total 1583took 0.09s

Code generator matrices as RNG conditionersFeb 05 2015Mar 02 2017We quantify precisely the distribution of the output of a binary random number generator (RNG) after conditioning with a binary linear code generator matrix by showing the connection between the Walsh spectrum of the resulting random variable and the ... More

Hilbert quasi-polynomial for order domains and application to coding theoryJul 25 2016Feb 02 2018We present an application of Hilbert quasi-polynomials to order domains, allowing the effective check of the second order-domain condition in a direct way. We also provide an improved algorithm for the computation of the related Hilbert quasi-polynomials. ... More

Key-Policy Multi-Authority Attribute-Based EncryptionDec 13 2014Feb 04 2016Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose ... More

Hilbert quasi-polynomial for order domain codesJul 25 2016We present an application of Hilbert quasi-polynomials to order domain codes, allowing the effective computation of the order domain condition in a direct way. We also provide an improved and specialized algorithm for the computation of the related Hilbert ... More

A proof of security for a key-policy RS-ABE schemeMar 21 2016A revocable-storage attribute-based encryption (RS-ABE) scheme is an encryption scheme which extends attribute-based encryption by intro- ducing user revocation. A key-policy RS-ABE scheme links each key to an access structure. We propose a new key-policy ... More

Several Proofs of Security for a Tokenization AlgorithmSep 01 2016In this paper we propose a tokenization algorithm of the Reversible Hybrid type, based on a block cipher with a secret key and (possibly public) additional input. We provide some formal proofs of security for it.

A note on an infeasible linearization of some block ciphersNov 07 2015Feb 02 2017A block cipher can be easily broken if its encryption functions can be seen as linear maps on a small vector space. Even more so, if its round functions can be seen as linear maps on a small vector space. We show that this cannot happen for the AES. More ... More

On the security of the Blockchain Bix Protocol and CertificatesJul 28 2016The BIX protocol is a blockchain-based protocol that allows distribution of certificates linking a subject with his public key, hence providing a service similar to that of a PKI but without the need of a CA. In this paper we analyze the security of the ... More

On differential uniformity of maps that may hide an algebraic trapdoorJan 17 2015Jun 11 2015We investigate some differential properties for permutations in the affine group, of a vector space V over the binary field, with respect to a new group operation $\circ$, inducing an alternative vector space structure on $V$ .

A generalization of bounds for cyclic codes, including the HT and BS boundsJun 20 2013We use the algebraic structure of cyclic codes and some properties of the discrete Fourier transform to give a reformulation of several classical bounds for the distance of cyclic codes, by extending techniques of linear algebra. We propose a bound, whose ... More

A deterministic algorithm for the distance and weight distribution of binary nonlinear codesMay 04 2015May 05 2015Given a binary nonlinear code, we provide a deterministic algorithm to compute its weight and distance distribution, and in particular its minimum weight and its minimum distance, which takes advantage of fast Fourier techniques. This algorithm's performance ... More

Generalized AG codes as evaluation codesDec 23 2012We extend the construction of GAG codes to the case of evaluation codes. We estimate the minimum distance of these extended evaluation codes and we describe the connection to the one-point GAG codes.

A bound on the size of linear codesFeb 10 2009Jun 27 2012We present a bound on the size of linear codes. This bound is independent of other known bounds, e.g. the Griesmer bound.

Intersections between the norm-trace curve and some low degree curvesDec 20 2018In this paper we analyze the intersection between the norm-trace curve over $\mathbb{F}_{q^3}$ and the curves of the form $y=ax^3+bx^2+cx+d$, giving a complete characterization of the intersection between the curve and the parabolas, as well as sharp ... More

On the Hermitian curve and its intersections with some conicsFeb 16 2014We classify completely the intersections of the Hermitian curve with parabolas in the affine plane. To obtain our results we employ well-known algebraic methods for finite fields and geometric properties of the curve automorphisms. In particular, we provide ... More

On the Hermitian curve, its intersections with some conics and their applications to affine-variety codes and Hermitian codesAug 08 2012Sep 12 2012For any affine-variety code we show how to construct an ideal whose solutions correspond to codewords with any assigned weight. We classify completely the intersections of the Hermitian curve with lines and parabolas (in the $\mathbb{F}_{q^2}$ affine ... More

