Results for "Daniel Gruss"

total 25060took 0.13s
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScriptJul 24 2015Apr 05 2016A fundamental assumption in software security is that a memory location can only be modified by processes that may write to this memory location. However, a recent study has shown that parasitic effects in DRAM can change the content of a memory cell ... More
A Systematic Evaluation of Transient Execution Attacks and DefensesNov 13 2018May 15 2019Research on transient execution attacks including Spectre and Meltdown showed that exception or branch misprediction events might leave secret-dependent traces in the CPU's microarchitectural state. This observation led to a proliferation of new Spectre ... More
Fallout: Reading Kernel Writes From User SpaceMay 29 2019Recently, out-of-order execution, an important performance optimization in modern high-end processors, has been revealed to pose a significant security threat, allowing information leaks across security domains. In particular, the Meltdown attack leaks ... More
Graphene deflectometry for sensing molecular processes at the nanoscaleApr 08 2018Single-molecule sensing is at the core of modern biophysics and nanoscale science, from revolutionizing healthcare through rapid, low-cost sequencing to understanding various physical, chemical, and biological processes at their most basic level. However, ... More
Practical Enclave Malware with Intel SGXFeb 08 2019Modern CPU architectures offer strong isolation guarantees towards user applications in the form of enclaves. For instance, Intel's threat model for SGX assumes fully trusted enclaves, yet there is an ongoing debate on whether this threat model is realistic. ... More
Landauer's formula with finite-time relaxation: Kramers' crossover in electronic transportApr 11 2016Landauer's formula is the standard theoretical tool to examine ballistic transport in nano- and meso-scale junctions, but it necessitates that any variation of the junction with time must be slow compared to characteristic times of the system, e.g., the ... More
Master Equations for Electron Transport: The Limits of the Markovian LimitMay 01 2017Oct 16 2017Master equations are increasingly popular for the simulation of time-dependent electronic transport in nanoscale devices. Several recent Markovian approaches use "extended reservoirs" - explicit degrees of freedom associated with the electrodes - distinguishing ... More
Flush+Flush: A Fast and Stealthy Cache AttackNov 14 2015Apr 05 2016Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. ... More
NetSpectre: Read Arbitrary Memory over NetworkJul 27 2018In this paper, we present NetSpectre, a generic remote Spectre variant 1 attack. For this purpose, we demonstrate the first access-driven remote Evict+Reload cache attack over network, leaking 15 bits per hour. Beyond retrofitting existing attacks to ... More
Interaction-induced conducting-nonconducting transition of ultra-cold atoms in 1D optical latticesMar 22 2012Jun 26 2013The study of time-dependent, many-body transport phenomena is increasingly within reach of ultra-cold atom experiments. We show that the introduction of spatially inhomogeneous interactions, e.g., generated by optically-controlled collisions, induce negative ... More
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUsMay 14 2019Meltdown and Spectre exploit microarchitectural changes the CPU makes during transient out-of-order execution. Using side-channel techniques, these attacks enable leaking arbitrary data from memory. As state-of-the-art software mitigations for Meltdown ... More
An energy-resolved atomic scanning probeOct 06 2016The density of states is a concept that is ubiquitous in classical and quantum physics, since it quantifies the energy distribution of states available in a system. Spectroscopic means allow its measurement over the entirety of a system's energy spectrum, ... More
Malware Guard Extension: Using SGX to Conceal Cache AttacksFeb 28 2017Mar 01 2017In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical ... More
DRAMA: Exploiting DRAM Addressing for Cross-CPU AttacksNov 27 2015Jun 28 2016In cloud computing environments, multiple tenants are often co-located on the same multi-processor system. Thus, preventing information leakage between tenants is crucial. While the hypervisor enforces software isolation, shared hardware, such as the ... More
Malware Guard Extension: Using SGX to Conceal Cache AttacksFeb 28 2017May 22 2019In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical ... More
ARMageddon: Cache Attacks on Mobile DevicesNov 16 2015Jun 19 2016In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the scientific community and powerful techniques to exploit cache side channels have been developed. However, modern smartphones use one or more multi-core ARM ... More
