total 1673took 0.33s

Implementation vulnerabilities in general quantum cryptographyMay 17 2018Oct 24 2018Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security ... More

Controlling passively-quenched single photon detectors by bright lightJul 26 2007Apr 17 2009Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system ... More

The TAN $2Θ$ Theorem for Indefinite Quadratic FormsJun 16 2010A version of the Davis-Kahan Tan $2\Theta$ theorem [SIAM J. Numer. Anal. \textbf{7} (1970), 1 -- 46] for not necessarily semibounded linear operators defined by quadratic forms is proven. This theorem generalizes a recent result by Motovilov and Selin ... More

The Tan $2 Θ$-Theorem in Fluid DynamicsAug 01 2017We show that the generalized Reynolds number (in fluid dynamics) introduced by Ladyzhenskaya is closely related to the rotation of the positive spectral subspace of the Stokes block-operator in the underlying Hilbert space. We also explicitly evaluate ... More

Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocolsFeb 27 2007Nov 23 2007In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the ... More

On Krein's ExampleJun 10 2006In his 1953 paper [Matem.~Sbornik \textbf{33} (1953), 597 -- 626] Mark Krein presented an example of a symmetric rank one perturbation of a self-adjoint operator such that for all values of the spectral parameter in the interior of the spectrum, the difference ... More

The singularly continuous spectrum and non-closed invariant subspacesMar 05 2004Jul 28 2004Let $\mathbf{A}$ be a bounded self-adjoint operator on a separable Hilbert space $\mathfrak{H}$ and $\mathfrak{H}_0\subset\mathfrak{H}$ a closed invariant subspace of $\mathbf{A}$. Assuming that $\mathfrak{H}_0$ is of codimension 1, we study the variation ... More

Secure detection in quantum key distribution by real-time calibration of receiverNov 23 2016The single photon detection efficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits ... More

Effects of detector efficiency mismatch on security of quantum cryptosystemsNov 03 2005Mar 06 2007We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the ... More

Secure gated detection scheme for quantum cryptographyJan 29 2011Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode ... More

The Birman-Schwinger principle in von Neumann algebras of finite typeOct 09 2006We introduce a relative index for a pair of dissipative operators in a von Neumann algebra of finite type and prove an analog of the Birman-Schwinger principle in this setting. As an application of this result, revisiting the Birman-Krein formula in the ... More

Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"Jun 19 2011This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].

Quantum cryptographyAug 08 2011This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012. The chapter aims to introduce the topic to undergraduate-level and continuing-education students ... More

Tailored bright illumination attack on distributed-phase-reference protocolsDec 20 2010Detector control attacks on quantum key distribution systems exploit the linear mode of avalanche photodiode in single photon detectors. So far, the protocols under consideration have been the BB84 protocol and its derivatives. Here we present how bright ... More

Random matrix theory for low-frequency sound propagation in the ocean: a spectral statistics testMay 31 2017Problem of long-range sound propagation in the randomly-inhomogeneous deep ocean is considered. We examine a novel approach for modeling of wave propagation, developed by K.C.Hegewisch and S.Tomsovic. This approach relies on construction of a wavefield ... More

Existence and uniqueness of solutions to the operator Riccati equation. A geometric approachJul 15 2002We introduce a new concept of unbounded solutions to the operator Riccati equation $A_1 X - X A_0 - X V X + V^\ast = 0$ and give a complete description of its solutions associated with the spectral graph subspaces of the block operator matrix $\mathbf{B} ... More

Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016We demonstrate the ability of an eavesdropper to control the sifted-key size in a commercial plug-and-play QKD system Clavis2 from ID Quantique, and its effect on security analysis. Experimentally, we could consistently force the system to generate the ... More

Optimised quantum hacking of superconducting nanowire single-photon detectorsMay 26 2013Apr 07 2014We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical ... More

Controlling an actively-quenched single photon detector with bright lightSep 19 2008Oct 23 2011We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable ... More

