-
Exploring Layerwise Adversarial Robustness Through the Lens of t-SNE
Authors:
Inês Valentim,
Nuno Antunes,
Nuno Lourenço
Abstract:
Adversarial examples, designed to trick Artificial Neural Networks (ANNs) into producing wrong outputs, highlight vulnerabilities in these models. Exploring these weaknesses is crucial for develo** defenses, and so, we propose a method to assess the adversarial robustness of image-classifying ANNs. The t-distributed Stochastic Neighbor Embedding (t-SNE) technique is used for visual inspection, a…
▽ More
Adversarial examples, designed to trick Artificial Neural Networks (ANNs) into producing wrong outputs, highlight vulnerabilities in these models. Exploring these weaknesses is crucial for develo** defenses, and so, we propose a method to assess the adversarial robustness of image-classifying ANNs. The t-distributed Stochastic Neighbor Embedding (t-SNE) technique is used for visual inspection, and a metric, which compares the clean and perturbed embeddings, helps pinpoint weak spots in the layers. Analyzing two ANNs on CIFAR-10, one designed by humans and another via NeuroEvolution, we found that differences between clean and perturbed representations emerge early on, in the feature extraction layers, affecting subsequent classification. The findings with our metric are supported by the visual analysis of the t-SNE maps.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
MONDEO: Multistage Botnet Detection
Authors:
Duarte Dias,
Bruno Sousa,
Nuno Antunes
Abstract:
Mobile devices have widespread to become the most used piece of technology. Due to their characteristics, they have become major targets for botnet-related malware. FluBot is one example of botnet malware that infects mobile devices. In particular, FluBot is a DNS-based botnet that uses Domain Generation Algorithms (DGA) to establish communication with the Command and Control Server (C2). MONDEO i…
▽ More
Mobile devices have widespread to become the most used piece of technology. Due to their characteristics, they have become major targets for botnet-related malware. FluBot is one example of botnet malware that infects mobile devices. In particular, FluBot is a DNS-based botnet that uses Domain Generation Algorithms (DGA) to establish communication with the Command and Control Server (C2). MONDEO is a multistage mechanism with a flexible design to detect DNS-based botnet malware. MONDEO is lightweight and can be deployed without requiring the deployment of software, agents, or configuration in mobile devices, allowing easy integration in core networks. MONDEO comprises four detection stages: Blacklisting/Whitelisting, Query rate analysis, DGA analysis, and Machine learning evaluation. It was created with the goal of processing streams of packets to identify attacks with high efficiency, in the distinct phases. MONDEO was tested against several datasets to measure its efficiency and performance, being able to achieve high performance with RandomForest classifiers. The implementation is available at github.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
Applied metamodelling for ATM performance simulations
Authors:
Christoffer Riis,
Francisco N. Antunes,
Tatjana Bolić,
Gérald Gurtner,
Andrew Cook,
Carlos Lima Azevedo,
Francisco Câmara Pereira
Abstract:
The use of Air traffic management (ATM) simulators for planing and operations can be challenging due to their modelling complexity. This paper presents XALM (eXplainable Active Learning Metamodel), a three-step framework integrating active learning and SHAP (SHapley Additive exPlanations) values into simulation metamodels for supporting ATM decision-making. XALM efficiently uncovers hidden relatio…
▽ More
The use of Air traffic management (ATM) simulators for planing and operations can be challenging due to their modelling complexity. This paper presents XALM (eXplainable Active Learning Metamodel), a three-step framework integrating active learning and SHAP (SHapley Additive exPlanations) values into simulation metamodels for supporting ATM decision-making. XALM efficiently uncovers hidden relationships among input and output variables in ATM simulators, those usually of interest in policy analysis. Our experiments show XALM's predictive performance comparable to the XGBoost metamodel with fewer simulations. Additionally, XALM exhibits superior explanatory capabilities compared to non-active learning metamodels.
Using the `Mercury' (flight and passenger) ATM simulator, XALM is applied to a real-world scenario in Paris Charles de Gaulle airport, extending an arrival manager's range and scope by analysing six variables. This case study illustrates XALM's effectiveness in enhancing simulation interpretability and understanding variable interactions. By addressing computational challenges and improving explainability, XALM complements traditional simulation-based analyses.
Lastly, we discuss two practical approaches for reducing the computational burden of the metamodelling further: we introduce a stop** criterion for active learning based on the inherent uncertainty of the metamodel, and we show how the simulations used for the metamodel can be reused across key performance indicators, thus decreasing the overall number of simulations needed.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Attribute network models, stochastic approximation, and network sampling and ranking algorithms
Authors:
Nelson Antunes,
Sayan Banerjee,
Shankar Bhamidi,
Vladas Pipiras
Abstract:
We analyze dynamic random network models where younger vertices connect to older ones with probabilities proportional to their degrees as well as a propensity kernel governed by their attribute types. Using stochastic approximation techniques we show that, in the large network limit, such networks converge in the local weak sense to randomly stopped multitype branching processes whose explicit des…
▽ More
We analyze dynamic random network models where younger vertices connect to older ones with probabilities proportional to their degrees as well as a propensity kernel governed by their attribute types. Using stochastic approximation techniques we show that, in the large network limit, such networks converge in the local weak sense to randomly stopped multitype branching processes whose explicit description allows for the derivation of asymptotics for a wide class of network functionals. These asymptotics imply that while degree distribution tail exponents depend on the attribute type (already derived by Jordan (2013)), Page-rank centrality scores have the \emph{same} tail exponent across attributes. Moreover, the mean behavior of the limiting Page-rank score distribution can be explicitly described and shown to depend on the attribute type. The limit results also give explicit formulae for the performance of various network sampling mechanisms. One surprising consequence is the efficacy of Page-rank and walk based network sampling schemes for directed networks in the setting of rare minorities. The results also allow one to evaluate the impact of various proposed mechanisms to increase degree centrality of minority attributes in the network, and to quantify the bias in inferring about the network from an observed sample. Further, we formalize the notion of resolvability of such models where, owing to propagation of chaos type phenomenon in the evolution dynamics for such models, one can set up a correspondence to models driven by continuous time branching process dynamics.
