Results for "Vadim Makarov"

total 1800took 0.12s
Controlling passively-quenched single photon detectors by bright lightJul 26 2007Apr 17 2009Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system ... More
Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocolsFeb 27 2007Nov 23 2007In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the ... More
On Krein's ExampleJun 10 2006In his 1953 paper [Matem.~Sbornik \textbf{33} (1953), 597 -- 626] Mark Krein presented an example of a symmetric rank one perturbation of a self-adjoint operator such that for all values of the spectral parameter in the interior of the spectrum, the difference ... More
Eavesdropping and countermeasures for backflash side channel in quantum cryptographyApr 27 2018Aug 01 2018Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the ... More
The singularly continuous spectrum and non-closed invariant subspacesMar 05 2004Jul 28 2004Let $\mathbf{A}$ be a bounded self-adjoint operator on a separable Hilbert space $\mathfrak{H}$ and $\mathfrak{H}_0\subset\mathfrak{H}$ a closed invariant subspace of $\mathbf{A}$. Assuming that $\mathfrak{H}_0$ is of codimension 1, we study the variation ... More
Secure detection in quantum key distribution by real-time calibration of receiverNov 23 2016The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits ... More
Effects of detector efficiency mismatch on security of quantum cryptosystemsNov 03 2005Mar 06 2007We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the ... More
Secure gated detection scheme for quantum cryptographyJan 29 2011Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode ... More
The Birman-Schwinger principle in von Neumann algebras of finite typeOct 09 2006We introduce a relative index for a pair of dissipative operators in a von Neumann algebra of finite type and prove an analog of the Birman-Schwinger principle in this setting. As an application of this result, revisiting the Birman-Krein formula in the ... More
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"Jun 19 2011This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].
Secure detection in quantum key distribution by real-time calibration of receiverNov 23 2016Jun 18 2018The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits ... More
Quantum cryptographyAug 08 2011This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students ... More
Tailored bright illumination attack on distributed-phase-reference protocolsDec 20 2010Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright ... More
Coupled harmonic oscillators and their quantum entanglementOct 03 2017A system of two coupled quantum harmonic oscillators with the Hamiltonian ${\hat H}=\frac{1}{2}\left(\frac{1}{m_1}{\hat p}^{2}_1 + \frac{1}{m_2}{\hat p}^{2}_2+A x^2_1+B x^2_2+ C x_1 x_2\right)$ can be found in many applications of quantum and nonlinear ... More
Quantum entanglement of a harmonic oscillator in an electromagnetic fieldSep 14 2017At present, there are many methods of quantum entanglement of particles with an electromagnetic field. Most methods have a low probability of quantum entanglement and not an exact theoretical apparatus based on an approximate solution of the Schrodinger ... More
Existence and uniqueness of solutions to the operator Riccati equation. A geometric approachJul 15 2002We introduce a new concept of unbounded solutions to the operator Riccati equation $A_1 X - X A_0 - X V X + V^\ast = 0$ and give a complete description of its solutions associated with the spectral graph subspaces of the block operator matrix $\mathbf{B} ... More
Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016We demonstrate the ability of an eavesdropper to control the sifted-key size in a commercial plug-and-play QKD system Clavis2 from ID Quantique, and its effect on security analysis. Experimentally, we could consistently force the system to generate the ... More
On a Subspace Perturbation ProblemMar 22 2002Jun 27 2002We discuss the problem of perturbation of spectral subspaces for linear self-adjoint operators on a separable Hilbert space. Let $A$ and $V$ be bounded self-adjoint operators. Assume that the spectrum of $A$ consists of two disjoint parts $\sigma$ and ... More