An optimal local model to practically emulate Bell inequalitiesFeb 08 2019We show how an adversary can emulate a Bell inequality using existing detector control methods if the Bell test is not loophole-free. For a Clauser-Horne-Shimony-Holt inequality, our model fakes a maximum violation predicted by quantum mechanics for a ... More

Homodyne-detector-blinding attack in continuous-variable quantum key distributionMay 04 2018Jul 06 2018We propose an efficient strategy to attack a continuous-variable quantum key distribution (CV-QKD) system, that we call homodyne detector blinding. This attack strategy takes advantage of a generic vulnerability of homodyne receivers: a bright light pulse ... More

On a Subspace Perturbation ProblemMar 22 2002Jun 27 2002We discuss the problem of perturbation of spectral subspaces for linear self-adjoint operators on a separable Hilbert space. Let $A$ and $V$ be bounded self-adjoint operators. Assume that the spectrum of $A$ consists of two disjoint parts $\sigma$ and ... More

Decoy state quantum key distribution with imperfect sourceNov 02 2017Sep 17 2018The decoy state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to generating the decoy states with different ... More

Representation Theorems for Indefinite Quadratic Forms RevisitedMar 09 2010Apr 10 2012The first and second representation theorems for sign-indefinite, not necessarily semi-bounded quadratic forms are revisited. New straightforward proofs of these theorems are given. A number of necessary and sufficient conditions ensuring the second representation ... More

A generalization of the $tan 2Θ$ TheoremFeb 03 2003Let $\mathbf{A}$ be a bounded self-adjoint operator on a separable Hilbert space $\mathfrak{H}$ and $\mathfrak{H}_0\subset\mathfrak{H}$ a closed invariant subspace of $\mathbf{A}$. Assuming that $\sup\spec(A_0)\leq \inf\spec(A_1)$, where $A_0$ and $A_1$ ... More

Perturbation of spectra and spectral subspacesJun 01 2003Jul 23 2007We consider the problem of variation of spectral subspaces for linear self-adjoint operators under off-diagonal perturbations. We prove a number of new optimal results on the shift of the spectrum and obtain (sharp) estimates on the norm of the difference ... More

Finite-key-size effect in commercial plug-and-play QKD systemOct 21 2016Jul 24 2017A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. ... More

On the existence of solutions to the operator Riccati equation and the tanΘtheoremOct 02 2002May 29 2003Let A and C be self-adjoint operators such that the spectrum of A lies in a gap of the spectrum of C and let d>0 be the distance between the spectra of A and C. We prove that under these assumptions the sharp value of the constant c in the condition ||B||<cd ... More

Quantum Hele-Shaw flowNov 19 2004In this note, we discuss the quantum Hele-Shaw flow, a random measure process in the complex plane introduced by the physicists P.Wiegmann, A. Zabrodin, et al. This process arises in the theory of electronic droplets confined to a plane under a strong ... More

Imitation Learning for Neural Morphological String TransductionAug 31 2018We employ imitation learning to train a neural transition-based string transducer for morphological tasks such as inflection generation and lemmatization. Previous approaches to training this type of model either rely on an external character aligner ... More

A Superexponentially Convergent Functional-Discrete Method for Solving the Cauchy Problem for Systems of Ordinary Differential EquationsDec 30 2010In the paper a new numerical-analytical method for solving the Cauchy problem for systems of ordinary differential equations of special form is presented. The method is based on the idea of the FD-method for solving the operator equations of general form, ... More

SI-method for solving stiff nonlinear boundary value problemsDec 22 2018In the present paper, we thoroughly investigate the theoretical properties of the SI-method, which was firstly introduced in arXiv:1601.04272v8 and proved to be remarkably stable when applied to a certain class of stiff boundary value problems. In particular, ... More

Around Hilbert-Arnold ProblemNov 06 2001This lectures notes consists of four lectures. The first lecture discusses questions around Hilbert-Arnold Problem which is naturally arises from Quantitative Hilbert 16-th problem. In the second lecture we outline author's solution of a weak form of ... More

