremal ... More

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU FeaturesNov 03 2017Double-fetch bugs are a special type of race condition, where an unprivileged execution thread is able to change a memory location between the time-of-check and time-of-use of a privileged execution thread. If an unprivileged attacker changes the value ... More

KeyDrown: Eliminating Keystroke Timing Side-Channel AttacksJun 20 2017Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Previously proposed ... More

Nethammer: Inducing Rowhammer Faults through Network RequestsMay 13 2018A fundamental assumption in software security is that memory contents do not change unless there is a legitimate deliberate modification. Classical fault attacks show that this assumption does not hold if the attacker has physical access. Rowhammer attacks ... More

An energy-resolved atomic scanning probeOct 06 2016Nov 21 2018We propose a method to probe the local density of states (LDOS) of atomic systems that provides both spatial and energy resolution. The method combines atomic and tunneling techniques to supply a simple, yet quantitative and operational, definition of ... More

Page Cache AttacksJan 04 2019We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including ... More

Spectre Attacks: Exploiting Speculative ExecutionJan 03 2018Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to execute ... More

Another Flip in the Wall of Rowhammer DefensesOct 02 2017Jan 31 2018The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated Rowhammer countermeasures have been presented, aiming at mitigating the Rowhammer bug or ... More

A Systematic Evaluation of Transient Execution Attacks and DefensesNov 13 2018Modern processor optimizations such as branch prediction and out-of-order execution are crucial for performance. Recent research on transient execution attacks including Spectre and Meltdown showed, however, that exception or branch misprediction events ... More

A Systematic Evaluation of Transient Execution Attacks and DefensesNov 13 2018Feb 20 2019Modern CPU optimizations such as branch prediction and out-of-order execution are crucial for performance. Recent research on transient execution attacks including Spectre and Meltdown showed, however, that exception or branch misprediction events may ... More

MeltdownJan 03 2018The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order ... More

Large Charge Four-Dimensional Extremal N=2 Black Holes with R^2-TermsFeb 05 2009Nov 08 2009We consider N=2 supergravity in four dimensions with small R^2 curvature corrections. We construct large charge extremal supersymmetric and non-supersymmetric black hole solutions in all space, and analyze their thermodynamic properties.

On the Entropy of Four-Dimensional Near-Extremal N=2 Black Holes with R^2-TermsAug 20 2007Jun 07 2011We consider the entropy of four-dimensional near-extremal N=2 black holes. Without R^2-terms, the Bekenstein-Hawking entropy formula has the structure of the extremal black holes entropy with a shift of the charges depending on the non-extremality parameter ... More

Two-time interpretation of quantum mechanicsJul 28 2005We suggest an interpretation of quantum mechanics, inspired by the ideas of Aharonov et al. of a time-symmetric description of quantum theory. We show that a special final boundary condition for the Universe, may be consistently defined as to determine ... More

Measurement and Collapse within the Two-State-Vector FormalismJun 24 2014The notion of collapse is discussed and refined within the Two-State-Vector Formalism (TSVF). We show how a definite result of a measurement can be fully determined when considering specific forward and backward-evolving quantum states. Moreover, we show ... More

Casimir force in O(n) lattice models with a diffuse interfaceJun 23 2008On the example of the spherical model we study, as a function of the temperature $T$, the behavior of the Casimir force in O(n) systems with a diffuse interface and slab geometry $\infty^{d-1}\times L$, where $2<d<4$ is the dimensionality of the system. ... More

Fragmentation in Kinematically Cold DisksJan 16 2001Gravity is scale free. Thus gravity may form similar structures in self-gravitating systems on different scales. Indeed, observations of the interstellar medium, spiral disks and cosmic structures, reveal similar characteristics. The structures in these ... More

A Field Range Bound for General Single-Field InflationNov 13 2011We explore the consequences of a detection of primordial tensor fluctuations for general single-field models of inflation. Using the effective theory of inflation, we propose a generalization of the Lyth bound. Our bound applies to all single-field models ... More

Extending polynomials in maximal and minimal idealsOct 20 2009Feb 08 2010Given an homogeneous polynomial on a Banach space $E$ belonging to some maximal or minimal polynomial ideal, we consider its iterated extension to an ultrapower of $E$ and prove that this extension remains in the ideal and has the same ideal norm. As ... More

Unconditionality in tensor products and ideals of polynomials, multilinear forms and operatorsJun 17 2009Feb 08 2010We study tensor norms that destroy unconditionality in the following sense: for every Banach space $E$ with unconditional basis, the $n$-fold tensor product of $E$ (with the corresponding tensor norm) does not have unconditional basis. We establish an ... More