Several Proofs of Security for a Tokenization AlgorithmSep 01 2016Oct 13 2016In this paper we propose a tokenization algorithm of Reversible Hybrid type, as defined in PCI DSS guidelines for designing a tokenization solution, based on a block cipher with a secret key and (possibly public) additional input. We provide some formal ... More

Several Proofs of Security for a Tokenization AlgorithmSep 01 2016Feb 01 2017In this paper we propose a tokenization algorithm of Reversible Hybrid type, as defined in PCI DSS guidelines for designing a tokenization solution, based on a block cipher with a secret key and (possibly public) additional input. We provide some formal ... More

Abelian regular subgroups of the affine group and radical ringsOct 08 2005Apr 20 2006We establish a link between abelian regular subgroup of the affine group, and commutative, associative algebra structures on the underlying vector space that are (Jacobson) radical rings. As an application, we show that if the underlying field has positive ... More

Quasi-cyclic LDPC codes with high girthJun 18 2009We study a class of quasi-cyclic LDPC codes. We provide precise conditions guaranteeing high girth in their Tanner graph. Experimentally, the codes we propose perform no worse than random LDPC codes with their same parameters, which is a significant achievement ... More

On optimal nonlinear systematic codesJun 10 2015Feb 11 2016Most bounds on the size of codes hold for any code, whether linear or not. Notably, the Griesmer bound holds only in the linear case and so optimal linear codes are not necessarily optimal codes. In this paper we identify code parameters $(q,d,k)$, namely ... More

Computing the distance distribution of systematic non-linear codesSep 09 2009The most important families of non-linear codes are systematic. A brute-force check is the only known method to compute their weight distribution and distance distribution. On the other hand, it outputs also all closest word pairs in the code. In the ... More

Some bounds on the size of codesJun 26 2012Dec 27 2012We present some upper bounds on the size of non-linear codes and their restriction to systematic codes and linear codes. These bounds are independent of other known theoretical bounds, e.g. the Griesmer bound, the Johnson bound or the Plotkin bound, and ... More

A possible intrinsic weakness of AES and other cryptosystemsJun 30 2010Nov 11 2010It has been suggested that the algebraic structure of AES (and other similar block ciphers) could lead to a weakness exploitable in new attacks. In this paper, we use the algebraic structure of AES-like ciphers to construct a cipher embedding where the ... More

Code generator matrices as entropy extractorsFeb 05 2015We show the connection between the Walsh spectrum of the output of a binary random number generator (RNG) and the bias of individual bits, and use this to show how previously known bounds on the performance of linear binary codes as entropy extractors ... More

A note on an infeasible linearization of some block ciphersNov 07 2015Nov 20 2015A block cipher can be easily broken if its encryption functions can be seen as linear maps on a small vector space. Even more so, if its round functions can be seen as linear maps on a small vector space. We show that this cannot happen for the AES. More ... More

Do AES encryptions act randomly?Nov 11 2010The Advanced Encryption Standard (AES) is widely recognized as the most important block cipher in common use nowadays. This high assurance in AES is given by its resistance to ten years of extensive cryptanalysis, that has shown no weakness, not even ... More

A weight-distribution bound for entropy extractors using linear binary codesMay 12 2014We consider a bound on the bias reduction of a random number generator by processing based on binary linear codes. We introduce a new bound on the total variation distance of the processed output based on the weight distribution of the code generated ... More

Improved decoding of affine-variety codesFeb 21 2011Dec 20 2011General error locator polynomials are polynomials able to decode any correctable syndrome for a given linear code. Such polynomials are known to exist for all cyclic codes and for a large class of linear codes. We provide some decoding techniques for ... More

Complexity of multivariate polynomial evaluationJun 14 2011We describe a method to evaluate multivariate polynomials over a finite field and discuss its multiplicative complexity.