Ideal DatabasesDec 30 2015From algebraic geometry perspective database relations are succinctly defined as Finite Varieties. After establishing basic framework, we give analytic proof of Heath theorem from Database Dependency theory. Next, we leverage Algebra/Geometry dictionary ... More

Kondo resonance in the case of strong Coulomb screeningNov 05 1995The effect of Coulomb screening on the magnetic impurity behavior is analysed. Two types of the behavior corresponding to either integer or fractional occupation numbers of the low lying magnetic level are described. The features in the dependence of ... More

Pentagramma Mirificum and elliptic functionsJun 18 2011We give an exposition of fragments from Gauss [G] where he discovered, with the help of some work of Jacobi, a remarkable connection between Napier pentagons on the sphere and Poncelet pentagons on the plane. As a corollary we find a parametrization in ... More

Local structure of moduli spacesAug 05 1997Aug 06 1997We describe the algebra of a universal formal deformation as the zeroth cohomology of the dg Lie algebra corresponding to this deformation problem. A report at Arbeitstagung 1997 on the joint work with V.Hinich.

A remark on virtual orientations for complete intersectionsAug 03 1997The aim of this note is to give a simple definition of genus zero virtual orientation classes (or fundamental classes) for projective complete intersections or, more generally, for complete intersections in convex varieties, and to prove a push forward ... More

Nuclear matrix elements for double beta decayOct 30 2009The present status of calculations of the nuclear matrix elements for neutrinoless double beta decay is reviewed. A proposal which allows in principle to measure the neutrinoless double beta decay Fermi matrix element is briefly described.

Formation of filament-like structures in the pulsar magnetosphere and the short-term variability of pulsar emissionJan 10 2014Magnetohydrodynamic (MHD) instabilities can play an important role in the dynamics of the pulsar magnetosphere and can be responsible for the formation of various structures. We consider the instability caused by a gradient of the magnetic pressure which ... More

Minimal spectral functions of an ordinary differential operatorOct 06 2010Oct 12 2010Let $l[y]$ be a formally selfadjoint differential expression of an even order on the interval $[0,b> \;(b\leq \infty)$ and let $L_0$ be the corresponding minimal operator. By using the concept of a decomposing boundary triplet we consider the boundary ... More

Integrality of instanton numbersJul 31 2007Sep 17 2008We prove the results announced in a joint paper (arXiv:hep-th/0603106) with Maxim Kontsevich and Albert Schwarz.

Reconstruction of piecewise constant functions from X-ray dataJan 07 2019Apr 08 2019We show that on a two-dimensional compact nontrapping Riemannian manifold with strictly convex boundary, a piecewise constant function can be recovered from its integrals over geodesics. We adapt the injectivity proof which uses variations through geodesics ... More

On generalized resolvents and characteristic matrices of first-order symmetric systemsMar 16 2014We study general (not necessarily Hamiltonian) first-order symmetric system $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b) $ with the regular endpoint $a$ and singular endpoint $b$. It is assumed that the deficiency indices $n_\pm(\Tmi)$ of the corresponding ... More

On spectral and pseudospectral functions of first-order symmetric systemsJul 21 2014We consider general (not necessarily Hamiltonian) first-order symmetric system $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b) $ with the regular endpoint $a$. A distribution matrix-valued function $\Si(s), \; s\in\bR,$ is called a spectral (pseudospectral) ... More

Boundary relations and boundary conditions for general (not necessarily definite) canonical systems with possibly unequal deficiency indicesSep 10 2011Sep 13 2011We investigate in the paper general (not necessarily definite) canonical systems of differential equation in the framework of extension theory of symmetric linear relations. For this aim we first introduce the new notion of a boundary relation $\G:\gH^2\to\HH$ ... More

On compressions of self-adjoint extensions of a symmetric linear relationDec 01 2018Let $A$ be a symmetric linear relation in the Hilbert space $\gH$ with equal deficiency indices $n_\pm (A)\leq\infty$. A self-adjoint linear relation $\wt A\supset A$ in some Hilbert space $\wt\gH\supset \gH$ is called an exit space extension of $A$; ... More