Large Charge Four-Dimensional Non-Extremal N=2 Black Holes with R^2-TermsFeb 22 2009Nov 08 2009We consider N=2 supergravity in four dimensions with small R^2 curvature corrections. We construct large charge non-extremal black hole solutions in all space, with either a supersymmetric or a non-supersymmetric extremal limit, and analyze their thermodynamic ... More
A Suggestion for a Teleological Interpretation of Quantum MechanicsJun 14 2000Aug 04 2000We suggest solving the measurement problem by postulating the existence of a special future final boundary condition for the universe. Although this is an extension of the way boundary conditions are usually chosen (in terrestrial laboratories), it is ... More
ZombieLoad: Cross-Privilege-Boundary Data SamplingMay 14 2019In early 2018, Meltdown first showed how to read arbitrary kernel memory from user space by exploiting side-effects from transient instructions. While this attack has been mitigated through stronger isolation boundaries between user and kernel space, ... More
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU FeaturesNov 03 2017Double-fetch bugs are a special type of race condition, where an unprivileged execution thread is able to change a memory location between the time-of-check and time-of-use of a privileged execution thread. If an unprivileged attacker changes the value ... More
Black Holes in Hořava Gravity with Higher Derivative Magnetic TermsMay 09 2010Jun 07 2011We consider Horava gravity coupled to Maxwell and higher derivative magnetic terms. We construct static spherically symmetric black hole solutions in the low-energy approximation. We calculate the horizon locations and temperatures in the near-extremal ... More
Nethammer: Inducing Rowhammer Faults through Network RequestsMay 13 2018A fundamental assumption in software security is that memory contents do not change unless there is a legitimate deliberate modification. Classical fault attacks show that this assumption does not hold if the attacker has physical access. Rowhammer attacks ... More
An energy-resolved atomic scanning probeOct 06 2016Nov 21 2018We propose a method to probe the local density of states (LDOS) of atomic systems that provides both spatial and energy resolution. The method combines atomic and tunneling techniques to supply a simple, yet quantitative and operational, definition of ... More
Page Cache AttacksJan 04 2019We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including ... More
ConTExT: Leakage-Free Transient ExecutionMay 22 2019Out-of-order execution and speculative execution are among the biggest contributors to performance and efficiency of modern processors. However, they are inconsiderate, leaking secret data during the transient execution of instructions. Many solutions ... More
KeyDrown: Eliminating Keystroke Timing Side-Channel AttacksJun 20 2017Besides cryptographic secrets, side-channel attacks also leak sensitive user input. The most accurate attacks exploit cache timings or interrupt information to monitor keystroke timings and subsequently infer typed words and sentences. Previously proposed ... More
MeltdownJan 03 2018The security of computer systems fundamentally relies on memory isolation, e.g., kernel address ranges are marked as non-accessible and are protected from user access. In this paper, we present Meltdown. Meltdown exploits side effects of out-of-order ... More
Another Flip in the Wall of Rowhammer DefensesOct 02 2017Jan 31 2018The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated Rowhammer countermeasures have been presented, aiming at mitigating the Rowhammer bug or ... More
Spectre Attacks: Exploiting Speculative ExecutionJan 03 2018Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try guess the destination and attempt to execute ... More
A Systematic Evaluation of Transient Execution Attacks and DefensesNov 13 2018Modern processor optimizations such as branch prediction and out-of-order execution are crucial for performance. Recent research on transient execution attacks including Spectre and Meltdown showed, however, that exception or branch misprediction events ... More
A Systematic Evaluation of Transient Execution Attacks and DefensesNov 13 2018Feb 20 2019Modern CPU optimizations such as branch prediction and out-of-order execution are crucial for performance. Recent research on transient execution attacks including Spectre and Meltdown showed, however, that exception or branch misprediction events may ... More
Large Charge Four-Dimensional Extremal N=2 Black Holes with R^2-TermsFeb 05 2009Nov 08 2009We consider N=2 supergravity in four dimensions with small R^2 curvature corrections. We construct large charge extremal supersymmetric and non-supersymmetric black hole solutions in all space, and analyze their thermodynamic properties.