△ Less
Submitted 17 April, 2023;
originally announced April 2023.
-
Adversarial Robustness Assessment of NeuroEvolution Approaches
Authors:
Inês Valentim,
Nuno Lourenço,
Nuno Antunes
Abstract:
NeuroEvolution automates the generation of Artificial Neural Networks through the application of techniques from Evolutionary Computation. The main goal of these approaches is to build models that maximize predictive performance, sometimes with an additional objective of minimizing computational complexity. Although the evolved models achieve competitive results performance-wise, their robustness…
▽ More
NeuroEvolution automates the generation of Artificial Neural Networks through the application of techniques from Evolutionary Computation. The main goal of these approaches is to build models that maximize predictive performance, sometimes with an additional objective of minimizing computational complexity. Although the evolved models achieve competitive results performance-wise, their robustness to adversarial examples, which becomes a concern in security-critical scenarios, has received limited attention. In this paper, we evaluate the adversarial robustness of models found by two prominent NeuroEvolution approaches on the CIFAR-10 image classification task: DENSER and NSGA-Net. Since the models are publicly available, we consider white-box untargeted attacks, where the perturbations are bounded by either the L2 or the Linfinity-norm. Similarly to manually-designed networks, our results show that when the evolved models are attacked with iterative methods, their accuracy usually drops to, or close to, zero under both distance metrics. The DENSER model is an exception to this trend, showing some resistance under the L2 threat model, where its accuracy only drops from 93.70% to 18.10% even with iterative attacks. Additionally, we analyzed the impact of pre-processing applied to the data before the first layer of the network. Our observations suggest that some of these techniques can exacerbate the perturbations added to the original inputs, potentially harming robustness. Thus, this choice should not be neglected when automatically designing networks for applications where adversarial attacks are prone to occur.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
Authors:
Charles F. Gonçalves,
Daniel S. Menasché,
Alberto Avritzer,
Nuno Antunes,
Marco Vieira
Abstract:
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To…
▽ More
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To tackle those challenges, we focus on anomaly detection approaches based on system performance signatures. In particular, performance signatures have the potential of detecting zero-day attacks, as those approaches are based on detecting performance deviations and do not require detailed knowledge of attack history. The proposed methodology leverages an analytical performance model and experimentation and allows to control the rate of false positives in a principled manner. The methodology is evaluated using the TPCx-V workload, which was profiled during a set of executions using resource exhaustion anomalies that emulate the effects of anomalies affecting system performance. The proposed approach was able to successfully detect the anomalies, with a low number of false positives (precision 90%-98%).
△ Less
Submitted 15 June, 2020;
originally announced June 2020.
-
The Impact of Data Preparation on the Fairness of Software Systems
Authors:
Inês Valentim,
Nuno Lourenço,
Nuno Antunes
Abstract:
Machine learning models are widely adopted in scenarios that directly affect people. The development of software systems based on these models raises societal and legal concerns, as their decisions may lead to the unfair treatment of individuals based on attributes like race or gender. Data preparation is key in any machine learning pipeline, but its effect on fairness is yet to be studied in deta…
▽ More
Machine learning models are widely adopted in scenarios that directly affect people. The development of software systems based on these models raises societal and legal concerns, as their decisions may lead to the unfair treatment of individuals based on attributes like race or gender. Data preparation is key in any machine learning pipeline, but its effect on fairness is yet to be studied in detail. In this paper, we evaluate how the fairness and effectiveness of the learned models are affected by the removal of the sensitive attribute, the encoding of the categorical attributes, and instance selection methods (including cross-validators and random undersampling). We used the Adult Income and the German Credit Data datasets, which are widely studied and known to have fairness concerns. We applied each data preparation technique individually to analyse the difference in predictive performance and fairness, using statistical parity difference, disparate impact, and the normalised prejudice index. The results show that fairness is affected by transformations made to the training data, particularly in imbalanced datasets. Removing the sensitive attribute is insufficient to eliminate all the unfairness in the predictions, as expected, but it is key to achieve fairer models. Additionally, the standard random undersampling with respect to the true labels is sometimes more prejudicial than performing no random undersampling.
△ Less
Submitted 5 October, 2019;
originally announced October 2019.