Triangulated endofunctors of the derived category of coherent sheaves which do not admit DG liftingsApr 29 2016Recently, Rizzardo and Van den Bergh constructed an example of a triangulated functor between the derived categories of coherent sheaves on smooth projective varieties over a field $k$ of characteristic $0$ which is not of the Fourier-Mukai type. The ... More

On the properties of nodal price response matrix in electricity marketsApr 14 2014Jan 24 2015We establish sufficient conditions for nodal price response matrix in electric power system to be symmetric and negative (semi-)definite. The results are applicable for electricity markets with nonlinear and intertemporal constraints.

Remarks on formal deformations and Batalin-Vilkovisky algebrasFeb 02 1998Feb 10 1998This note consists of two parts. Part I is an exposition of (a part of) the V.Drinfeld's letter, [D]. The sheaf of algebras of polyvector fields on a Calabi-Yau manifold, equipped with the Schouten bracket, admits a structure of a Batalin-Vilkovisky algebra. ... More

On the possibility to measure nuclear matrix element for neutrinoless double beta decay of Ca48Aug 25 2011As shown in Ref. \cite{Rod09}, the Fermi part $M_{F}^{0\nu}$ of the total $0\nu\beta\beta$-decay nuclear matrix element $M^{0\nu}$ can be related to the single Fermi transition matrix element between the isobaric analog state (IAS) of the ground state ... More

Explicit Solutions to Boundary Problems for 2+1-Dimensional Integrable SystemsDec 16 2010Nonlinear integrable models with two spatial and one temporal variables: Kadomtsev-Petviashvili equation and two-dimensional Toda lattice are investigated on the subject of correct formulation for boundary problem that can be solved within the framework ... More

Guided Grammar ConvergenceMar 29 2015Relating formal grammars is a hard problem that balances between language equivalence (which is known to be undecidable) and grammar identity (which is trivial). In this paper, we investigate several milestones between those two extremes and propose a ... More

Translating photobiology to electrophysiology: A brief overview of several photobiological processes with accent on electrophysiologyJun 28 2013The mini-review gives special attention to holistic approach and mechanisms of processes. The physical and chemical frames and background for visual perception and signalling are discussed. Perception of photons by retinal rod cells is described in more ... More

On generalized resolvents and characteristic matrices of differential operatorsSep 21 2009The main objects of our considerations are differential operators generated by a formally selfadjoint differential expression of an even order on the interval $[0,b> (b\leq \infty)$ with operator valued coefficients. We complement and develop the known ... More

$\Ughr$ invariant quantization on some homogeneous manifoldsNov 05 2002We consider a class of homogeneous manifolds over a simple Lie group which appears in the problem of classification of homogeneous manifolds with reductive subgroups of maximal rank as stabilizer of a point. We prove that any manifold of this class possesses ... More

Stability preserving structural transformations of systems of linear second-order ordinary differential equationsApr 09 2012In the paper we have developed a theory of stability preserving structural transformations of systems of second-order ordinary differential equations (ODEs), i.e., the transformations which preserve the property of Lyapunov stability. The main Theorem ... More

Off-critical lattice models and massive SLEsSep 29 2009We suggest how versions of Schramm's SLE can be used to describe the scaling limit of some off-critical 2D lattice models. Many open questions remain.

Compositional waves and variations in the atmospheric abundances of magnetic starsFeb 01 2016The stars of the middle main sequence often have relatively quiescent outer layers and spot-like chemical structures may develope in their atmospheres. Recent observations show that abundance peculiarities can change as stars evolve on the main sequence ... More

Element spots in Ap- and HgMn-stars from current-driven diffusionJan 25 2016The stars of the middle main sequence often have spot-like chemical structures at their surfaces. We consider the diffusion process caused by electric currents that can lead to the formation of such chemical spots. Diffusion is considered using the partial ... More