On the Entropy of Four-Dimensional Near-Extremal N=2 Black Holes with R^2-TermsAug 20 2007Jun 07 2011We consider the entropy of four-dimensional near-extremal N=2 black holes. Without R^2-terms, the Bekenstein-Hawking entropy formula has the structure of the extremal black holes entropy with a shift of the charges depending on the non-extremality parameter ... More
Two-time interpretation of quantum mechanicsJul 28 2005We suggest an interpretation of quantum mechanics, inspired by the ideas of Aharonov et al. of a time-symmetric description of quantum theory. We show that a special final boundary condition for the Universe, may be consistently defined as to determine ... More
Measurement and Collapse within the Two-State-Vector FormalismJun 24 2014The notion of collapse is discussed and refined within the Two-State-Vector Formalism (TSVF). We show how a definite result of a measurement can be fully determined when considering specific forward and backward-evolving quantum states. Moreover, we show ... More
Five basic lemmas for symmetric tensor products of normed spacesMay 18 2011We give the symmetric version of five lemmas which are essential for the theory of tensor products (and norms). These are: the approximation, extension, embedding, density and local technique lemmas. Some application of these tools to the metric theory ... More
Casimir force in O(n) lattice models with a diffuse interfaceJun 23 2008On the example of the spherical model we study, as a function of the temperature $T$, the behavior of the Casimir force in O(n) systems with a diffuse interface and slab geometry $\infty^{d-1}\times L$, where $2<d<4$ is the dimensionality of the system. ... More
Fragmentation in Kinematically Cold DisksJan 16 2001Gravity is scale free. Thus gravity may form similar structures in self-gravitating systems on different scales. Indeed, observations of the interstellar medium, spiral disks and cosmic structures, reveal similar characteristics. The structures in these ... More
A Field Range Bound for General Single-Field InflationNov 13 2011We explore the consequences of a detection of primordial tensor fluctuations for general single-field models of inflation. Using the effective theory of inflation, we propose a generalization of the Lyth bound. Our bound applies to all single-field models ... More
Extending polynomials in maximal and minimal idealsOct 20 2009Feb 08 2010Given an homogeneous polynomial on a Banach space $E$ belonging to some maximal or minimal polynomial ideal, we consider its iterated extension to an ultrapower of $E$ and prove that this extension remains in the ideal and has the same ideal norm. As ... More
Unconditionality in tensor products and ideals of polynomials, multilinear forms and operatorsJun 17 2009Feb 08 2010We study tensor norms that destroy unconditionality in the following sense: for every Banach space $E$ with unconditional basis, the $n$-fold tensor product of $E$ (with the corresponding tensor norm) does not have unconditional basis. We establish an ... More
Long-Range Correlations in Self-Gravitating N-Body SystemsJan 29 2002Observed self-gravitating systems reveal often fragmented non-equilibrium structures that feature characteristic long-range correlations. However, models accounting for non-linear structure growth are not always consistent with observations and a better ... More
Lumpy Structures in Self-Gravitating DisksMay 29 2001Following Toomre & Kalnajs (1991), local models of slightly dissipative self-gravitating disks show how inhomogeneous structures can be maintained over several galaxy rotations. Their basic physical ingredients are self-gravity, dissipation and differential ... More
Equilateral Non-Gaussianity and New Physics on the HorizonFeb 25 2011Mar 23 2011We examine the effective theory of single-field inflation in the limit where the scalar perturbations propagate with a small speed of sound. In this case the non-linearly realized time-translation symmetry of the Lagrangian implies large interactions, ... More
Natural symmetric tensor normsFeb 22 2010Dec 14 2010In the spirit of the work of Grothendieck, we introduce and study natural symmetric n-fold tensor norms. We prove that there are exactly six natural symmetric tensor norms for $n\ge 3$, a noteworthy difference with the 2-fold case in which there are four. ... More
Formalizing and Checking Thread Refinement for Data-Race-Free Execution Models (Extended Version)Oct 24 2015When optimizing a thread in a concurrent program (either done manually or by the compiler), it must be guaranteed that the resulting thread is a refinement of the original thread. Most theories of valid optimizations are formulated in terms of valid syntactic ... More
Desensitizing Inflation from the Planck ScaleApr 21 2010A new mechanism to control Planck-scale corrections to the inflationary eta parameter is proposed. A common approach to the eta problem is to impose a shift symmetry on the inflaton field. However, this symmetry has to remain unbroken by Planck-scale ... More