-
Sampling-based Estimation of In-degree Distribution with Applications to Directed Complex Networks
Authors:
Nelson Antunes,
Shankar Bhamidi,
Tianjian Guo,
Vladas Pipiras,
Bang Wang
Abstract:
The focus of this work is on estimation of the in-degree distribution in directed networks from sampling network nodes or edges. A number of sampling schemes are considered, including random sampling with and without replacement, and several approaches based on random walks with possible jumps. When sampling nodes, it is assumed that only the out-edges of that node are visible, that is, the in-deg…
▽ More
The focus of this work is on estimation of the in-degree distribution in directed networks from sampling network nodes or edges. A number of sampling schemes are considered, including random sampling with and without replacement, and several approaches based on random walks with possible jumps. When sampling nodes, it is assumed that only the out-edges of that node are visible, that is, the in-degree of that node is not observed. The suggested estimation of the in-degree distribution is based on two approaches. The inversion approach exploits the relation between the original and sample in-degree distributions, and can estimate the bulk of the in-degree distribution, but not the tail of the distribution. The tail of the in-degree distribution is estimated through an asymptotic approach, which itself has two versions: one assuming a power-law tail and the other for a tail of general form. The two estimation approaches are examined on synthetic and real networks, with good performance results, especially striking for the asymptotic approach.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
On Benchmarking Intrusion Detection Systems in Virtualized Environments
Authors:
Aleksandar Milenkoski,
Samuel Kounev,
Alberto Avritzer,
Nuno Antunes,
Marco Vieira
Abstract:
Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for vi…
▽ More
Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for virtualized environments as VMM-based IDSes. In this work, we analyze state-of-the-art intrusion detection techniques applied in virtualized environments and architectures of VMM-based IDSes. Further, we identify challenges that apply specifically to benchmarking VMM-based IDSes focussing on workloads and metrics. For example, we discuss the challenge of defining representative baseline benign workload profiles as well as the challenge of defining malicious workloads containing attacks targeted at the VMM. We also discuss the impact of on-demand resource provisioning features of virtualized environments (e.g., CPU and memory hotplugging, memory ballooning) on IDS benchmarking measures such as capacity and attack detection accuracy. Finally, we outline future research directions in the area of benchmarking VMM-based IDSes and of intrusion detection in virtualized environments in general.
△ Less
Submitted 5 October, 2014;
originally announced October 2014.
-
Technical Information on Vulnerabilities of Hypercall Handlers
Authors:
Aleksandar Milenkoski,
Marco Vieira,
Bryan D. Payne,
Nuno Antunes,
Samuel Kounev
Abstract:
Modern virtualized service infrastructures expose attack vectors that enable attacks of high severity, such as attacks targeting hypervisors. A malicious user of a guest VM (virtual machine) may execute an attack against the underlying hypervisor via hypercalls, which are software traps from a kernel of a fully or partially paravirtualized guest VM to the hypervisor. The exploitation of a vulnerab…
▽ More
Modern virtualized service infrastructures expose attack vectors that enable attacks of high severity, such as attacks targeting hypervisors. A malicious user of a guest VM (virtual machine) may execute an attack against the underlying hypervisor via hypercalls, which are software traps from a kernel of a fully or partially paravirtualized guest VM to the hypervisor. The exploitation of a vulnerability of a hypercall handler may have severe consequences such as altering hypervisor's memory, which may result in the execution of malicious code with hypervisor privilege. Despite the importance of vulnerabilities of hypercall handlers, there is not much publicly available information on them. This significantly hinders advances towards securing hypercall interfaces. In this work, we provide in-depth technical information on publicly disclosed vulnerabilities of hypercall handlers. Our vulnerability analysis is based on reverse engineering the released patches fixing the considered vulnerabilities. For each analyzed vulnerability, we provide background information essential for understanding the vulnerability, and information on the vulnerable hypercall handler and the error causing the vulnerability. We also show how the vulnerability can be triggered and discuss the state of the targeted hypervisor after the vulnerability has been triggered.
△ Less
Submitted 5 October, 2014;
originally announced October 2014.
-
Probabilistic sampling of finite renewal processes
Authors:
Nelson Antunes,
Vladas Pipiras
Abstract:
Consider a finite renewal process in the sense that interrenewal times are positive i.i.d. variables and the total number of renewals is a random variable, independent of interrenewal times. A finite point process can be obtained by probabilistic sampling of the finite renewal process, where each renewal is sampled with a fixed probability and independently of other renewals. The problem addressed…
▽ More
Consider a finite renewal process in the sense that interrenewal times are positive i.i.d. variables and the total number of renewals is a random variable, independent of interrenewal times. A finite point process can be obtained by probabilistic sampling of the finite renewal process, where each renewal is sampled with a fixed probability and independently of other renewals. The problem addressed in this work concerns statistical inference of the original distributions of the total number of renewals and interrenewal times from a sample of i.i.d. finite point processes obtained by sampling finite renewal processes. This problem is motivated by traffic measurements in the Internet in order to characterize flows of packets (which can be seen as finite renewal processes) and where the use of packet sampling is becoming prevalent due to increasing link speeds and limited storage and processing capacities.
△ Less
Submitted 5 January, 2012;
originally announced January 2012.
-
Shards of Broken Symmetry: Topological Defects as Traces of the Phase Transition Dynamics
Authors:
W. H. Zurek,
L. M. A. Bettencourt,
J. Dziarmaga,
N. D. Antunes
Abstract:
We discuss the origin of topological defects in phase transitions and analyze their role as a "diagnostic tool" in the study of the non-equilibrium dynamics of symmetry breaking. Homogeneous second order phase transitions are the focus of our attention, but the same paradigm is applied to the cross-over and inhomogeneous transitions. The discrepancy between the experimental results in 3He and 4He…
▽ More
We discuss the origin of topological defects in phase transitions and analyze their role as a "diagnostic tool" in the study of the non-equilibrium dynamics of symmetry breaking. Homogeneous second order phase transitions are the focus of our attention, but the same paradigm is applied to the cross-over and inhomogeneous transitions. The discrepancy between the experimental results in 3He and 4He is discussed in the light of recent numerical studies. The possible role of the Ginzburg regime in determining the vortex line density for the case of a quench in 4He is raised and tentatively dismissed. The difference in the anticipated origin of the dominant signal in the two (3He and 4He) cases is pointed out and the resulting consequences for the subsequent decay of vorticity are noted. The possibility of a significant discrepancy between the effective field theory and (quantum) kinetic theory descriptions of the order parameter is briefly touched upon, using atomic Bose-Einstein condensates as an example.