Five basic lemmas for symmetric tensor products of normed spacesMay 18 2011We give the symmetric version of five lemmas which are essential for the theory of tensor products (and norms). These are: the approximation, extension, embedding, density and local technique lemmas. Some application of these tools to the metric theory ... More

Scaling Laws in Self-Gravitating DisksApr 16 1999The interstellar medium (ISM) reveals strongly inhomogeneous structures at every scale. These structures do not seem completely random since they obey certain power laws. Larson's law (\citeyear{Larson81}) $\sigma \propto R^{\delta}$ and the plausible ... More

Supergravity for Effective TheoriesSep 01 2011Higher-derivative operators are central elements of any effective field theory. In supersymmetric theories, these operators include terms with derivatives in the K\"ahler potential. We develop a toolkit for coupling such supersymmetric effective field ... More

Inflating with BaryonsSep 15 2010We present a field theory solution to the eta problem. By making the inflaton field the phase of a baryon of SU(N_c) supersymmetric Yang-Mills theory we show that all operators that usually spoil the flatness of the inflationary potential are absent. ... More

Formalizing and Checking Thread Refinement for Data-Race-Free Execution Models (Extended Version)Oct 24 2015When optimizing a thread in a concurrent program (either done manually or by the compiler), it must be guaranteed that the resulting thread is a refinement of the original thread. Most theories of valid optimizations are formulated in terms of valid syntactic ... More

Desensitizing Inflation from the Planck ScaleApr 21 2010A new mechanism to control Planck-scale corrections to the inflationary eta parameter is proposed. A common approach to the eta problem is to impose a shift symmetry on the inflaton field. However, this symmetry has to remain unbroken by Planck-scale ... More

Signatures of Supersymmetry from the Early UniverseSep 01 2011Oct 11 2011Supersymmetry plays a fundamental role in the radiative stability of many inflationary models. Spontaneous breaking of the symmetry inevitably leads to fields with masses of order the Hubble scale during inflation. When these fields couple to the inflaton ... More

The symmetric Radon-Nikodým property for tensor normsMay 15 2010We introduce the symmetric-Radon-Nikod\'ym property (sRN property) for finitely generated s-tensor norms $\beta$ of order $n$ and prove a Lewis type theorem for s-tensor norms with this property. As a consequence, if $\beta$ is a projective s-tensor norm ... More

Long-Range Correlations in Self-Gravitating N-Body SystemsJan 29 2002Observed self-gravitating systems reveal often fragmented non-equilibrium structures that feature characteristic long-range correlations. However, models accounting for non-linear structure growth are not always consistent with observations and a better ... More

Lumpy Structures in Self-Gravitating DisksMay 29 2001Following Toomre & Kalnajs (1991), local models of slightly dissipative self-gravitating disks show how inhomogeneous structures can be maintained over several galaxy rotations. Their basic physical ingredients are self-gravity, dissipation and differential ... More

Equilateral Non-Gaussianity and New Physics on the HorizonFeb 25 2011Mar 23 2011We examine the effective theory of single-field inflation in the limit where the scalar perturbations propagate with a small speed of sound. In this case the non-linearly realized time-translation symmetry of the Lagrangian implies large interactions, ... More

Natural symmetric tensor normsFeb 22 2010Dec 14 2010In the spirit of the work of Grothendieck, we introduce and study natural symmetric n-fold tensor norms. We prove that there are exactly six natural symmetric tensor norms for $n\ge 3$, a noteworthy difference with the 2-fold case in which there are four. ... More

Contruction of holomorphic parameters invariant by change of variable in the Gauss-Manin connection of an holomorphic map to a discJan 20 2011When we consider a proper holomorphic map \ $\tilde{f}: X \to C$ \ of a complex manifold \ $X$ \ on a smooth complex curve \ $C$ \ with a critical value at a point \ $0$ \ in \ $C$, the choice of a local coordinate near this point allows to dispose of ... More

Finiteness of the space of n-cycles for a n-concave complex spaceAug 19 2015We show that for n $\ge$ 2 the space of closed n--cycles in a strongly n--concave complex space has a natural structure of reduced complex space locally of finite dimension and represents the functor "analytic family of n--cycles" parametrized by banach ... More

Self-Gravitating N-Body Systems out of EquilibriumOct 19 2000Real physical systems are often maintained off equilibrium by energy or matter flows. If these systems are far from equilibrium then the thermodynamical branch become unstable and fluctuations can lead them to other more stable states. These new states ... More

Deriving Procedural and Warning Instructions from Device and Environment ModelsJun 24 1995Jun 24 1995This study is centred on the generation of instructions for household appliances. We show how knowledge about a device, together with knowledge about the environment, can be used for reasoning about instructions. The information communicated by the instructions ... More