Invisible Trojan-horse attackApr 25 2017Jul 12 2017We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical ... More
Representation Theorems for Indefinite Quadratic Forms RevisitedMar 09 2010Apr 10 2012The first and second representation theorems for sign-indefinite, not necessarily semi-bounded quadratic forms are revisited. New straightforward proofs of these theorems are given. A number of necessary and sufficient conditions ensuring the second representation ... More
Decoy state quantum key distribution with imperfect sourceNov 02 2017Sep 17 2018The decoy state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to generating the decoy states with different ... More
Controlling an actively-quenched single photon detector with bright lightSep 19 2008Oct 23 2011We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable ... More
Homodyne-detector-blinding attack in continuous-variable quantum key distributionMay 04 2018Jul 06 2018We propose an efficient strategy to attack a continuous-variable quantum key distribution (CV-QKD) system, that we call homodyne detector blinding. This attack strategy takes advantage of a generic vulnerability of homodyne receivers: a bright light pulse ... More
Optimised quantum hacking of superconducting nanowire single-photon detectorsMay 26 2013Apr 07 2014We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical ... More
An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More
Implementation vulnerabilities in general quantum cryptographyMay 17 2018Oct 24 2018Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security ... More
On the existence of solutions to the operator Riccati equation and the tanΘtheoremOct 02 2002May 29 2003Let A and C be self-adjoint operators such that the spectrum of A lies in a gap of the spectrum of C and let d>0 be the distance between the spectra of A and C. We prove that under these assumptions the sharp value of the constant c in the condition ||B||<cd ... More
Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016Jul 24 2017A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. ... More
A generalization of the $tan 2Θ$ TheoremFeb 03 2003Let $\mathbf{A}$ be a bounded self-adjoint operator on a separable Hilbert space $\mathfrak{H}$ and $\mathfrak{H}_0\subset\mathfrak{H}$ a closed invariant subspace of $\mathbf{A}$. Assuming that $\sup\spec(A_0)\leq \inf\spec(A_1)$, where $A_0$ and $A_1$ ... More
Controlling single-photon detector ID210 with bright lightMay 22 2019We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination. In quantum key distribution, this vulnerability can be exploited by ... More
The TAN $2Θ$ Theorem for Indefinite Quadratic FormsJun 16 2010A version of the Davis-Kahan Tan $2\Theta$ theorem [SIAM J. Numer. Anal. \textbf{7} (1970), 1 -- 46] for not necessarily semibounded linear operators defined by quadratic forms is proven. This theorem generalizes a recent result by Motovilov and Selin ... More
Perturbation of spectra and spectral subspacesJun 01 2003Jul 23 2007We consider the problem of variation of spectral subspaces for linear self-adjoint operators under off-diagonal perturbations. We prove a number of new optimal results on the shift of the spectrum and obtain (sharp) estimates on the norm of the difference ... More
A countermeasure against bright-light attack on superconducting nanowire single-photon detector in quantum key distributionJul 15 2019We present an active anti-latching system for superconducting nanowire single-photon detectors. We experimentally test it against a bright-light attack, previously used to compromise security of quantum key distribution. Although our system detects continuous ... More
Optical-mechanical cooling of a charged resonatorNov 08 2018One of the most effective methods for cooling micro and nano devices to ultra low temperatures is the sideband method. Currently, this approach is being studied experimentally and theoretically. Theoretical results that relate to this method correspond ... More
Approximation of Urison operator with operator polynomials of Stancu typeOct 28 2011Positive polynomial operator that approximates Urison operator, when integration domain is a "regular triangle" is investigated. We obtain Bernstein Polynomials as a particular case.