△ Less
Submitted 10 March, 2010;
originally announced March 2010.
-
Traffic Capacity of Large WDM Passive Optical Networks
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
James Roberts
Abstract:
As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The paper discusses performance models applicable to wavelength division multiplexing (WDM) EPONs and GPONs under the assumption that users access the fibre via optical network units equipped with tunable transmitters. The con…
▽ More
As passive optical networks (PON) are increasingly deployed to provide high speed Internet access, it is important to understand their fundamental traffic capacity limits. The paper discusses performance models applicable to wavelength division multiplexing (WDM) EPONs and GPONs under the assumption that users access the fibre via optical network units equipped with tunable transmitters. The considered stochastic models are based on multiserver polling systems for which explicit analytical results are not known. A large system asymptotic, mean-field approximation, is used to derive closed form solutions of these complex systems. Convergence of the mean field dynamics is proved in the case of a simple network configuration. Simulation results show that, for a realistic sized PON, the mean field approximation is accurate.
△ Less
Submitted 27 March, 2010; v1 submitted 11 February, 2010;
originally announced February 2010.
-
Upstream traffic capacity of a WDM EPON under online GATE-driven scheduling
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
James Roberts
Abstract:
Passive optical networks are increasingly used for access to the Internet and it is important to understand the performance of future long-reach, multi-channel variants. In this paper we discuss requirements on the dynamic bandwidth allocation (DBA) algorithm used to manage the upstream resource in a WDM EPON and propose a simple novel DBA algorithm that is considerably more efficient than class…
▽ More
Passive optical networks are increasingly used for access to the Internet and it is important to understand the performance of future long-reach, multi-channel variants. In this paper we discuss requirements on the dynamic bandwidth allocation (DBA) algorithm used to manage the upstream resource in a WDM EPON and propose a simple novel DBA algorithm that is considerably more efficient than classical approaches. We demonstrate that the algorithm emulates a multi-server polling system and derive capacity formulas that are valid for general traffic processes. We evaluate delay performance by simulation demonstrating the superiority of the proposed scheduler. The proposed scheduler offers considerable flexibility and is particularly efficient in long-reach access networks where propagation times are high.
△ Less
Submitted 11 February, 2010;
originally announced February 2010.
-
Stochastic networks with multiple stable points
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
Danielle Tibi
Abstract:
This paper analyzes stochastic networks consisting of a set of finite capacity sites where different classes of individuals move according to some routing policy. The associated Markov jump processes are analyzed under a thermodynamic limit regime, that is, when the networks have some symmetry properties and when the number of nodes goes to infinity. An intriguing stability property is proved: u…
▽ More
This paper analyzes stochastic networks consisting of a set of finite capacity sites where different classes of individuals move according to some routing policy. The associated Markov jump processes are analyzed under a thermodynamic limit regime, that is, when the networks have some symmetry properties and when the number of nodes goes to infinity. An intriguing stability property is proved: under some conditions on the parameters, it is shown that, in the limit, several stable equilibrium points coexist for the empirical distribution. The key ingredient of the proof of this property is a dimension reduction achieved by the introduction of two energy functions and a convenient map** of their local minima and saddle points. Networks with a unique equilibrium point are also presented.
△ Less
Submitted 27 December, 2007; v1 submitted 12 January, 2006;
originally announced January 2006.
-
The Creation of Defects with Core Condensation
Authors:
Nuno D. Antunes,
Pedro Gandra,
Ray J. Rivers,
A. Swarup
Abstract:
Defects in superfluid 3He, high-Tc superconductors, QCD colour superfluids and cosmic vortons can possess (anti)ferromagnetic cores, and their generalisations. In each case there is a second order parameter whose value is zero in the bulk which does not vanish in the core. We examine the production of defects in the simplest 1+1 dimensional scalar theory in which a second order parameter can tak…
▽ More
Defects in superfluid 3He, high-Tc superconductors, QCD colour superfluids and cosmic vortons can possess (anti)ferromagnetic cores, and their generalisations. In each case there is a second order parameter whose value is zero in the bulk which does not vanish in the core. We examine the production of defects in the simplest 1+1 dimensional scalar theory in which a second order parameter can take non-zero values in a defect core. We study in detail the effects of core condensation on the defect production mechanism.
△ Less
Submitted 31 March, 2006; v1 submitted 17 January, 2006;
originally announced January 2006.
-
Integration of streaming services and TCP data transmission in the Internet
Authors:
Nelson Antunes,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian p…
▽ More
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian process (X(t)). Under the assumption that data transfers are exponentially distributed, arrive according to a Poisson process, and share the available bandwidth according to the ideal processor sharing discipline, we derive the mean bit rate of a data transfer as a power series expansion in \eps. Since the system can be described by means of an M/M/1 queue with a time-varying server rate, which depends upon the parameter \eps and process (X(t)), the key issue is to compute an expansion of the area swept under the occupation process of this queue in a busy period. We obtain closed formulas for the power series expansion in \eps of the mean bit rate, which allow us to verify the validity of the so-called reduced service rate at the first order. The second order term yields more insight into the negative impact of the variability of streaming flows.