Bulk universality for random lozenge tilings near straight boundaries and for tensor productsMar 08 2016We prove that the asymptotic of the bulk local statistics in models of random lozenge tilings is universal in the vicinity of straight boundaries of the tiled domains. The result applies to uniformly random lozenge tilings of large polygonal domains on ... More

A geometric proof of the existence of Whitney stratificationsOct 13 2000A stratification of a singular set, e.g. an algebraic or analytic variety, is, roughly, a partition of it into manifolds so that these manifolds fit together "regularly". A classical theorem of Whitney says that any complex analytic set has a stratification. ... More

Cepheid Kinematics and the Galactic WarpOct 27 2013The space velocities of 200 long-period ($P>5$ days) classical Cepheids with known proper motions and line-of-sight velocities whose distances were estimated from the period--luminosity relation have been analyzed. The linear Ogorodnikov-Milne model has ... More

Orientation Parameters of the Cepheid System in the GalaxyOct 27 2013Based on the distribution of long-period Cepheids, we have redetermined the orientation parameters of their principal plane in the Galaxy. Based on 299 Cepheids with heliocentric distances $r<20$ kpc and pulsation periods $P\geq5^d$, we have found the ... More

Neutron Skin and Giant Resonances in NucleiApr 02 2007Some aspects, both experimental and theoretical, of extracting the neutron skin $\Delta R$ from properties of isovector giant resonances are discussed. Existing proposals are critically reviewed. The method relying on the energy difference between the ... More

One-Loop Threshold Effects in String UnificationMay 19 1992Like grand unification of old, string unification predicts simple tree-level relations between the couplings of all unbroken gauge groups such as $SU(3)_C$ or $SU(2)_W\)$. I show here how to compute one-loop corrections to these relations for any four-dimensional ... More

Pseudo-random number generators for Monte Carlo simulations on Graphics Processing UnitsMar 09 2010Basic uniform pseudo-random number generators are implemented on ATI Graphics Processing Units (GPU). The performance results of the realized generators (multiplicative linear congruential (GGL), XOR-shift (XOR128), RANECU, RANMAR, RANLUX and Mersenne ... More

Pion reactions with few-nucleon systemsOct 08 2009We report about the recent results for s- and p-wave pion production in NN -> NNpi within effective field theory and discuss how the charge symmetry breaking in pn -> d pi^0 can be used to extract the strong contribution to the neutron-proton mass difference. ... More

Graph Parameters and Ramsey TheoryAug 27 2016Ramsey's Theorem tells us that there are exactly two minimal hereditary classes containing graphs with arbitrarily many vertices: the class of complete graphs and the class of edgeless graphs. In other words, Ramsey's Theorem characterizes the graph vertex ... More

Hodge realizations of 1-motives and the derived AlbaneseSep 17 2008Dec 08 2011We prove that the embedding of the derived category of 1-motives into the triangulated category of effective Voevodsky motives, as well as its left adjoint functor $LAlb$, commute with the Hodge realization.

Modern High Intensity H- Accelerator SourcesJun 09 2018A review of modern high intensity H- ion sources for accelerators is presented. The cesiation effect, a significant enhancement of negative ion emission from gas discharges with decrease of co-extracted electron current below negative ion current, was ... More

A Non-classification Result for Wild KnotsApr 09 2015Apr 21 2016Using methods of descriptive theory it is shown that the classification problem for wild knots is strictly harder than that for countable structures.

On the first continuous $L^2$-cohomology of free group factorsDec 19 2013Jan 06 2014We prove that the first continuous $L^2$-cohomology of free group factors vanishes. This answers a question by Andreas Thom regarding continuity properties of free difference quotients and shows that one can not distinguish free group factors by means ... More

Using Information Semantic Systems for Absolutely Secure ProcessingFeb 24 2010Propose a new cryptographic information concept. It allows : - to create absolutely algorithmic unbreakable ciphers for communication through open digital channels; - to create new code-breaking methods. They will be the most efficient decoding methods ... More

