-
On Two Orderings of Lattice Paths
Authors:
PJ Apruzzese,
Kevin Cong
Abstract:
The \emph{Markov numbers} are positive integers appearing as solutions to the Diophantine equation $x^2 + y^2 + z^2 = 3xyz$. These numbers are very well-studied and have many combinatorial properties, as well as being the source of the long-standing unicity conjecture. In 2018, Çanakçı and Schiffler showed that the Markov number $m_{\frac{a}{b}}$ is the number of perfect matchings of a certain sna…
▽ More
The \emph{Markov numbers} are positive integers appearing as solutions to the Diophantine equation $x^2 + y^2 + z^2 = 3xyz$. These numbers are very well-studied and have many combinatorial properties, as well as being the source of the long-standing unicity conjecture. In 2018, Çanakçı and Schiffler showed that the Markov number $m_{\frac{a}{b}}$ is the number of perfect matchings of a certain snake graph corresponding to the Christoffel path from $(0,0)$ to $(a,b)$. Based on this correspondence, Schiffler in 2023 introduced two orderings on lattice paths. For any path $ω$, associate a snake graph $\mathcal{G}(ω)$ and a continued fraction $g(ω)$. The ordering $<_M$ is given by the number of perfect matchings on $\mathcal{G}(ω)$, and the ordering $<_L$ is given by the Lagrange number of $g(ω)$.
In this work, we settle two conjectures of Schiffler. First, we show that the path $ω(a,b) = RR\cdots R UU \cdots U$ is the unique maximum over all lattice paths from $(0,0)$ to $(a,b)$ with respect to both orderings $<_M$ and $<_L$. We then use this result to prove that $\sup L(ω)$ over all lattice paths is exactly $1+\sqrt5$.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
On Integer Sets Excluding Permutation Pattern Waves
Authors:
Kevin Cong
Abstract:
We study Ramsey-type problems on sets avoiding sequences whose consecutive differences have a fixed relative order. For a given permutation $π\in S_k$, a $π$-wave is a sequence $x_1 < \cdots < x_{k+1}$ such that $x_{i+1} - x_i > x_{j+1} - x_j$ if and only if $π(i) > π(j)$. A subset of $[n] = \{1,\ldots,n\}$ is $π$-wave-free if it does not contain any $π$-wave. Our first main result shows that the…
▽ More
We study Ramsey-type problems on sets avoiding sequences whose consecutive differences have a fixed relative order. For a given permutation $π\in S_k$, a $π$-wave is a sequence $x_1 < \cdots < x_{k+1}$ such that $x_{i+1} - x_i > x_{j+1} - x_j$ if and only if $π(i) > π(j)$. A subset of $[n] = \{1,\ldots,n\}$ is $π$-wave-free if it does not contain any $π$-wave. Our first main result shows that the size of the largest $π$-wave-free subset of $[n]$ is $O\left((\log n)^{k-1}\right)$. We then classify all permutations for which this bound is tight. In the cases where it is not tight, we prove stronger polylogarithmic upper bounds. We then apply these bounds to a closely related coloring problem studied by Landman and Robertson.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Crystal Structure of Silver Pentazolates AgN5 and AgN6
Authors:
Ashley S. Williams,
Kien Nguyen Cong,
Joseph M. Gonzalez,
Ivan I. Oleynik
Abstract:
Silver pentazolate, a high energy density compound containing cyclo-N5- anion, has recently been synthesized at ambient conditions. However, due to high sensitivity to irradiation, its crystal structure has not been determined. In this work, silver-nitrogen crystalline compounds at ambient conditions and high pressures, up to 100 GPa, are predicted and characterized by performing first-principles…
▽ More
Silver pentazolate, a high energy density compound containing cyclo-N5- anion, has recently been synthesized at ambient conditions. However, due to high sensitivity to irradiation, its crystal structure has not been determined. In this work, silver-nitrogen crystalline compounds at ambient conditions and high pressures, up to 100 GPa, are predicted and characterized by performing first-principles evolutionary crystal structure searching with variable stoichiometry. It is found that newly discovered AgN5 and AgN6 are the only thermodynamically stable silver-nitrogen compounds at pressures between 42 and 80 GPa. In contrast to AgN5, pentazolate AgN6 compound contains N2 diatomic molecules in addition to cyclo-N5-. These AgN5 and AgN6 crystals are metastable at ambient conditions with positive formation enthalpies of 54.95 kJ/mol and 46.24 kJ/mol, respectively. The underlying cause of the stability of cyclo-N5- silver pentazolates is the enhanced aromaticity enabled by the charge transfer from silver atoms to nitrogen rings. To aid in experimental identification of these materials, calculated Raman spectra are reported at ambient pressure: the frequencies of N5- vibrational modes of AgN5 are in good agreement with those measured in experiment.