△ Less
Submitted 6 January, 2006;
originally announced January 2006.
-
Perturbation Analysis of a Variable M/M/1 Queue: A Probabilistic Approach
Authors:
Nelson Antunes,
Christine Fricker,
Fabrice Guillemin,
Philippe Robert
Abstract:
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute t…
▽ More
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute the two first terms of the power series expansion in \eps of the mean value of the busy period duration. This allows us to study the validity of the Reduced Service Rate (RSR) approximation, which consists in comparing the perturbed M/M/1 queue with the M/M/1 queue where the service rate is constant and equal to the mean value of the perturbation. For the first term of the expansion, the two systems are equivalent. For the second term, the situation is more complex and it is shown that the correlations of the environment process (X(t)) play a key role.
△ Less
Submitted 6 January, 2006;
originally announced January 2006.
-
Analysis of loss networks with routing
Authors:
Nelson Antunes,
Christine Fricker,
Philippe Robert,
Danielle Tibi
Abstract:
This paper analyzes stochastic networks consisting of finite capacity nodes with different classes of requests which move according to some routing policy. The Markov processes describing these networks do not, in general, have reversibility properties, so the explicit expression of their invariant distribution is not known. Kelly's limiting regime is considered: the arrival rates of calls as we…
▽ More
This paper analyzes stochastic networks consisting of finite capacity nodes with different classes of requests which move according to some routing policy. The Markov processes describing these networks do not, in general, have reversibility properties, so the explicit expression of their invariant distribution is not known. Kelly's limiting regime is considered: the arrival rates of calls as well as the capacities of the nodes are proportional to a factor going to infinity. It is proved that, in limit, the associated rescaled Markov process converges to a deterministic dynamical system with a unique equilibrium point characterized by a nonstandard fixed point equation.
△ Less
Submitted 14 February, 2007; v1 submitted 22 December, 2005;
originally announced December 2005.
-
Decoherence, tunneling and noise-activation in a double-potential well at high and zero temperature
Authors:
Nuno D. Antunes,
Fernando C. Lombardo,
Diana Monteoliva,
Paula I. Villar
Abstract:
We study the effects of the environment on tunneling in an open system described by a static double-well potential. We describe the evolution of a quantum state localized in one of the minima of the potential at $t=0$, both in the limits of high and zero environment temperature. We show that the evolution of the system can be summarized in terms of three main physical phenomena, namely decoheren…
▽ More
We study the effects of the environment on tunneling in an open system described by a static double-well potential. We describe the evolution of a quantum state localized in one of the minima of the potential at $t=0$, both in the limits of high and zero environment temperature. We show that the evolution of the system can be summarized in terms of three main physical phenomena, namely decoherence, quantum tunneling and noise-induced activation, and we obtain analytical estimates for the corresponding time-scales. These analytical predictions are confirmed by large-scale numerical simulations, providing a detailed picture of the main stages of the evolution and of the relevant dynamical processes.
△ Less
Submitted 26 April, 2006; v1 submitted 3 August, 2005;
originally announced August 2005.
-
Domain Formation: Decided Before, or After the Transition?
Authors:
Nuno D. Antunes,
Pedro Gandra,
Ray J. Rivers
Abstract:
There is increasing evidence that causality provides useful bounds in determining the domain structure after a continuous transition. In devising their scaling laws for domain size after such a transition, Zurek and Kibble presented arguments in which causality is important both before and after the time at which the transition begins to be implemented. Using numerical simulations of kinks in 1+…
▽ More
There is increasing evidence that causality provides useful bounds in determining the domain structure after a continuous transition. In devising their scaling laws for domain size after such a transition, Zurek and Kibble presented arguments in which causality is important both before and after the time at which the transition begins to be implemented. Using numerical simulations of kinks in 1+1 dimensions, we explain how the domain structure is determined exclusively by what happens after the transition, even though the correlation length freezes in before the transition.
△ Less
Submitted 17 July, 2006; v1 submitted 1 April, 2005;
originally announced April 2005.
-
The role of dissipation in biasing the vacuum selection in quantum field theory at finite temperature
Authors:
F. Freire,
N. D. Antunes,
P. Salmi,
A. Achucarro
Abstract:
We study the symmetry breaking pattern of an O(4) symmetric model of scalar fields, with both charged and neutral fields, interacting with a photon bath. Nagasawa and Brandenberger argued that in favourable circumstances the vacuum manifold would be reduced from S^3 to S^1. Here it is shown that a selective condensation of the neutral fields, that are not directly coupled to photons, can be achi…
▽ More
We study the symmetry breaking pattern of an O(4) symmetric model of scalar fields, with both charged and neutral fields, interacting with a photon bath. Nagasawa and Brandenberger argued that in favourable circumstances the vacuum manifold would be reduced from S^3 to S^1. Here it is shown that a selective condensation of the neutral fields, that are not directly coupled to photons, can be achieved in the presence of a minimal ``external'' dissipation, i.e. not related to interactions with a bath. This should be relevant in the early universe or in heavy-ion collisions where dissipation occurs due to expansion.
△ Less
Submitted 26 August, 2005; v1 submitted 23 February, 2005;
originally announced February 2005.
-
The Effects of Multiplicative Noise in Relativistic Phase Transitions
Authors:
Nuno D. Antunes,
Pedro Gandra,
Ray J. Rivers
Abstract:
Effective stochastic equations for the continuous transitions of relativistic quantum fields inevitably contain multiplicative noise. We examine the effect of such noise in a numerical simulation of a temperature quench in a 1+1 dimensional scalar theory. We look at out-of-equilibrium defect formation and compare our results with those of stochastic equations with purely additive noise.