The Hilbert 16-th problem and an estimate for cyclicity of an elementary polycycleOct 17 2000Hilbert-Arnold (HA) problem, motivated by Hilbert 16-th problem, is to prove that for a generic k-parameter family of smooth vector fields {\dot x=v(x,\eps)}_{\eps\in B^k} on the 2-dimensional sphere S^2 has uniformly bounded number of limit cycles (isolated ... More

Generic Diffeomorphisms with Superexponential Growth of Number of Periodic OrbitsFeb 26 1999Consider a compact manifold M of dimension at least 2 and the space of C^r-smooth diffeomorphisms Diff^r(M). The classical Artin-Mazur theorem says that for a dense subset D of Diff^r(M) the number of isolated periodic points grows at most exponentially ... More

Fisher information and quantum mechanical models for financeApr 15 2015The probability distribution function (PDF) for prices on financial markets is derived by extremization of Fisher information. It is shown how on that basis the quantum-like description for financial markets arises and different financial market models ... More

Moments of the ARPES spectral function of an undoped Mott insulatorMar 15 2000We derive analytic expressions for the first three frequency moments of the single particle spectral function for one hole in a Mott insulator in terms of equilibrium spin correlation functions of the insulating state. We show that the ``remnant Fermi ... More

MediaWiki Grammar RecoveryJul 23 2011The paper describes in detail the recovery effort of one of the official MediaWiki grammars. Over two hundred grammar transformation steps are reported and annotated, leading to delivery of a level 2 grammar, semi-automatically extracted from a community ... More

Induced Magnetic Field in a Finite Fermion Density Maxwell QED$_{2+1}$Jan 20 1997Jan 22 1997We are studying finite fermion density states in Maxwell QED$_{2+1}$ with external magnetic field. It is shown that at any fermion density the energy of some magnetized states may be less than that of the state with the same density, but no magnetic field. ... More

Disjointness of representations arising in harmonic analysis on the infinite-dimensional unitary groupMay 17 2008Nov 07 2008We prove pairwise disjointness of representations T_{z,w} of the infinite-dimensional unitary group. These representations provide a natural generalization of the regular representation for the case of "big" group U(\infty). They were introduced and studied ... More

Development of charge-exchange injection at the Novosibirsk Institute of Nuclear Physics and around the WorldAug 17 2018The study of charge-exchange injection of protons into accelerators started in 1960 at the Institute of Nuclear Physics of the Siberian Branch of Russian Academy of Science, as proposed by G. I. Budker in connection with the development of the program ... More

The Grammar Hammer of 2012Dec 17 2012This document is a case study in aggressive self-archiving. It collects all initiatives undertaken by its author in 2012, including unpublished ones, explains their relevance and relation with one another. Discussed topics include guided convergence of ... More

Symmetric operators with real defect subspaces of the maximal dimension. Applications to differential operatorsDec 17 2010Let $\gH$ be a Hilbert space and let $A$ be a simple symmetric operator in $\gH$ with equal deficiency indices $d:=n_\pm(A)<\infty$. We show that if, for all $\l$ in an open interval $I\subset\bR$, the dimension of defect subspaces $\gN_\l(A)(=\Ker (A^*-\l))$ ... More

On the derived DG functorsApr 12 2010Jan 05 2011Assume that abelian categories $A, B$ over a field admit countable direct limits and that these limits are exact. Let $F: D^+_{dg}(A) --> D^+_{dg}(B)$ be a DG quasi-functor such that the functor $Ho(F): D^+(A) \to D^+(B)$ carries $D^{\geq 0}(A)$ to $D^{\geq ... More

Investigation of heavy ions diffusion under the influence of current-driven mechanism and compositional waves in plasmaMay 25 2016We consider diffusion caused by a combined influence of the Hall effect and electric currents, and argue that such diffusion forms chemical inhomogeneities in plasma. The considered mechanism can be responsible for the formation of element spots in laboratory ... More

Diffusion in plasma: the Hall effect, compositional waves, and chemical spotsSep 12 2016We consider diffusion caused by a combined influence of the electric current and the Hall effect, and argue that such diffusion can form inhomogeneities of the chemical composition in plasma. The considered mechanism can be responsible for a formation ... More