Evolution of dwarf galaxies in the Centaurus A groupJul 25 2007We consider star formation properties of dwarf galaxies in Cen A group observed within our HST/ACS projects number 9771 and 10235. We model color-magnitude diagrams of the galaxies under consideration and measure star formation rate and metallicity dependence ... More
Galaxy groups and clouds in the Local (z~0.01) universeNov 29 2010We present an all-sky catalogue of 395 nearby galaxy groups revealed in the Local Supercluster and its surroundings. The groups and their associations are identified among 10914 galaxies at |b|>15deg with radial velocities VLG<3500 km/s. Our group finding ... More
Around Hilbert-Arnold ProblemNov 06 2001This lectures notes consists of four lectures. The first lecture discusses questions around Hilbert-Arnold Problem which is naturally arises from Quantitative Hilbert 16-th problem. In the second lecture we outline author's solution of a weak form of ... More
Kondo resonance in the case of strong Coulomb screeningNov 05 1995The effect of Coulomb screening on the magnetic impurity behavior is analysed. Two types of the behavior corresponding to either integer or fractional occupation numbers of the low lying magnetic level are described. The features in the dependence of ... More
Pentagramma Mirificum and elliptic functionsJun 18 2011We give an exposition of fragments from Gauss [G] where he discovered, with the help of some work of Jacobi, a remarkable connection between Napier pentagons on the sphere and Poncelet pentagons on the plane. As a corollary we find a parametrization in ... More
Local structure of moduli spacesAug 05 1997Aug 06 1997We describe the algebra of a universal formal deformation as the zeroth cohomology of the dg Lie algebra corresponding to this deformation problem. A report at Arbeitstagung 1997 on the joint work with V.Hinich.
A remark on virtual orientations for complete intersectionsAug 03 1997The aim of this note is to give a simple definition of genus zero virtual orientation classes (or fundamental classes) for projective complete intersections or, more generally, for complete intersections in convex varieties, and to prove a push forward ... More
Nuclear matrix elements for double beta decayOct 30 2009The present status of calculations of the nuclear matrix elements for neutrinoless double beta decay is reviewed. A proposal which allows in principle to measure the neutrinoless double beta decay Fermi matrix element is briefly described.
Quantitative description of ion transport via plasma membrane of yeast and small cellsDec 18 2012Jan 16 2016Modeling of ion transport via plasma membrane needs identification and quantitative understanding of the involved processes. Brief characterization of main ion transport systems of a yeast cell (Pma1, Ena1, TOK1, Nha1, Trk1, Trk2, non-selective cation ... More
Formation of filament-like structures in the pulsar magnetosphere and the short-term variability of pulsar emissionJan 10 2014Magnetohydrodynamic (MHD) instabilities can play an important role in the dynamics of the pulsar magnetosphere and can be responsible for the formation of various structures. We consider the instability caused by a gradient of the magnetic pressure which ... More
Some applications of weight structures of BondarkoFeb 02 2011Dec 10 2011We construct a functor from the triangulated category of Voevodsky motives to a certain derived category of mixed Hodge structures enriched with integral weight filtration. We use this construction to prove a strong integral version of the Deligne conjecture ... More
Reconstruction of piecewise constant functions from X-ray dataJan 07 2019Apr 08 2019We show that on a two-dimensional compact nontrapping Riemannian manifold with strictly convex boundary, a piecewise constant function can be recovered from its integrals over geodesics. We adapt the injectivity proof which uses variations through geodesics ... More
On generalized resolvents and characteristic matrices of first-order symmetric systemsMar 16 2014We study general (not necessarily Hamiltonian) first-order symmetric system $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b) $ with the regular endpoint $a$ and singular endpoint $b$. It is assumed that the deficiency indices $n_\pm(\Tmi)$ of the corresponding ... More
Boundary relations and boundary conditions for general (not necessarily definite) canonical systems with possibly unequal deficiency indicesSep 10 2011Sep 13 2011We investigate in the paper general (not necessarily definite) canonical systems of differential equation in the framework of extension theory of symmetric linear relations. For this aim we first introduce the new notion of a boundary relation $\G:\gH^2\to\HH$ ... More
On spectral and pseudospectral functions of first-order symmetric systemsJul 21 2014We consider general (not necessarily Hamiltonian) first-order symmetric system $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b) $ with the regular endpoint $a$. A distribution matrix-valued function $\Si(s), \; s\in\bR,$ is called a spectral (pseudospectral) ... More
Sur les algèbres vertex attachées aux variétés algébriquesApr 21 2003Sganarelle: ... Mais encore faut-il croire quelque chose dans le monde: qu'est-ce donc que vous croyez? Dom Juan: Ce que je crois? Sganarelle: Oui. Dom Juan: Je crois que deux et deux sont quatre, Sganarelle, et que quatre et quatre sont huit. [Moli\`ere, ... More
Integrality of instanton numbersJul 31 2007Sep 17 2008We prove the results announced in a joint paper (arXiv:hep-th/0603106) with Maxim Kontsevich and Albert Schwarz.