Effective stochastic equations for the continuous transitions of relativistic quantum fields inevitably contain multiplicative noise. We examine the effect of such noise in a numerical simulation of a temperature quench in a 1+1 dimensional scalar theory. We look at out-of-equilibrium defect formation and compare our results with those of stochastic equations with purely additive noise.
△ Less
Submitted 18 January, 2005;
originally announced January 2005.
-
Spontaneous formation of domain wall lattices in two spatial dimensions
Authors:
Nuno D. Antunes,
Tanmay Vachaspati
Abstract:
We show that the process of spontaneous symmetry breaking can trap a field theoretic system in a highly non-trivial state containing a lattice of domain walls. In one large compact space dimension, a lattice is inevitably formed. In two dimensions, the probability of lattice formation depends on the ratio of sizes L_x, L_y of the spatial dimensions. We find that a lattice can form even if R=L_y/…
▽ More
We show that the process of spontaneous symmetry breaking can trap a field theoretic system in a highly non-trivial state containing a lattice of domain walls. In one large compact space dimension, a lattice is inevitably formed. In two dimensions, the probability of lattice formation depends on the ratio of sizes L_x, L_y of the spatial dimensions. We find that a lattice can form even if R=L_y/L_x is of order unity. We numerically determine the number of walls in the lattice as a function of L_x and L_y.
△ Less
Submitted 22 September, 2004; v1 submitted 26 April, 2004;
originally announced April 2004.
-
Kink-boundary collisions in a two dimensional scalar field theory
Authors:
Nuno D. Antunes,
Edmund J. Copeland,
Mark Hindmarsh,
Andre Lukas
Abstract:
In a two-dimensional toy model, motivated from five-dimensional heterotic M-theory, we study the collision of scalar field kinks with boundaries. By numerical simulation of the full two-dimensional theory, we find that the kink is always inelastically reflected with a model-independent fraction of its kinetic energy converted into radiation. We show that the reflection can be analytically unders…
▽ More
In a two-dimensional toy model, motivated from five-dimensional heterotic M-theory, we study the collision of scalar field kinks with boundaries. By numerical simulation of the full two-dimensional theory, we find that the kink is always inelastically reflected with a model-independent fraction of its kinetic energy converted into radiation. We show that the reflection can be analytically understood as a fluctuation around the scalar field vacuum. This picture suggests the possibility of spontaneous emission of kinks from the boundary due to small perturbations in the bulk. We verify this picture numerically by showing that the radiation emitted from the collision of an initial single kink eventually leads to a bulk populated by many kinks. Consequently, processes changing the boundary charges are practically unavoidable in this system. We speculate that the system has a universal final state consisting of a stack of kinks, their number being determined by the initial energy.
△ Less
Submitted 10 October, 2003;
originally announced October 2003.
-
Numerical simulation of vacuum particle production: applications to cosmology, dynamical Casimir effect and time-dependent non-homogeneous dielectrics
Authors:
Nuno D. Antunes
Abstract:
We develop a general numerical method aimed at studying particle production from vacuum states in a variety of settings. As a first example we look at particle production in a simple cosmological model. We apply the same approach to the dynamical Casimir effect, with special focus on the case of an oscillating mirror. We confirm previous estimates and obtain long-time production rates and partic…
▽ More
We develop a general numerical method aimed at studying particle production from vacuum states in a variety of settings. As a first example we look at particle production in a simple cosmological model. We apply the same approach to the dynamical Casimir effect, with special focus on the case of an oscillating mirror. We confirm previous estimates and obtain long-time production rates and particle spectra for both resonant and off-resonant frequencies. Finally, we simulate a system with space and time-dependent optical properties, analogous to a one-dimensional expanding dielectric bubble.
We obtain simple expressions for the dependence of the final particle number on the expansion velocity and final dielectric constant.
△ Less
Submitted 10 October, 2003;
originally announced October 2003.
-
On formation of domain wall lattices
Authors:
Nuno D. Antunes,
Levon Pogosian,
Tanmay Vachaspati
Abstract:
We study the formation of domain walls in a phase transition in which an S_5\times Z_2 symmetry is spontaneously broken to S_3\times S_2. In one compact spatial dimension we observe the formation of a stable domain wall lattice. In two spatial dimensions we find that the walls form a network with junctions, there being six walls to every junction. The network of domain walls evolves so that junc…
▽ More
We study the formation of domain walls in a phase transition in which an S_5\times Z_2 symmetry is spontaneously broken to S_3\times S_2. In one compact spatial dimension we observe the formation of a stable domain wall lattice. In two spatial dimensions we find that the walls form a network with junctions, there being six walls to every junction. The network of domain walls evolves so that junctions annihilate anti-junctions. The final state of the evolution depends on the relative dimensions of the simulation domain. In particular we never observe the formation of a stable lattice of domain walls for the case of a square domain but we do observe a lattice if one dimension is somewhat smaller than the other. During the evolution, the total wall length in the network decays with time as t^{-0.71}, as opposed to the usual t^{-1} scaling typical of regular Z_2 networks.
△ Less
Submitted 11 December, 2003; v1 submitted 29 July, 2003;
originally announced July 2003.