Signatures of Supersymmetry from the Early UniverseSep 01 2011Oct 11 2011Supersymmetry plays a fundamental role in the radiative stability of many inflationary models. Spontaneous breaking of the symmetry inevitably leads to fields with masses of order the Hubble scale during inflation. When these fields couple to the inflaton ... More
Scaling Laws in Self-Gravitating DisksApr 16 1999The interstellar medium (ISM) reveals strongly inhomogeneous structures at every scale. These structures do not seem completely random since they obey certain power laws. Larson's law (\citeyear{Larson81}) $\sigma \propto R^{\delta}$ and the plausible ... More
Supergravity for Effective TheoriesSep 01 2011Higher-derivative operators are central elements of any effective field theory. In supersymmetric theories, these operators include terms with derivatives in the K\"ahler potential. We develop a toolkit for coupling such supersymmetric effective field ... More
Inflating with BaryonsSep 15 2010We present a field theory solution to the eta problem. By making the inflaton field the phase of a baryon of SU(N_c) supersymmetric Yang-Mills theory we show that all operators that usually spoil the flatness of the inflationary potential are absent. ... More
Mutation and Gauge Theory I: Yang-Mills InvariantsOct 29 1997Mutation is an operation on 3-manifolds containing an embedded surface of genus 2. It is defined by cutting along the surface and regluing using the `hyperelliptic' involution, and is known to preserve many 3-manifold invariants. I show that mutation ... More
Embedding tangles in linksJan 25 2000We reprove and extend a result of David Krebes (J. Knot Theory Ramif. 8 (1999), 321-352) giving an obstruction to embedding a tangle T into a link L. Closing the tangle up in the two obvious ways gives rise to two links, the numerator and denominator ... More
Fault-Tolerant Quantum Computation with Constant OverheadOct 10 2013Jul 22 2014What is the minimum number of extra qubits needed to perform a large fault-tolerant quantum circuit? Working in a common model of fault-tolerance, I show that in the asymptotic limit of large circuits, the ratio of physical qubits to logical qubits can ... More
On the Theory of Quantum Secret SharingOct 14 1999I present a variety of results on the theory of quantum secret sharing. I show that any mixed state quantum secret sharing scheme can be derived by discarding a share from a pure state scheme, and that the size of each share in a quantum secret sharing ... More
Quantum transport in quantum networks and photosynthetic complexes at the steady stateJun 09 2012Feb 25 2013Recently, several works have analysed the efficiency of photosynthetic complexes in a transient scenario and how that efficiency is affected by environmental noise. Here, following a quantum master equation approach, we study the energy and excitation ... More
Information and Entanglement Measures in Quantum Systems With Applications to Atomic PhysicsMar 16 2011This thesis is a multidisciplinary contribution to the information theory of single-particle Coulomb systems in their relativistic and not relativistic description, to the theory of special functions of mathematical physics with the proposal and analysis ... More
The de Broglie Wave as Evidence of a Deeper Wave StructureMar 06 2015Aug 08 2015It is argued that the de Broglie wave is not the wave usually supposed, but the relativistically induced modulation of an underlying carrier wave that moves with the velocity of the particle. In the rest frame of the particle this underlying structure ... More
Rule-Based Semantic Tagging. An Application Undergoing Dictionary GlossesMay 16 2013May 17 2013The project presented in this article aims to formalize criteria and procedures in order to extract semantic information from parsed dictionary glosses. The actual purpose of the project is the generation of a semantic network (nearly an ontology) issued ... More
The unfolded universe of elementary particles. A geometric explanation of the standard model structureJan 16 2016We propose a geometric explanation of the standard model of Glashow, Weinberg and Salam for the known elementary particles. Our model is a generic Quantum Field Theory in dimension four, obtained by developing along a Lorentz sub-manifold the lagrangian ... More
Generalization of Gabidulin Codes over Fields of Rational FunctionsDec 15 2014We transpose the theory of rank metric and Gabidulin codes to the case of fields which are not finite fields. The Frobenius automorphism is replaced by any element of the Galois group of a cyclic algebraic extension of a base field. We use our framework ... More
Two semi-coninuity results for the algebraic dimension of compact complex manifoldsApr 07 2014Using some relative codimension 1 cycle-space method, we give, following the ideas of D. Popovici [P.13], semicontinuity results for the algebraic dimension in a family a compact complex manifolds parametrized by a disc.