On compressions of self-adjoint extensions of a symmetric linear relationDec 01 2018Let $A$ be a symmetric linear relation in the Hilbert space $\gH$ with equal deficiency indices $n_\pm (A)\leq\infty$. A self-adjoint linear relation $\wt A\supset A$ in some Hilbert space $\wt\gH\supset \gH$ is called an exit space extension of $A$; ... More
Triangulated endofunctors of the derived category of coherent sheaves which do not admit DG liftingsApr 29 2016Recently, Rizzardo and Van den Bergh constructed an example of a triangulated functor between the derived categories of coherent sheaves on smooth projective varieties over a field $k$ of characteristic $0$ which is not of the Fourier-Mukai type. The ... More
On the properties of nodal price response matrix in electricity marketsApr 14 2014Jan 24 2015We establish sufficient conditions for nodal price response matrix in electric power system to be symmetric and negative (semi-)definite. The results are applicable for electricity markets with nonlinear and intertemporal constraints.
Remarks on formal deformations and Batalin-Vilkovisky algebrasFeb 02 1998Feb 10 1998This note consists of two parts. Part I is an exposition of (a part of) the V.Drinfeld's letter, [D]. The sheaf of algebras of polyvector fields on a Calabi-Yau manifold, equipped with the Schouten bracket, admits a structure of a Batalin-Vilkovisky algebra. ... More
On the possibility to measure nuclear matrix element for neutrinoless double beta decay of Ca48Aug 25 2011As shown in Ref. \cite{Rod09}, the Fermi part $M_{F}^{0\nu}$ of the total $0\nu\beta\beta$-decay nuclear matrix element $M^{0\nu}$ can be related to the single Fermi transition matrix element between the isobaric analog state (IAS) of the ground state ... More
Explicit Solutions to Boundary Problems for 2+1-Dimensional Integrable SystemsDec 16 2010Nonlinear integrable models with two spatial and one temporal variables: Kadomtsev-Petviashvili equation and two-dimensional Toda lattice are investigated on the subject of correct formulation for boundary problem that can be solved within the framework ... More
Simplicissimus' InquiriesJun 27 2009This is a kind of essay dedicated to Lev Borisovich Okun. I would like to ask some questions which I can not answer. However I suspect I know how to answer them. Questions are as follows: 1. Particle identity. 2. Information storage. 3. Information read-out ... More
Non-colliding Jacobi processes as limits of Markov chains on Gelfand-Tsetlin graphDec 16 2008We introduce a stochastic dynamics related to the measures that arise in harmonic analysis on the infinite-dimensional unitary group. Our dynamics is obtained as a limit of a sequence of natural Markov chains on Gelfand-Tsetlin graph. We compute finite-dimensional ... More
Non-intersecting paths and Hahn orthogonal polynomial ensembleAug 17 2007We compute the bulk limit of the correlation functions for the uniform measure on lozenge tilings of a hexagon. The limiting determinantal process is a translation invariant extension of the discrete sine process, which also describes the ergodic Gibbs ... More
Information Planning for Text DataFeb 09 2018Mar 21 2018Information planning enables faster learning with fewer training examples. It is particularly applicable when training examples are costly to obtain. This work examines the advantages of information planning for text data by focusing on three supervised ... More
Guided Grammar ConvergenceMar 29 2015Relating formal grammars is a hard problem that balances between language equivalence (which is known to be undecidable) and grammar identity (which is trivial). In this paper, we investigate several milestones between those two extremes and propose a ... More