-
Kinky Brane Worlds
Authors:
Nuno D. Antunes,
Edmund J. Copeland,
Mark Hindmarsh,
Andre Lukas
Abstract:
We present a toy model for five-dimensional heterotic M-theory where bulk three-branes, originating in 11 dimensions from M five-branes, are modelled as kink solutions of a bulk scalar field theory. It is shown that the vacua of this defect model correspond to a class of topologically distinct M-theory compactifications. Topology change can then be analysed by studying the time evolution of the…
▽ More
We present a toy model for five-dimensional heterotic M-theory where bulk three-branes, originating in 11 dimensions from M five-branes, are modelled as kink solutions of a bulk scalar field theory. It is shown that the vacua of this defect model correspond to a class of topologically distinct M-theory compactifications. Topology change can then be analysed by studying the time evolution of the defect model. In the context of a four-dimensional effective theory, we study in detail the simplest such process, that is the time evolution of a kink and its collision with a boundary. We find that the kink is generically absorbed by the boundary thereby changing the boundary charge. This opens up the possibility of exploring the relation between more complicated defect configurations and the topology of brane-world models.
△ Less
Submitted 29 August, 2002;
originally announced August 2002.
-
The role of point-like topological excitations at criticality: from vortices to global monopoles
Authors:
Nuno D. Antunes,
Luis M. Bettencourt,
Martin Kunz
Abstract:
We determine the detailed thermodynamic behavior of vortices in the O(2) scalar model in 2D and of global monopoles in the O(3) model in 3D. We construct new numerical techniques, based on cluster decomposition algorithms, to analyze the point defect configurations. We find that these criteria produce results for the Kosterlitz-Thouless temperature in agreement with a topological transition betw…
▽ More
We determine the detailed thermodynamic behavior of vortices in the O(2) scalar model in 2D and of global monopoles in the O(3) model in 3D. We construct new numerical techniques, based on cluster decomposition algorithms, to analyze the point defect configurations. We find that these criteria produce results for the Kosterlitz-Thouless temperature in agreement with a topological transition between a polarizable insulator and a conductor, at which free topological charges appear in the system. For global monopoles we find no pair unbinding transition. Instead a transition to a dense state where pairs are no longer distinguishable occurs at T<Tc, without leading to long range disorder. We produce both extensive numerical evidence of this behavior as well as a semi-analytic treatment of the partition function for defects. General expectations for N=D>3 are drawn, based on the observed behavior.
△ Less
Submitted 10 January, 2002;
originally announced January 2002.
-
Quantum effects after decoherence in a quenched phase transition
Authors:
Nuno D. Antunes,
Fernando C. Lombardo,
Diana Monteoliva
Abstract:
We study a quantum mechanical toy model that mimics some features of a quenched phase transition. Both by virtue of a time-dependent Hamiltonian or by changing the temperature of the bath we are able to show that even after classicalization has been reached, the system may display quantum behaviour again. We explain this behaviour in terms of simple non-linear analysis and estimate relevant time…
▽ More
We study a quantum mechanical toy model that mimics some features of a quenched phase transition. Both by virtue of a time-dependent Hamiltonian or by changing the temperature of the bath we are able to show that even after classicalization has been reached, the system may display quantum behaviour again. We explain this behaviour in terms of simple non-linear analysis and estimate relevant time scales that match the results of numerical simulations of the master-equation. This opens new possibilities both in the study of quantum effects in non-equilibrium phase transitions and in general time-dependent problems where quantum effects may be relevant even after decoherence has been completed.
△ Less
Submitted 30 October, 2001; v1 submitted 9 January, 2001;
originally announced January 2001.
-
The Ginzburg regime and its effects on topological defect formation
Authors:
L. M. A. Bettencourt,
Nuno D. Antunes,
W. H. Zurek
Abstract:
The Ginzburg temperature has historically been proposed as the energy scale of formation of topological defects at a second order symmetry breaking phase transition. More recently alternative proposals which compute the time of formation of defects from the critical dynamics of the system, have been gaining both theoretical and experimental support. We investigate, using a canonical model for st…
▽ More
The Ginzburg temperature has historically been proposed as the energy scale of formation of topological defects at a second order symmetry breaking phase transition. More recently alternative proposals which compute the time of formation of defects from the critical dynamics of the system, have been gaining both theoretical and experimental support. We investigate, using a canonical model for string formation, how these two pictures compare. In particular we show that prolonged exposure of a critical field configuration to the Ginzburg regime results in no substantial suppression of the final density of defects formed. These results dismiss the recently proposed role of the Ginzburg regime in explaining the absence of topological defects in 4He pressure quench experiments.
△ Less
Submitted 19 January, 2000;
originally announced January 2000.
-
Predicting the critical density of topological defects in O(N) scalar field theories
Authors:
Nuno D. Antunes,
Luis M. A. Bettencourt,
Andrew Yates
Abstract:
O(N) symmetric $λφ^4$ field theories describe many critical phenomena in the laboratory and in the early Universe. Given N and $D\leq 3$, the dimension of space, these models exhibit topological defect classical solutions that in some cases fully determine their critical behavior. For N=2, D=3 it has been observed that the defect density is seemingly a universal quantity at T_c. We prove this co…
▽ More
O(N) symmetric $λφ^4$ field theories describe many critical phenomena in the laboratory and in the early Universe. Given N and $D\leq 3$, the dimension of space, these models exhibit topological defect classical solutions that in some cases fully determine their critical behavior. For N=2, D=3 it has been observed that the defect density is seemingly a universal quantity at T_c. We prove this conjecture and show how to predict its value based on the universal critical exponents of the field theory. Analogously, for general N and D we predict the universal critical densities of domain walls and monopoles, for which no detailed thermodynamic study exists. This procedure can also be inverted, producing an algorithm for generating typical defect networks at criticality, in contrast to the canonical procedure, which applies only in the unphysical limit of infinite temperature.