Towards More Data-Aware Application Integration (extended version)Apr 22 2015Although most business application data is stored in relational databases, programming languages and wire formats in integration middleware systems are not table-centric. Due to costly format conversions, data-shipments and faster computation, the trend ... More
Liquidity, risk measures, and concentration of measureOct 23 2015Oct 27 2015Expanding on techniques of concentration of measure, we develop a quantitative framework for modeling liquidity risk using convex risk measures. The fundamental objects of study are curves of the form $(\rho(\lambda X))_{\lambda \ge 0}$, where $\rho$ ... More
Law invariant risk measures and information divergencesOct 23 2015Jun 04 2016A one-to-one correspondence is drawn between law invariant risk measures and divergences, which we define as functionals of pairs of probability measures on arbitrary standard Borel spaces satisfying a few natural properties. Divergences include many ... More
Connecting the generalized robustness and the geometric measure of entanglementFeb 02 2006Jan 07 2008The main goal of this paper is to provide a connection between the generalized robustness of entanglement ($R_g$) and the geometric measure of entanglement ($E_{GME}$). First, we show that the generalized robustness is always higher than or equal to the ... More
Asteroseismology of Eclipsing Binary Stars in the Kepler EraApr 29 2014Eclipsing binary stars have long served as benchmark systems to measure fundamental stellar properties. In the past few decades, asteroseismology - the study of stellar pulsations - has emerged as a new powerful tool to study the structure and evolution ... More
Ferromagnetism, antiferromagnetism, and the curious nematic phase of S=1 quantum spin systemsJun 09 2014Apr 23 2015We investigate the phase diagram of S=1 quantum spin systems with SU(2)-invariant interactions, at low temperatures and in three spatial dimensions. Symmetry breaking and the nature of pure states can be studied using random loop representations. The ... More
Symplectic automorphisms of K3 surfaces of arbitrary orderMay 15 2012It is observed that the recent result of Voisin and earlier ones of the author suffice to prove in complete generality that symplectic automorphisms of finite order of a K3 surface X act as identity on the Chow group CH^2(X) of zero-cycles.
Projectivity of Kaehler manifolds - Kodaira's problem (after C. Voisin)Dec 01 2005In this expository paper (Bourbaki talk) we survey results of Claire Voisin showing that there exist compact Kaehler manifolds which are not homeomorphic to any projective manifold.
A short proof of a Theorem by HopfJul 24 2015A proof based on the Chern-Gauss-Bonnet Theorem is given to Hopf Theorem concerning the degree of the Gauss map of a hypersurface in $\mathbb{R}^n$.