The Hilbert 16-th problem and an estimate for cyclicity of an elementary polycycleOct 17 2000Hilbert-Arnold (HA) problem, motivated by Hilbert 16-th problem, is to prove that for a generic k-parameter family of smooth vector fields {\dot x=v(x,\eps)}_{\eps\in B^k} on the 2-dimensional sphere S^2 has uniformly bounded number of limit cycles (isolated ... More
Generic Diffeomorphisms with Superexponential Growth of Number of Periodic OrbitsFeb 26 1999Consider a compact manifold M of dimension at least 2 and the space of C^r-smooth diffeomorphisms Diff^r(M). The classical Artin-Mazur theorem says that for a dense subset D of Diff^r(M) the number of isolated periodic points grows at most exponentially ... More
Fisher information and quantum mechanical models for financeApr 15 2015The probability distribution function (PDF) for prices on financial markets is derived by extremization of Fisher information. It is shown how on that basis the quantum-like description for financial markets arises and different financial market models ... More
Moments of the ARPES spectral function of an undoped Mott insulatorMar 15 2000We derive analytic expressions for the first three frequency moments of the single particle spectral function for one hole in a Mott insulator in terms of equilibrium spin correlation functions of the insulating state. We show that the ``remnant Fermi ... More
Hilbert series and Berezin-Gelfand dualityAug 31 2009Mar 13 2010We give an example showing how Jacobi polynomials and their discrete counterparts (Hahn polynomials) appear in the Hilbert series of some homogeneous spaces.
On hypergeometric functions connected with quantum cohomology of flag spacesDec 20 1997Givental's recursion relations for the flag varieties $G/B$ are established.
Disjointness of representations arising in harmonic analysis on the infinite-dimensional unitary groupMay 17 2008Nov 07 2008We prove pairwise disjointness of representations T_{z,w} of the infinite-dimensional unitary group. These representations provide a natural generalization of the regular representation for the case of "big" group U(\infty). They were introduced and studied ... More
Utilizing the redundant constraints for the uplift payment eliminationMay 20 2019A power market with non-convexities may not have an equilibrium price for power that provides economic stability of the centralized dispatch outcome. In this case, the market players are entitled to receive the uplift payments that compensate the economic ... More
On Geometry and Symmetries in Classical and Quantum Theories of Gauge GravityMay 16 2019Spin Foam and Loop approaches to Quantum Gravity reformulate Einstein's theory of relativity in terms of connection variables. The metric properties are encoded in face bivectors/conjugate fluxes that are required to satisfy certain conditions, in order ... More
MediaWiki Grammar RecoveryJul 23 2011The paper describes in detail the recovery effort of one of the official MediaWiki grammars. Over two hundred grammar transformation steps are reported and annotated, leading to delivery of a level 2 grammar, semi-automatically extracted from a community ... More
The Class of Purely Unrectifiable Sets in the Hilbert Space is coanalytic-completeMar 14 2013The space $F(\ell_2)$ of all closed subsets of $\ell_2$ is a Polish space. We show that the subset $P\subset F(\ell_2)$ consisting of the purely 1-unrectifiable sets is $\Pii$-complete.