Fast Universal Quantum Computation with Railroad-switch Local HamiltoniansAug 28 2009Sep 30 2009We present two universal models of quantum computation with a time-independent, frustration-free Hamiltonian. The first construction uses 3-local (qubit) projectors, and the second one requires only 2-local qubit-qutrit projectors. We build on Feynman's ... More

Local Hamiltonians in Quantum ComputationAug 15 2008In this thesis, I investigate aspects of local Hamiltonians in quantum computing. First, I focus on the Adiabatic Quantum Computing model, based on evolution with a time dependent Hamiltonian. I show that to succeed using AQC, the Hamiltonian involved ... More

Fault-Tolerant Quantum Computation with Higher-Dimensional SystemsFeb 02 1998Instead of a quantum computer where the fundamental units are 2-dimensional qubits, we can consider a quantum computer made up of d-dimensional systems. There is a straightforward generalization of the class of stabilizer codes to d-dimensional systems, ... More

An Introduction to Quantum Error Correction and Fault-Tolerant Quantum ComputationApr 16 2009Quantum states are very delicate, so it is likely some sort of quantum error correction will be necessary to build reliable quantum computers. The theory of quantum error-correcting codes has some close ties to and some striking differences from the theory ... More

Khovanov homology for virtual tangles and applicationsDec 02 2012We extend the cobordism based categorification of the virtual Jones polynomial to virtual tangles. This extension is combinatorial and has semi-local properties. We use the semi-local property to prove an applications, i.e. we give a discussion of Lee's ... More

Modeling the response of a recovering SiPMNov 20 2015Mar 17 2016We develop from first principles a model to describe the average response of SiPM devices which takes into account the recovery of pixels during the incoming light pulse. Such effects can significantly affect SiPM response when exposed to a large number ... More

Attracting Lagrangian Coherent Structures on Riemannian manifoldsNov 20 2013Jul 24 2015It is a wide-spread convention to identify repelling Lagrangian Coherent Structures (LCSs) with ridges of the forward finite-time Lyapunov exponent (FTLE) field, and attracting LCSs with ridges of the backward FTLE. We show that in two-dimensional incompressible ... More

Scale Interactions and Galaxy EvolutionDec 13 2002To understand galaxies and their evolution, it is necessary to describe how the different scales interact: how the microscopic physics, such as star formation, or the large scale physics, such as galaxy interactions may modify the galaxy global shapes. ... More

Which thermal physics for gravitationally unstable media?Jun 10 1998We remind that the assumptions almost universally adopted among astronomers concerning the physics to use to describe rarefied cosmic gases remain often without justifications, mainly because the long range of gravitation invalidates the use of classical ... More

Chaos in GalaxiesFeb 22 2008After general considerations about limits of theories and models, where small changes may imply large effects, we discuss three cases in galactic astrophysics illustrating how galactic dynamics models may become insufficient when previously neglected ... More

Framing and the Self-Linking IntegralNov 14 2002Apr 02 2004The Gauss self-linking integral of an unframed knot is not a knot invariant, but it can be turned into an invariant by adding a correction term which requires adding extra structure to the knot. We collect the different definitions/theorems/proofs concerning ... More

An Overview of the State of the Art for Practical Quantum Key DistributionApr 21 2015May 15 2015This is an overview of the state of the art for practical quantum key distribution (QKD) as of March 2015. It is written by a non-expert for non-experts. Additions and corrections are welcome.

Magnetohydrodynamic simulations of the collapsar model for early and late evolution of gamma-ray burstsJan 06 2007I present results from magnetohydrodynamic (MHD) simulations of a gaseous envelope collapsing onto a black hole. These results support the notion that the collapsar model is one of most promising scenarios to explain the huge release of energy in a matter ... More

The MHD collapsar model for GRBs: an inflow produces an outflowDec 09 2005We present our recent results from numerical simulations of a magnetized flow in the vicinity of a black hole in the context of the collapsar model for GRBs. The simulations show that after an initial transient, the flow settles into a complex convolution ... More

Theory of Outflows in Cataclysmic VariablesNov 08 2004We review the main results from line-driven (LD) models of winds from accretion disks in cataclysmic variables (CVs). We consider LD disk wind models in the hydrodynamic (HD) and magnetohydrodynamic (MHD limits. We discuss the basic physical conditions ... More

Dynamics of radiatively inefficient flows accreting onto radiatively efficient black hole objectsOct 12 2006I present results from numerical simulations of gas dynamics outside luminous accretion disks in active galactic nuclei. The gas, gravitationally captured by a super massive black hole, can be driven away by the energy and momentum of the radiation emitted ... More