Optimal Polynomial-Time Estimators: A Bayesian Notion of Approximation AlgorithmAug 14 2016Sep 15 2016The concept of an "approximation algorithm" is usually only applied to optimization problems since in optimization problems the performance of the algorithm on any given input is a continuous parameter. We introduce a new concept of approximation applicable ... More

Emergent quantum mechanics of financesDec 11 2013This paper is an attempt at understanding the quantum-like dynamics of financial markets in terms of non-differentiable price-time continuum having fractal properties. The main steps of this development are the statistical scaling, the non-differentiability ... More

Dynamics of Inhomogeneous Tomonaga-Luttinger Liquid WireNov 05 1995Dynamics of the 1D electron transport between two reservoirs are studied based on the inhomogeneous Tomonaga- Luttinger Liquid (ITLL) model in the case when the effect of the electron backscattering on the impurities is negligible. The inhomogeneities ... More

Umklapp scattering in transport through a 1D wire of finite lengthJul 05 1999Suppression of electron current $ \Delta I$ through a 1D channel of length $L$ connecting two Fermi liquid reservoirs is studied taking into account the Umklapp interaction induced by a periodic potential. This interaction opens band gaps at the integer ... More

Vertex algebras and elliptic generaJun 27 1999A report at Arbeitstagung, June 1999, Bonn, on the joint work with V.Gorbounov, F.Malikov and A.Vaintrob.

ERRATA for "One-Loop Threshold Effects in String Unification"May 19 1992The original paper, as published in Nuclear Physics B in 1988, had a few factor-of-two errors. Some people got confused by those errors. The purpose of these errata is to make things clear. The revised version of the complete article is also posted to ... More

Relation of isospin-symmetry breaking correction for superallowed beta decay to energy of charge-exchange giant monopole resonanceJun 03 2012Dec 15 2013After application of an analytical transformation, a new exact representation for the nuclear isospin-symmetry breaking correction $\delta_C$ to superallowed beta decay is obtained. The correction is shown to be essentially the reciprocal of the square ... More

Salinity tolerance in plants: attempts to manipulate ion transportNov 06 2014Ion transport is the major determining factor of salinity tolerance in plants. A simple scheme of a plant cell with ion fluxes provides basic understanding of ion transport and the corresponding changes of ion concentrations under salinity. The review ... More

Reconstruction of piecewise constant functions from X-ray dataJan 07 2019We show that on a two-dimensional compact nontrapping Riemannian manifold with strictly convex boundary, a piecewise constant function can be recovered from its integrals over geodesics. We adapt the injectivity proof which uses variations through geodesics ... More

Classification and Non-classification of Homeomorphism RelationsJul 26 2014Jan 14 2015The paper deals with the program of determining the complexity of various homeomorphism relations. The homeomorphism relation on compact Polish spaces is known to be reducible to an orbit equivalence relation of a continuous Polish group action (Kechris-Solecki). ... More

Concavity of Eigenvalue Sums and the Spectral Shift FunctionDec 26 2001It is well known that the sum of negative (positive) eigenvalues of some finite Hermitian matrix $V$ is concave (convex) with respect to $V$. Using the theory of the spectral shift function we generalize this property to self-adjoint operators on a separable ... More

On eigenfunction expansions of first-order symmetric systems and ordinary differential operators of an odd orderJul 25 2013We study general (not necessarily Hamiltonian) first-order symmetric systems $J y'-B(t)y=\D(t) f(t)$ on an interval $\cI=[a,b\rangle $ with the regular endpoint $a$. It is assumed that the deficiency indices $n_\pm(\Tmi)$ of the minimal relation $\Tmi$ ... More

On the weak and ergodic limit of the spectral shift functionNov 19 2009We discuss convergence properties of the spectral shift functions associated with a pair of Schrodinger operators with Dirichlet boundary conditions at the end points of a finite interval (0, r) as the length of interval approaches infinity.