An algorithmic approach using multivariate polynomials for the nonlinearity of Boolean functionsOct 19 2016The nonlinearity of a Boolean function is a key property in deciding its suitability for cryptographic purposes, e.g. as a combining function in stream ciphers, and so the nonlinearity computation is an important problem for applications. Traditional ... More

Permutation equivalent maximal irreducible Goppa codesJun 10 2008We consider the problem of finding the number of permutation non-equivalent classical irreducible maximal Goppa codes having fixed parameters q, n and r from a group theory point of view.

The role of Boolean functions in hiding sums as trapdoors for some block ciphersNov 27 2014Jan 16 2015Most modern block ciphers are built using components whose cryptographic strength is evaluated in terms of their resistance to attacks on the whole cipher. In particular, differential properties of vectorial Boolean functions are studied for the S-Boxes ... More

On the unirationality of 3-fold conic bundlesMar 27 2014A variety is unirational if it is dominated by a rational variety. A variety is rationally connected if two general points can be joined by a rational curve. This paper aims to show that the two notions can cooperate and, building on Graber-Harris-Starr ... More

Flexoelectricity from density-functional perturbation theoryJun 18 2013Sep 20 2013We derive the complete flexoelectric tensor, including electronic and lattice-mediated effects, of an arbitrary insulator in terms of the microscopic linear response of the crystal to atomic displacements. The basic ingredient, which can be readily calculated ... More

On causality of extreme eventsJan 26 2016May 19 2016Multiple metrics have been developed to detect causality relations between data describing the elements constituting complex systems, all of them considering their evolution through time. Here we propose a metric able to detect causality within static ... More

Exact Finite-Size-Scaling Corrections to the Critical Two-Dimensional Ising Model on a Torus. II. Triangular and hexagonal latticesOct 15 2001Feb 19 2002We compute the finite-size corrections to the free energy, internal energy and specific heat of the critical two-dimensional spin-1/2 Ising model on a triangular and hexagonal lattices wrapped on a torus. We find the general form of the finite-size corrections ... More

Dynamic critical behavior of cluster algorithms for 2D Ashkin-Teller and Potts modelsApr 19 2000We study the dynamic critical behavior of two algorithms: the Swendsen-Wang algorithm for the two-dimensional Potts model with q=2,3,4 and a Swendsen-Wang-type algorithm for the two-dimensional symmetric Ashkin-Teller model on the self-dual curve. We ... More

A bound on the charm chromo-EDM and its implicationsDec 09 2013Sep 09 2014We derive bounds on the electric and chromo-electric dipole moments of the charm quark. The second one turns out to be particularly strong, and we quantify its impact on models that allow for a sizeable flavour violation in the up quark sector, like flavour ... More

Study of the transition from the hard to the soft Pomeron in the small x region using optimal renormalizationDec 04 2012We show that it is possible to describe the effective Pomeron intercept using NLO BFKL evolution together with collinear improvements. In order to obtain a good description over the whole range of Q^2 we use a non-Abelian physical renormalization scheme ... More

Symplectic structures on moduli spaces of framed sheaves on surfacesNov 15 2011May 10 2012We provide generalizations of the notions of Atiyah class and Kodaira-Spencer map to the case of framed sheaves. Moreover, we construct closed two-forms on the moduli spaces of framed sheaves on surfaces. As an application, we define a symplectic structure ... More

Measurement of airborne 131I, 134Cs, and 137Cs nuclides due to the Fukushima reactors accident in air particulate in Milan (Italy)Jun 21 2011After the earthquake and the tsunami occurred in Japan on 11th March 2011, four of the Fukushima reactors had released in air a large amount of radioactive isotopes that had been diffused all over the world. The presence of airborne 131I, 134Cs, and 137Cs ... More

On the shape of the general error locator polynomial for cyclic codesFeb 10 2015Dec 24 2015A general result on the explicit form of the general error locator polynomial for all cyclic codes is given, along with several results for infinite classes of cyclic codes with $t=2$ and $t=3$. From these, a theoretically justification of the sparsity ... More

Chiral symmetry and the axial nucleon to Delta(1232) transition form factorsMar 29 2008We study the momentum and the quark mass dependence of the axial nucleon to Delta(1232) transition form factors in the framework of non-relativistic chiral effective field theory to leading-one-loop order. The outcome of our analysis provides a theoretical ... More