On MHD jet production in the collapsing and rotating envelopeFeb 24 2005Apr 21 2005We present results from axisymmetric, time-dependent hydrodynamical (HD) and magnetohydrodynamical (MHD) simulations of a gaseous envelope collapsing onto a black hole (BH). We consider gas with so small angular momentum that after an initial transient, ... More

Time Variability of Low Angular Momentum Flows Accreting onto Black Holes: A Natural Mechanism For Radiation FlaringSep 20 2004We present results from our magnetohydrodynamical simulations of accretion flows onto black holes. Our main focus is the interplay between inflows and related outflows. We consider applications of such flows to the Galatic center and low luminosity active ... More

On a possible node in the Sivers and Qiu-Sterman functionsMay 12 2011Jul 04 2011The possibility of a node in the x dependence of the Sivers and Qiu-Sterman functions is discussed in light of its importance for the experimental check of the overall sign change of the Sivers effect between semi-inclusive DIS and the Drell-Yan process. ... More

Transverse Lambda polarization at high energy collidersJul 19 2010Measurements of transverse polarization of Lambda hyperons produced in high energy pp collisions may help to address several open issues about Lambda production and polarization mechanisms, such as the amount of SU(3) breaking, the importance of gluons ... More

Sudakov suppression in azimuthal spin asymmetriesFeb 06 2001May 25 2001It is shown that transverse momentum dependent azimuthal spin asymmetries suffer from suppression due to Sudakov factors, in the region where the transverse momentum is much smaller than the large energy scale Q^2. The size and Q^2 dependence of this ... More

Transversity single spin asymmetriesJun 18 2001The theoretical aspects of two leading twist transversity single spin asymmetries, one arising from the Collins effect and one from the interference fragmentation functions, are reviewed. Issues of factorization, evolution and Sudakov factors for the ... More

Investigating the origins of transverse spin asymmetries at RHICFeb 05 1999Feb 22 1999We discuss possible origins of transverse spin asymmetries in hadron-hadron collisions and propose an explanation in terms of a chiral-odd T-odd distribution function with intrinsic transverse momentum dependence, which would signal a correlation between ... More

On derived categories of K3 surfaces, symplectic automorphisms and the Conway groupSep 25 2013Sep 09 2014In this note we interpret a recent result of Gaberdiel, Hohenegger and Volpato in terms of derived equivalences of K3 surfaces. We prove that there is a natural bijection between subgroups of the Conway group Co_1 with invariant lattice of rank at least ... More

Chow groups of K3 surfaces and spherical objectsSep 15 2008Feb 12 2009We show that for a K3 surface X the finitely generated subring R(X) of the Chow ring introduced by Beauville and Voisin is preserved under derived equivalences. This is proved by analyzing Chern characters of spherical bundles. As for a K3 surface X defined ... More

Stability conditions via spherical objectsSep 22 2010An object in the bounded derived category D^b(Coh(X)) of coherent sheaves on a complex projective K3 surface X is spherical if it is rigid and simple. Although spherical objects form only a discrete set in the moduli stack of complexes, they determine ... More

Generalized Calabi-Yau structures, K3 surfaces, and B-fieldsJun 10 2003Sep 27 2004Generalized Calabi-Yau structures, a notion recently introduced by Hitchin, are studied in the case of K3 surfaces. We show how they are related to the classical theory of K3 surfaces and to moduli spaces of certain SCFT as studied by Aspinwall and Morrison. ... More

Moduli spaces of hyperkaehler manifolds and mirror symmetryOct 15 2002Jun 10 2003These are notes of my lectures given at the school on intersection theory and moduli at the ICTP, Trieste. We construct moduli spaces of K3 surfaces and higherdimensional hyperkaehler manifolds, including moduli spaces of (2,2)-conformal field theories ... More

Finiteness results for hyperkaehler manifoldsSep 04 2001In this short note we prove that the number of deformation types of compact hyperkaehler manifolds with prescribed second cohomology and second Chern class is finite. The proof uses the finiteness result of Kollar and Matsusaka, a formula by Hitchin and ... More

Infinitesimal Variation of Harmonic Forms and Lefschetz DecompositionFeb 15 2001Apr 27 2001This paper studies the infinitesimal variation of the Lefschetz decomposition associated with a compatible sl_2-representation on a graded algebra. This allows to prove that the Jordan-Lefschetz property holds infinitesimally for the Kaehler Lie algebra ... More