Symmetric operators with real defect subspaces of the maximal dimension. Applications to differential operatorsDec 17 2010Let $\gH$ be a Hilbert space and let $A$ be a simple symmetric operator in $\gH$ with equal deficiency indices $d:=n_\pm(A)<\infty$. We show that if, for all $\l$ in an open interval $I\subset\bR$, the dimension of defect subspaces $\gN_\l(A)(=\Ker (A^*-\l))$ ... More
Dark Matter Problem in the Local SuperclusterDec 29 2007The Local Supercluster is an ideal laboratory to study distribution of luminous and dark matter in the nearby Universe. The 1100 small groups have been selected using algorithm based on assumption that a total energy of physical pair of galaxies must ... More
Symbolic Algorithm of the Functional-Discrete Method for a Sturm-Liouville Problem with a Polynomial PotentialAug 11 2017Sep 04 2017A new symbolic algorithmic implementation of the general scheme of the exponentially convergent functional-discrete (FD-) method is developed and justified for the Sturm-Liouville problem on a finite interval for the Schr\"odinger equation with a polynomial ... More
Investigation of heavy ions diffusion under the influence of current-driven mechanism and compositional waves in plasmaMay 25 2016We consider diffusion caused by a combined influence of the Hall effect and electric currents, and argue that such diffusion forms chemical inhomogeneities in plasma. The considered mechanism can be responsible for the formation of element spots in laboratory ... More
Diffusion in plasma: the Hall effect, compositional waves, and chemical spotsSep 12 2016We consider diffusion caused by a combined influence of the electric current and the Hall effect, and argue that such diffusion can form inhomogeneities of the chemical composition in plasma. The considered mechanism can be responsible for a formation ... More
Effective Lagrangian of Thermal QED with External Magnetic Field and the Static Limit of the Polarization OperatorJul 25 1995A low-temperature expansion of QED one-loop effective Lagrangian valid for a wide range of parameters is presented in a form of finite sums of elementary functions. Starting from the effective action components of the one-loop polarization operator responsible ... More
QED$_{2+1}$ with Nonzero Fermion Density and Quantum Hall EffectOct 10 1994A general expression for the conductivity in the QED$_{2+1}$ with nonzero fermion density in the uniform magnetic field is derived. It is shown that the conductivity is entirely determined by the Chern-Simons coefficient: $\sigma_{ij}=\varepsilon_{ij}~{\cal ... More
Antimonopoly regulation method based on perfect price discriminationJul 16 2015We propose a method of antimonopoly regulation in a day-ahead power market with locational marginal pricing which forms economic incentives for a producer, operating a portfolio of generating units, to submit an offer indicating its true cost and faithful ... More
Optimal Polynomial-Time Estimators: A Bayesian Notion of Approximation AlgorithmAug 14 2016Sep 15 2016The concept of an "approximation algorithm" is usually only applied to optimization problems since in optimization problems the performance of the algorithm on any given input is a continuous parameter. We introduce a new concept of approximation applicable ... More
Emergent quantum mechanics of financesDec 11 2013This paper is an attempt at understanding the quantum-like dynamics of financial markets in terms of non-differentiable price-time continuum having fractal properties. The main steps of this development are the statistical scaling, the non-differentiability ... More
Dynamics of Inhomogeneous Tomonaga-Luttinger Liquid WireNov 05 1995Dynamics of the 1D electron transport between two reservoirs are studied based on the inhomogeneous Tomonaga- Luttinger Liquid (ITLL) model in the case when the effect of the electron backscattering on the impurities is negligible. The inhomogeneities ... More
Umklapp scattering in transport through a 1D wire of finite lengthJul 05 1999Suppression of electron current $ \Delta I$ through a 1D channel of length $L$ connecting two Fermi liquid reservoirs is studied taking into account the Umklapp interaction induced by a periodic potential. This interaction opens band gaps at the integer ... More
Vertex algebras and elliptic generaJun 27 1999A report at Arbeitstagung, June 1999, Bonn, on the joint work with V.Gorbounov, F.Malikov and A.Vaintrob.