Existence of good divisors on Mukai varietiesMay 09 1997A Mukai variety is a Fano n-fold of index n-2. In this paper we study the fundamental divisor of a Mukai variety with at worst log terminal singularities. The main result is a complete classification of log terminal Mukai varieties which have not good ... More

Global calibrations for the non-homogeneous Mumford-Shah functionalMay 16 2001Using a calibration method we prove that, if $\Gamma\subset \Omega$ is a closed regular hypersurface and if the function $g$ is discontinuous along $\Gamma$ and regular outside, then the function $u_{\beta}$ which solves $$ \begin{cases} \Delta u_{\beta}=\beta(u_{\beta}-g)& ... More

Singularities of linear systems and the Waring ProblemJun 15 2004Waring problem for homogeneus forms asks for additive decomposition of a form $f$ into powers of linear forms. A classical problem is to determine when such a decomposition is unique. In this paper I answer this question when the degree of $f$ is greater ... More

Particle production and transplanckian problem on the non-commutative planeMar 11 2010Aug 02 2010We consider the coherent state approach to non-commutativity, and we derive from it an effective quantum scalar field theory. We show how the non-commutativity can be taken in account by a suitable modification of the Klein-Gordon product, and of the ... More

Brane-worlds in T-dual BulksNov 17 2003Nov 20 2003We consider brane-world models with a Schwarzschild-AdS black hole bulk. In the particular case of a flat black hole horizon geometry, we study the behaviour of the brane cosmological equations when T-duality transformations act on the bulk. We find that ... More

The entropy of an acoustic black hole in Bose-Einstein condensates: transverse modes as a cure for divergencesDec 15 2011Jan 21 2013We consider the entropy associated to the phonons generated via the Hawking mechanism in a sonic hole in a Bose-Einsten condensate. In a previous paper, we looked at the (1+1)-dimensional case both in the hydrodynamic limit and in the case when high-frequency ... More

Observational signatures of pre-inflationary and lower-dimensional effective gravityNov 02 2010Mar 02 2012Several alternative ways to quantize gravitational interactions seem to indicate that gravity at short distances is effectively two-dimensional. If this were true, and the energy scale at which the dimensional transition occurs is of the order of the ... More

Approximation of the first passage time density of a Wiener process to an exponentially decaying threshold by two-piecewise linear threshold. Application to neuronal spiking activityJul 04 2015Feb 17 2016The first passage time density of a diffusion process to a time varying threshold is of primary interest in different fields. Here we consider a Brownian motion in presence of an exponentially decaying threshold to model the neuronal spiking activity. ... More

On the Griesmer bound for nonlinear codesJan 18 2015Most bounds on the size of codes hold for any code, whether linear or nonlinear. Notably, the Griesmer bound, holds only in the linear case. In this paper we characterize a family of systematic nonlinear codes for which the Griesmer bound holds. Moreover, ... More

On the provable security of BEAR and LION schemesMay 02 2011BEAR, LION and LIONESS are block ciphers presented by Biham and Anderson (1996), inspired by the famous Luby-Rackoff constructions of block ciphers from other cryptographic primitives (1988). The ciphers proposed by Biham and Anderson are based on one ... More

Two-tier blockchain timestamped notarization with incremental securityFeb 08 2019Digital notarization is one of the most promising services offered by modern blockchain-based solutions. We present a digital notary design with incremental security and cost reduced with respect to current solutions. A client of the service receives ... More

Postulation of general quintuple fat point schemes in P^3Mar 28 2011We study the postulation of a general union Y of double, triple, quartuple and quintuple points of P^3. In characteristic 0, we prove that Y has good postulation in degree $d\ge 11$. The proof is based on the combination of the Horace differential lemma ... More

Wave-Shaped Round Functions and Primitive GroupsAug 29 2017Sep 21 2018Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key additions. ... More

Forbidden patterns in financial time seriesNov 05 2007Nov 13 2007The existence of forbidden patterns, i.e., certain missing sequences in a given time series, is a recently proposed instrument of potential application in the study of time series. Forbidden patterns are related to the permutation entropy, which has the ... More