Asymmetric parton distributions of the nucleonSep 01 2012This contribution to CIPANP 2012 highlights what we have learned about the asymmetric parton distributions of the nucleon over the past 20 years. These distributions include the transverse momentum dependent parton distributions describing spin-orbit ... More
Theoretical aspects of transversity observablesSep 24 2001Theoretical aspects of transversity observables are reviewed. The main focus is on two leading twist transversity single spin asymmetries, one arising from the Collins effect and one from the interference fragmentation functions. Electron-positron annihilation ... More
Theoretical aspects of spin physicsDec 11 2003A summary is given of how spin enters in collinearly factorizing processes. Next, theoretical aspects of polarization in processes beyond collinear factorization are discussed in more detail, with special focus on recent developments concerning the color ... More
The influence of the first term of an arithmetic progressionApr 13 2011The goal of this article is to study the discrepancy of the distribution of arithmetic sequences in arithmetic progressions. We will fix a sequence $\A=\{\a(n)\}_{n\geq 1}$ of non-negative real numbers in a certain class of arithmetic sequences. For a ... More
On Automorphisms and Universal R-Matrices at Roots of UnityMar 18 1994Invertible universal R-matrices of quantum Lie algebras do not exist at roots of unity. There exist however quotients for which intertwiners of tensor products of representations always exist, i.e. R-matrices exist in the representations. One of these ... More
Fusion Rules and R-Matrices For Representations of $SL(2)_q$ at Roots of UnityMar 04 1992We recall the classification of the irreducible representations of $SL(2)_q$, and then give fusion rules for these representations. We also consider the problem of $\cR$-matrices, intertwiners of the differently ordered tensor products of these representations, ... More
Non integrable representations of the restricted quantum analogue of sl(3) at roots of 1Oct 22 1996Feb 27 1997The structure of irreducible representations of (restricted) U_q(sl(3)) at roots of unity is understood within the Gelfand--Zetlin basis. The latter needs a weakened definition for non integrable representations, where the quadratic Casimir operator of ... More
Thin tubes in mathematical physics, global analysis and spectral geometryFeb 19 2008A thin tube is an $n$-dimensional space which is very thin in $n-1$ directions, compared to the remaining direction, for example the $\epsilon$-neighborhood of a curve or an embedded graph in $\R^n$ for small $\epsilon$. The Laplacian on thin tubes and ... More
Basics of the b-calculusOct 31 2000R. B. Melrose's b-calculus provides a framework for dealing with problems of partial differential equations that arise in singular or degenerate geometric situations. This article is a somewhat informal short course introducing many of the basic ideas ... More
Finding the Most Distant Quasars Using Bayesian Selection MethodsMay 19 2014Quasars, the brightly glowing disks of material that can form around the super-massive black holes at the centres of large galaxies, are amongst the most luminous astronomical objects known and so can be seen at great distances. The most distant known ... More
On extensions of the Alon-Tarsi Latin Square conjectureApr 24 2012Sep 03 2012Expressions involving the product of the permanent with the (n-1)th power of the determinant of a matrix of indeterminates, and of (0,1)-matrices, are shown to be related to two conjectures that extend the Alon-Tarsi Latin square conjecture to odd dimensions. ... More
A Characterization of Binary Matroids by Basis-ExchangeDec 12 2011Mar 01 2012The effect of replacing a basis element on the way the basis spans other elements is studied. This leads to a new characterization of binary matroids.