ERRATA for "One-Loop Threshold Effects in String Unification"May 19 1992The original paper, as published in Nuclear Physics B in 1988, had a few factor-of-two errors. Some people got confused by those errors. The purpose of these errata is to make things clear. The revised version of the complete article is also posted to ... More
Relation of isospin-symmetry breaking correction for superallowed beta decay to energy of charge-exchange giant monopole resonanceJun 03 2012Dec 15 2013After application of an analytical transformation, a new exact representation for the nuclear isospin-symmetry breaking correction $\delta_C$ to superallowed beta decay is obtained. The correction is shown to be essentially the reciprocal of the square ... More
Salinity tolerance in plants: attempts to manipulate ion transportNov 06 2014Ion transport is the major determining factor of salinity tolerance in plants. A simple scheme of a plant cell with ion fluxes provides basic understanding of ion transport and the corresponding changes of ion concentrations under salinity. The review ... More
Reconstruction of piecewise constant functions from X-ray dataJan 07 2019We show that on a two-dimensional compact nontrapping Riemannian manifold with strictly convex boundary, a piecewise constant function can be recovered from its integrals over geodesics. We adapt the injectivity proof which uses variations through geodesics ... More
Guided Grammar Convergence. Full Case Study Report. Generated by converge::GuidedJul 27 2012This report is meant to be used as auxiliary material for the guided grammar convergence technique proposed earlier as problem-specific improvement in the topic of convergence of grammars. It contains a narrated MegaL megamodel, as well as full results ... More
On eigenfunction expansions of first-order symmetric systems and ordinary differential operators of an odd orderJul 25 2013We study general (not necessarily Hamiltonian) first-order symmetric systems $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b\rangle $ with the regular endpoint $a$. It is assumed that the deficiency indices $n_\pm(\Tmi)$ of the minimal relation $\Tmi$ ... More
Spectral and pseudospectral functions of various dimensions for symmetric systemsNov 10 2016The main object of the paper is a symmetric system $J y'-B(t)y=\l\D(t) y$ defined on an interval $\cI=[a,b) $ with the regular endpoint $a$. Let $\f(\cd,\l)$ be a matrix solution of this system of an arbitrary dimension and let $(Vf)(s)=\int\limits_\cI ... More
Classification and Non-classification of Homeomorphism RelationsJul 26 2014Jan 14 2015The paper deals with the program of determining the complexity of various homeomorphism relations. The homeomorphism relation on compact Polish spaces is known to be reducible to an orbit equivalence relation of a continuous Polish group action (Kechris-Solecki). ... More
Concavity of Eigenvalue Sums and the Spectral Shift FunctionDec 26 2001It is well known that the sum of negative (positive) eigenvalues of some finite Hermitian matrix $V$ is concave (convex) with respect to $V$. Using the theory of the spectral shift function we generalize this property to self-adjoint operators on a separable ... More
Compositional waves and variations in the atmospheric abundances of magnetic starsFeb 01 2016The stars of the middle main sequence often have relatively quiescent outer layers and spot-like chemical structures may develope in their atmospheres. Recent observations show that abundance peculiarities can change as stars evolve on the main sequence ... More
Element spots in Ap- and HgMn-stars from current-driven diffusionJan 25 2016The stars of the middle main sequence often have spot-like chemical structures at their surfaces. We consider the diffusion process caused by electric currents that can lead to the formation of such chemical spots. Diffusion is considered using the partial ... More
Comment on "Dynamical Chern-Simons term generation at finite density" and "Chern-Simons term at finite density"Dec 23 1996We comment on the calculation of the Chern-Simons coefficient in (2+1)-dimensional gauge theories at finite chemical potential made by A.N.Sissakian, O.Yu.Shevchenko and S.B.Solganik (hep-th/9608159 and hep-th/9612140).
Spontaneous Magnetization in Maxwell QED$_{2+1}$May 28 1996Nov 10 1996Spontaneous magnetization in the Maxwell QED$_{2+1}$ at finite fermion density is studied. It is shown that at low fermion densities the one-loop free energy has its minimum at some nonvanishing value of the magnetic field. The magnetization is due to ... More