Equivalent Birational Embeddings III: conesJul 30 2014Two divisors in $\mathbb P^n$ are said to be Cremona equivalent if there is a Cremona modification sending one to the other. In this paper I study irreducible cones in $\mathbb P^n$ and prove that two cones are Cremona equivalent if their general hyperplane ... More

Effect of neutrino asymmetry on the estimation of cosmological parametersFeb 18 2004The recent analysis of the cosmic microwave background data carried out by the WMAP team seems to show that the sum of the neutrino masses is <0.7 eV. However, this result is not model-independent, depending on precise assumptions on the cosmological ... More

Free loop space and the cyclic bar constructionFeb 29 2016Aug 29 2016Using the $E_\infty-$structure on singular cochains, we construct a homotopy coherent map from the cyclic bar construction of the differential graded algebra of cochains on a space to a model for the cochains on its free loop space. This fills a gap in ... More

Cantor Primes as Prime-Valued Cyclotomic PolynomialsMar 18 2012May 03 2012Cantor primes are primes p such that 1/p belongs to the middle-third Cantor set. One way to look at them is as containing the base-3 analogues of the famous Mersenne primes, which encompass all base-2 repunit primes, i.e., primes consisting of a contiguous ... More

On weakly APN functions and 4-bit S-BoxesFeb 17 2011Aug 02 2011S-Boxes are important security components of block ciphers. We provide theoretical results on necessary or sufficient criteria for an (invertible) 4-bit S-Box to be weakly APN. Thanks to a classification of 4-bit invertible S-Boxes achieved independently ... More

The 3-State Potts Antiferromagnet on the Hexagonal LatticeFeb 13 1998We study the 3-state hexagonal-lattice Potts antiferromagnet by a Monte Carlo simulation using the Wang-Swendsen-Kotecky cluster algorithm. We study the staggered susceptibility and the correlation length, and we confirm that this model is disordered ... More

Low--Temperature Series for Renormalized Operators: the Ferromagnetic Square--Lattice Ising Model.Sep 19 1994Mar 23 1995A method for computing low--temperature series for renormalized operators in the two--dimensional Ising model is proposed. These series are applied to the study of the properties of the truncated renormalized Hamiltonians when we start at very low temperature ... More

Existence of good divisors on Mukai manifoldsNov 20 1996A normal projective variety X is called Fano if a multiple of the anticanonical Weil divisor, -K_X, is an ample Cartier divisor, the index of a Fano variety is the number i(X):=sup{t: -K_X= tH, for some ample Cartier divisor H}. Mukai announced, the classification ... More

Advances on CNN-based super-resolution of Sentinel-2 imagesFeb 07 2019Thanks to their temporal-spatial coverage and free access, Sentinel-2 images are very interesting for the community. However, a relatively coarse spatial resolution, compared to that of state-of-the-art commercial products, motivates the study of super-resolution ... More

Overdamping by weakly coupled environmentsOct 20 2005A quantum system weakly interacting with a fast environment usually undergoes a relaxation with complex frequencies whose imaginary parts are damping rates quadratic in the coupling to the environment, in accord with Fermi's ``Golden Rule''. We show for ... More

The automorphisms group of $\overline{M}_{0,n}$Jun 04 2010In this paper we study fiber type morphisms between moduli spaces of pointed rational curves. Via Kapranov's description we are able to prove that the only such morphisms are forgetful maps. This allow us to show that the Automorphism group of $\overline{M}_{0,n}$ ... More

First-Principles Modeling of Pt/LaAlO3/SrTiO3 Capacitors Under an External Bias PotentialDec 14 2011We study the electrical properties of Pt/LaAlO3/SrTiO3 capacitors under the action of an external bias potential, using first-principles simulations performed at constrained electric displacement field. A complete set of band diagrams, together with the ... More

A characterization of quaternionic projective space by the conformal-Killing equationApr 24 2008We prove that a compact quaternionic-K\"{a}hler manifold of dimension $4n\geq 8$ admitting a conformal-Killing 2-form which is not Killing, is isomorphic to the quaternionic projective space, with its standard quaternionic-K\"{a}hler structure.