Adding flavor on the Higgs branchMay 22 2008We study the holographic dual of the Higgs branch of N=4 SYM in four dimensions coupled to quenched fundamental matter. The fundamentals are added via flavor D7-branes and the Higgs phase is obtained when the color D3-branes and the flavor D7-branes recombine ... More
Condensates and quasiparticles in inflationary cosmology: mass generation and decay widthsMar 17 2012Jun 18 2012During de Sitter inflation massless particles of minimally coupled scalar fields acquire a mass and a decay width thereby becoming \emph{quasiparticles}. For bare massless particles non-perturbative infrared radiative corrections lead to a self-consistent ... More
Short baseline neutrino oscillations: when entanglement suppresses coherenceJun 30 2011Sep 01 2011For neutrino oscillations to take place the entangled quantum state of a neutrino and a charged lepton produced via charged current interactions must be disentangled. Implementing a non-perturbative Wigner-Weisskopf method we obtain the correct \emph{entangled} ... More
Fermionic influence (action) on inflationary fluctuationsFeb 17 2016Apr 13 2016Motivated by apparent persistent large scale anomalies in the CMB we study the influence of fermionic degrees of freedom on the dynamics of inflaton fluctuations as a possible source of violations of (nearly) scale invariance on cosmological scales. We ... More
Free streaming in mixed dark matterNov 03 2007Dec 14 2007Free streaming in a \emph{mixture} of collisionless non-relativistic dark matter (DM) particles is studied by implementing methods from the theory of multicomponent plasmas. The mixture includes Fermionic, condensed and non condensed Bosonic particles ... More
On Weak Hamiltonicity of a Random HypergraphOct 27 2014A {\it weak (Berge) cycle} is an alternating sequence of vertices and (hyper)edges $C=(v_0, e_1, v_1, ..., v_{\ell-1}, e_\ell, v_{\ell}=v_0)$ such that the vertices $v_0, ..., v_{\ell-1}$ are distinct with $v_k, v_{k+1} \in e_{k}$ for each $k$, but the ... More
A multivariate Gnedenko law of large numbersJan 25 2011Oct 21 2013We show that the convex hull of a large i.i.d. sample from an absolutely continuous log-concave distribution approximates a predetermined convex body in the logarithmic Hausdorff distance and in the Banach-Mazur distance. For log-concave distributions ... More
A parton recombination approach to heavy ion collisions at RHIC and LHCJan 23 2009This thesis discusses the phenomenological parton recombination approach to describe hadronization in heavy ion collisions. The very good agreement to RHIC data for the flow coefficients v_2 and v_4 is shown and extrapolations are used to make predictions ... More
Decomposition width - a new width parameter for matroidsApr 17 2009We introduce a new width parameter for matroids called decomposition width and prove that every matroid property expressible in the monadic second order logic can be computed in linear time for matroids with bounded decomposition width if their decomposition ... More
Properties of the Top QuarkMay 14 2010Sep 16 2011The top quark was discoverd at the CDF and D0 experiments in 1995. As the partner of the bottom quark its properties within the Standard Model are fully defined. Only the mass is a free parameter. The measurement of the top quark mass and the verification ... More
Chiral Perturbation Theory on the Lattice and its ApplicationsJun 09 2004Chiral perturbation theory (CPT), the low-energy effective theory of QCD, can be used to describe QCD observables in the low-energy region in a model-independent way. At any given order in the chiral expansion, CPT introduces a finite number of parameters ... More
Quasiparticle excitations in relativistic quantum field theoryJan 28 2008Dec 05 2008We analyze the particle-like excitations arising in relativistic field theories in states different than the vacuum. The basic properties characterizing the quasiparticle propagation are studied using two different complementary methods. First we introduce ... More
Particle propagation in non-trivial backgrounds: a quantum field theory approachJul 26 2007Sep 13 2007The basic aim of the thesis is the study of the propagation of particles and quasiparticles in non-trivial backgrounds from the quantum field theory point of view. By "non-trivial background" we mean either a non-vacuum state in Minkowski spacetime or ... More
General-Purpose Join Algorithms for Listing Triangles in Large GraphsJan 27 2015We investigate applying general-purpose join algorithms to the triangle listing problem in an out-of-core context. In particular, we focus on Leapfrog Triejoin (LFTJ) by Veldhuizen 2014, a recently proposed, worst-case optimal algorithm. We present "boxing": ... More
A note on polynomial solvability of the CDT problemJun 25 2014Feb 23 2015We describe a simple polynomial-time algorithm for the CDT problem that relies on a construction of Barvinok.
W Mass as a Calibration of the Jet Energy Scale at ATLASSep 17 2008Nov 14 2008Top-antitop pairs will be copiously produced at the LHC, at a rate of roughly one per second at a luminosity of10^{33} cm^{-2} s^{-1}. These events have low background and produce large numbers of jets via the hadronic decay of the W's which may be used ... More