△ Less
Submitted 28 January, 1999; v1 submitted 22 January, 1999;
originally announced January 1999.
-
Vortex String Formation in a 3D U(1) Temperature Quench
Authors:
Nuno D. Antunes,
Luis M. A. Bettencourt,
Wojciech H. Zurek
Abstract:
We report the first large scale numerical study of the dynamics of the second order phase transition of a U(1) $λφ^4$ theory in three spatial dimensions. The transition is induced by a time-dependent temperature drop in the heat bath to which the fields are coupled. We present a detailed account of the dynamics of the fields and vortex string formation as a function of the quench rate. The resul…
▽ More
We report the first large scale numerical study of the dynamics of the second order phase transition of a U(1) $λφ^4$ theory in three spatial dimensions. The transition is induced by a time-dependent temperature drop in the heat bath to which the fields are coupled. We present a detailed account of the dynamics of the fields and vortex string formation as a function of the quench rate. The results are found in good agreement to the theory of defect formation proposed by Kibble and Zurek.
△ Less
Submitted 20 November, 1998;
originally announced November 1998.
-
The length distribution of vortex strings in U(1) equilibrium scalar field theory
Authors:
N. D. Antunes,
L. M. A. Bettencourt
Abstract:
We characterize the statistical length distribution of vortex strings by studying the non-perturbative thermodynamics of scalar U(1) field theory in 3D. All parameters characterizing the length distributions exhibit critical behavior at $T_c$ and we measure their associated critical exponents. Moreover we show that vortex strings are generally self-seeking at finite temperature and that there ex…
▽ More
We characterize the statistical length distribution of vortex strings by studying the non-perturbative thermodynamics of scalar U(1) field theory in 3D. All parameters characterizing the length distributions exhibit critical behavior at $T_c$ and we measure their associated critical exponents. Moreover we show that vortex strings are generally self-seeking at finite temperature and that there exists a natural separation between long strings and small loops based on their spatial correlation behavior.
△ Less
Submitted 3 July, 1998;
originally announced July 1998.
-
Numerical simulations of string networks in the Abelian-Higgs model
Authors:
Graham Vincent,
Nuno D. Antunes,
Mark Hindmarsh
Abstract:
We present the results of a field theory simulation of networks of strings in the Abelian Higgs model. Starting from a random initial configuration we show that the resulting vortex tangle approaches a self-similar regime in which the length density of lines of zeros of $φ$ reduces as $t^{-2}$. We demonstrate that the network loses energy directly into scalar and gauge radiation. These results s…
▽ More
We present the results of a field theory simulation of networks of strings in the Abelian Higgs model. Starting from a random initial configuration we show that the resulting vortex tangle approaches a self-similar regime in which the length density of lines of zeros of $φ$ reduces as $t^{-2}$. We demonstrate that the network loses energy directly into scalar and gauge radiation. These results support a recent claim that particle production, and not gravitational radiation, is the dominant energy loss mechanism for cosmic strings. This means that cosmic strings in Grand Unified Theories are severely constrained by high energy cosmic ray fluxes: either they are ruled out, or an implausibly small fraction of their energy ends up in quarks and leptons.
△ Less
Submitted 19 January, 1998; v1 submitted 21 August, 1997;
originally announced August 1997.
-
The Thermodynamics of Cosmic String densities in U(1) Scalar Field Theory
Authors:
Nuno D. Antunes,
Luis M. A. Bettencourt,
Mark Hindmarsh
Abstract:
We present a full characterization of the phase transition in U(1) scalar field theory and of the associated vortex string thermodynamics in 3D. We show that phase transitions in the string densities exist and measure their critical exponents, both for the long string and the short loops. Evidence for a natural separation between these two string populations is presented. In particular our resul…
▽ More
We present a full characterization of the phase transition in U(1) scalar field theory and of the associated vortex string thermodynamics in 3D. We show that phase transitions in the string densities exist and measure their critical exponents, both for the long string and the short loops. Evidence for a natural separation between these two string populations is presented. In particular our results strongly indicate that an infinite string population will only exist above the critical temperature. Canonical initial conditions for cosmic string evolution are show to correspond to the infinite temperature limit of the theory.
△ Less
Submitted 1 August, 1997;
originally announced August 1997.
-
Non-Equilibrium Dynamics of a Quench-Induced Phase Transition and Topological Defect Formation
Authors:
N. D. Antunes,
L. M. A. Bettencourt
Abstract:
We study the full out-of-thermal-equilibrium dynamics of a relativistic classical scalar field through a symmetry breaking phase transition. In these circumstances we determine the evolution of the ensemble averages of the correlation length and topological defect densities. This clarifies many aspects of the non-perturbative dynamics of fields in symmetry breaking phase transitions and allows u…
▽ More
We study the full out-of-thermal-equilibrium dynamics of a relativistic classical scalar field through a symmetry breaking phase transition. In these circumstances we determine the evolution of the ensemble averages of the correlation length and topological defect densities. This clarifies many aspects of the non-perturbative dynamics of fields in symmetry breaking phase transitions and allows us to comment on a quantitative basis on the canonical pictures for topological defect formation and evolution. We also compare these results to those obtained from the field evolution in the Hartree approximation or using the linearized theory. By doing so we conclude about the regimes of validity of these approximations.
△ Less
Submitted 10 May, 1996;
originally announced May 1996.