Phase changes in delay propagation networksNov 02 2016The analysis of the dynamics of delays propagation is one of the major topics inside Air Transport Management research. Delays are generated by the elements of the system, but their propagation is a global process fostered by relationships inside the ... More

Excitation spectrum of the two-dimensional attractive Hubbard modelSep 25 1998We calculate the one-particle spectral functions above the superconducting transition temperature $T_{C}$, in the framework of a functional integral approach. The coupling of the electronic self-energy to pair fluctuations, which are treated by means ... More

Dissipation in small systems: A Landau-Zener approachFeb 05 2016We establish a stochastic thermodynamics for a Fermionic level driven by a time-dependent force and interacting with initially thermalized levels playing the role of a reservoir. The driving induces consecutive avoided crossings between system and reservoir ... More

Adaptive Process Management in Highly Dynamic and Pervasive ScenariosJun 23 2009Process Management Systems (PMSs) are currently more and more used as a supporting tool for cooperative processes in pervasive and highly dynamic situations, such as emergency situations, pervasive healthcare or domotics/home automation. But in all such ... More

A Novel Nanoporous Graphite Based on Graphynes: First Principles Structure and Carbon Dioxide Preferential PhysisorptionOct 05 2016Ubiquitous graphene is a stricly 2D material representing an ideal adsorbing platform due to its large specific surface area as well as its mechanical strength and resistance to both thermal and chemical stresses. However, graphene as a bulk material ... More

MACS: An Agent-Based Memetic Multiobjective Optimization Algorithm Applied to Space Trajectory DesignJun 06 2012This paper presents an algorithm for multiobjective optimization that blends together a number of heuristics. A population of agents combines heuristics that aim at exploring the search space both globally and in a neighborhood of each agent. These heuristics ... More

Universality in driven Potts modelsNov 14 2018We study the stochastic dynamics of infinitely many globally interacting $q$-state units on a ring that is externally driven. While repulsive interactions always lead to uniform occupations, attractive interactions give rise to much richer phenomena: ... More

Noise effect on Grover algorithmJan 08 2008The decoherence effect on Grover algorithm has been studied numerically through a noise modelled by a depolarizing channel. Two types of error are introduced characterizing the qubit time evolution and gate application, so the noise is directly related ... More

Simple fault-tolerant encoding over q-ary CSS quantum codesDec 19 2007CSS codes are a subfamily of stabilizer codes especially appropriate for fault-tolerant quantum computations. A very simple method is proposed to encode a general qudit when a Calderbank-Shor-Steane quantum code, defined over a q-ary alphabet, is used. ... More

Curves homogeneous under analytic transformationsFeb 08 2016We call a subset $K$ of $\mathbb C$ \emph{biholomorphically homogeneous} if for any two points $p,q\in K$ there exists a neighborhood $U$ of $p$ and a biholomorphism $\psi:U\to \psi(U)\subset \mathbb C$ such that $\psi(p)=q$ and $\psi(K\cap U)= K\cap ... More

Exact solutions for the Generalized Modified Degasperis-Procesi equationSep 17 2008this paper we show some new exact solutions for the generalized modified Degasperis$-$Procesi equation (mDP equation)

Equivalent birational embeddings II: divisorsJun 26 2009Mar 24 2011Two divisors in $\P^n$ are said to be Cremona equivalent if there is a Cremona modification sending one to the other. We produce infinitely many non equivalent divisorial embeddings of any variety of dimension at most 14. Then we study the special case ... More

Equivalent birational embeddingsJun 26 2009Let $X$ be a projective variety of dimension $r$ over an algebraically closed field. It is proven that two birational embeddings of $X$ in $\P^n$, with $n\geq r+2$ are equivalent up to Cremona transformations of $\P^n$.

Overdamped stochastic thermodynamics with multiple reservoirsSep 27 2016After establishing stochastic thermodynamics for underdamped Langevin systems in contact with multiple reservoirs, we derive its overdamped limit using timescale separation techniques. The overdamped theory is different from the naive theory that one ... More

Stable regular critical points of the Mumford-Shah functional are local minimizersJul 25 2013In this paper it is shown that any regular critical point of the Mumford-Shah functional, with positive definite second variation, is an isolated local minimizer with respect to competitors which are sufficiently close in the L^1-topology.