New fusion rules and $\cR$-matrices for $SL(N)_q$ at roots of unityDec 10 1991Feb 11 1992We derive fusion rules for the composition of $q$-deformed classical representations (arising in tensor products of the fundamental representation) with semi-periodic representations of $SL(N)_q$ at roots of unity. We obtain full reducibility into semi-periodic ... More

Backreaction of Localised Sources in String CompactificationsSep 23 2013Localised sources such as D-branes or orientifold planes play an important role in many string compactifications that are relevant for phenomenology. The presence of these objects typically induces complicated dynamics in the compact dimensions such that ... More

Decomposition numbers for perverse sheavesMar 17 2008The purpose of this article is to set foundations for decomposition numbers of perverse sheaves, to give some methods to calculate them in simple cases, and to compute them concretely in two situations: for a simple (Kleinian) surface singularity, and ... More

Weak Forms of Monotonicity and Coordination-FreenessFeb 01 2012Our earlier work titled: "Win-move is Coordination-Free (Sometimes)" has shown that the classes of queries that can be distributedly computed in a coordination-free manner form a strict hierarchy depending on the assumptions of the model for distributed ... More

D0 Top Quark Results and their Dependence on Successful Grid ComputingJul 27 2005The heaviest known Fermion particle -- the top quark -- was discovered at Fermilab in the first run of the Tevatron in 1995. However, besides its mere existence one needs to study its properties precisely in order to verify or falsify the predictions ... More

Review on alpha_s at LEPNov 03 1999To measure the strong coupling alpha_s from event shape observables two ingredients are necessary. A perturbative prediction containing the dependence of observables on alpha_s and a description of the hadronisation process to match the perturbative prediction ... More

Testing the Standard Model in Top Quark DecaysOct 14 2006With its discovery in 1995 by the CDF and D0 collaborations the top quark completed the set of quarks expected by the Standard Model. It is predicted to have the same quantum numbers and couplings as the other up-type quarks. Albeit, only very few of ... More

CP violation, the CKM matrix and New PhysicsJan 23 2001Mar 22 2001Loop corrections for physics beyond the Standard Model are computed. DWe discuss the influence of new physics on CP-violating observables. Assuming the standard model gives a correct description of tree level processes, we show how a consistent procedure ... More

Transformation methods for evaluating approximations to the optimal exercise boundary for linear and nonlinear Black-Scholes equationsMay 05 2008The purpose of this survey chapter is to present a transformation technique that can be used in analysis and numerical computation of the early exercise boundary for an American style of vanilla options that can be modelled by class of generalized Black-Scholes ... More

Measurement of Normalised Multi-jet Cross Sections using Regularised Unfolding and Extraction of alpha_s(MZ) in DIS at High Q2Oct 17 2012New results on normalised inclusive jet, dijet and trijet differential cross sections in neutral current DIS based on a regularised unfolding procedure are presented. Compared to a previously published result on normalised multi-jet cross sections, the ... More

A field theory characterization of interacting adiabatic particles in cosmologyJun 08 2008We explore the adiabatic particle excitations of an interacting field in a cosmological background. By following the time-evolution of the quantum state corresponding to the particle excitation, we show how the basic properties characterizing the particle ... More

Particle propagation in cosmological backgroundsApr 03 2007We study the quantum propagation of particles in cosmological backgrounds, by considering a doublet of massive scalar fields propagating in an expanding universe, possibly filled with radiation. We focus on the dissipative effects related to the expansion ... More

Seeing the Collision of a Supernova with its Companion StarSep 02 2009The progenitors of Type Ia and some core collapse supernovae are thought to be stars in binary systems, but little observational evidence exists to confirm the hypothesis. We suggest that the collision of the supernova ejecta with its companion star should ... More

Analytical solutions of basic models in quantum opticsSep 18 2015The recent progress in the analytical solution of models invented to describe theoretically the interaction of matter with light on an atomic scale is reviewed. The methods employ the classical theory of linear differential equations in the complex domain ... More

Note on the Analytical Solution of the Rabi ModelOct 17 2012Nov 23 2012It is shown that a recent critique (arXiv:1210.1130 and arXiv:1211.4639) concerning the analytical solution of the Rabi model is unfounded.

On the Integrability of the Rabi ModelMar 12 2011Dec 20 2011The exact spectrum of the Rabi hamiltonian is analytically found for arbitrary coupling strength and detuning. I present a criterion for integrability of quantum systems containing discrete degrees of freedom which shows that in this case a finite symmetry ... More

Holonomic modules over Cherednik algebras, IAug 04 2016The goal of this paper is to generalize several basic results from the theory of $\cal{D}$-modules to the representation theory of rational Cherednik algebras. We relate characterizations of holonomic modules in terms of singular support and Gelfand-Kirillov ... More