Empirical Bernstein Bounds and Sample Variance PenalizationJul 21 2009We give improved constants for data dependent and variance sensitive confidence bounds, called empirical Bernstein bounds, and extend these inequalities to hold uniformly over classes of functionswhose growth function is polynomial in the sample size ... More

Theoretical and conceptual analysis of the celebrated 4$π$-symmetry neutron interferometry experimentsJan 25 2016In 1975, two experimental groups have independently observed the 4$\pi$-symmetry of neutrons' spin, when passing through a static magnetic field, using a three-blade interferometer made from a single perfect Si-crystal (analogous to the Mach-Zehnder interferometer ... More

Quantum diceJan 11 2013May 30 2013In a letter to Born, Einstein wrote: "Quantum mechanics is certainly imposing. But an inner voice tells me that it is not yet the real thing. The theory says a lot, but does not really bring us any closer to the secret of the old one. I, at any rate, ... More

The observer effectSep 16 2011Jun 18 2012Founding our analysis on the Geneva-Brussels approach to the foundations of physics, we provide a clarification and classification of the key concept of observation. An entity can be observed with or without a scope. In the second case, the observation ... More

The delta-quantum machine, the k-model, and the non-ordinary spatiality of quantum entitiesApr 25 2011Dec 21 2011The purpose of this article is threefold. Firstly, it aims to present, in an educational and non-technical fashion, the main ideas at the basis of Aerts' creation-discovery view and hidden measurement approach: a fundamental explanatory framework whose ... More

Time-delay of classical and quantum scattering processes: a conceptual overview and a general definitionOct 26 2010Nov 02 2011We present a step by step introduction to the notion of time-delay in classical and quantum mechanics, with the aim of clarifying its foundation at a conceptual level. In doing so, we motivate the introduction of the concepts of "fuzzy" and "free-flight" ... More

Comment on "Molecular Transport Junctions: Clearing Mists"May 22 2008May 26 2008This is a comment to a review article by Lindsay and Ratner titled "Molecular Transport Junctions: Clearing Mists".

Inflation and reheating in theories with spontaneous scale invariance symmetry breakingDec 22 2015Jun 22 2016We study a scale-invariant model of quadratic gravity with a non-minimally coupled scalar field. We focus on cosmological solutions and find that scale invariance is spontaneously broken and a mass scale naturally emerges. Before the symmetry breaking, ... More

KPZ reloadedAug 16 2015We analyze the one-dimensional periodic Kardar-Parisi-Zhang equation in the language of paracontrolled distributions, giving an alternative viewpoint on the seminal results of Hairer. Apart from deriving a basic existence and uniqueness result for paracontrolled ... More

Pseudogap in the one-electron spectral functions of the attractive Hubbard modelJun 18 1998Jun 25 1998We calculate the one-electron Green's function of the 2D attractive Hubbard model by coupling the electrons to pair fluctuations. The latter are approximated by homogeneous amplitude fluctuations and phase correlations corresponding to the XY-model. The ... More

Berry-phase theory of polar discontinuities at oxide-oxide interfacesSep 08 2009In the framework of the modern theory of polarization, we rigorously establish the microscopic nature of the electric displacement field D. In particular, we show that the longitudinal component of D is preserved at a coherent and insulating interface. ... More

Modelling the Air Transport with Complex Networks: a short reviewFeb 27 2013Air transport is a key infrastructure of modern societies. In this paper we review some recent approaches to air transport, which make extensive use of theory of complex networks. We discuss possible networks that can be defined for the air transport ... More

An infinite dimensional pursuit-evasion differential game with finite number of playersJun 02 2015We study a pursuit-evasion differential game with finite number of pursuers and one evader in Hilbert space with geometric constraints on the control functions of players. We solve the game by presenting explicit strategies for pursuers which guarantee ... More

Long time dynamics of Schrödinger and wave equations on flat toriNov 16 2018Dec 09 2018We consider a class of linear time dependent Schr\"odinger equations and quasi-periodically forced nonlinear Hamiltonian wave/Klein Gordon and Schr\"odinger equations on arbitrary flat tori. For the linear Schr\"odinger equation, we prove a $t^\epsilon$ ... More