△ Less
Submitted 1 November, 2021;
originally announced November 2021.
-
Correlating Structural, Electronic, and Magnetic Properties of Epitaxial VSe2 Thin Films
Authors:
Guannan Chen,
Sean T. Howard,
Aniceto B. Maghirang III,
Kien Nguyen Cong,
Kehan Cai,
Somesh C. Ganguli,
Waclaw Sweich,
Emilia Morosan,
Ivan I. Oleynik,
Feng-Chuan Chuang,
Hsin Lin,
Vidya Madhavan
Abstract:
The electronic and magnetic properties of transition metal dichalcogenides are known to be extremely sensitive to their structure. In this paper we study the effect of structure on the electronic and magnetic properties of mono- and bilayer $VSe_2$ films grown using molecular beam epitaxy. $VSe_2$ has recently attracted much attention due to reports of emergent ferromagnetism in the 2D limit. To u…
▽ More
The electronic and magnetic properties of transition metal dichalcogenides are known to be extremely sensitive to their structure. In this paper we study the effect of structure on the electronic and magnetic properties of mono- and bilayer $VSe_2$ films grown using molecular beam epitaxy. $VSe_2$ has recently attracted much attention due to reports of emergent ferromagnetism in the 2D limit. To understand this important compound, high quality 1T and distorted 1T films were grown at temperatures of 200 $^\text{o}$C and 450 $^\text{o}$C respectively and studied using 4K Scanning Tunneling Microscopy/Spectroscopy. The measured density of states and the charge density wave (CDW) patterns were compared to band structure and phonon dispersion calculations. Films in the 1T phase reveal different CDW patterns in the first layer compared to the second. Interestingly, we find the second layer of the 1T-film shows a CDW pattern with 4a $\times$ 4a periodicity which is the 2D version of the bulk CDW observed in this compound. Our phonon dispersion calculations confirm the presence of a soft phonon at the correct wavevector that leads to this CDW. In contrast, the first layer of distorted 1T phase films shows a strong stripe feature with varying periodicities, while the second layer displays no observable CDW pattern. Finally, we find that the monolayer 1T $VSe_2$ film is weakly ferromagnetic, with ~ $3.5 μ_B$ per unit similar to previous reports.
△ Less
Submitted 2 January, 2020; v1 submitted 29 December, 2019;
originally announced December 2019.
-
Hardware/Software Co-monitoring
Authors:
Li Lei,
Kai Cong,
Zhenkun Yang,
Bo Chen,
Fei Xie
Abstract:
Hardware/Software (HW/SW) interfaces, mostly implemented as devices and device drivers, are pervasive in various computer systems. Nowadays HW/SW interfaces typically undergo intensive testing and validation before release, but they are still unreliable and insecure when deployed together with computer systems to end users. Escaped logic bugs, hardware transient failures, and malicious exploits ar…
▽ More
Hardware/Software (HW/SW) interfaces, mostly implemented as devices and device drivers, are pervasive in various computer systems. Nowadays HW/SW interfaces typically undergo intensive testing and validation before release, but they are still unreliable and insecure when deployed together with computer systems to end users. Escaped logic bugs, hardware transient failures, and malicious exploits are prevalent in HW/SW interactions, making the entire system vulnerable and unstable.
We present HW/SW co-monitoring, a runtime co-verification approach to detecting failures and malicious exploits in device/driver interactions. Our approach utilizes a formal device model (FDM), a transaction-level model derived from the device specification, to shadow the real device execution. Based on the co-execution of the device and FDM, HW/SW co-monitoring carries out two-tier runtime checking: (1) device checking checks if the device behaviors conform to the FDM behaviors; (2) property checking detects invalid driver commands issued to the device by verifying system properties against driver/device interactions. We have applied HW/SW co-monitoring to five widely-used devices and their Linux drivers, discovering 9 real bugs and vulnerabilities while introducing modest runtime overhead. The results demonstrate the major potential of HW/SW co-monitoring in improving system reliability and security.
△ Less
Submitted 9 May, 2019;
originally announced May 2019.
-
A Scale-out Blockchain for Value Transfer with Spontaneous Sharding
Authors:
Zhijie Ren,
Kelong Cong,
Taico V. Aerts,
Bart A. P. de Jonge,
Alejandro F. Morais,
Zekeriya Erkin
Abstract:
Bitcoin, as well as many of its successors, require the whole transaction record to be reliably acquired by all nodes to prevent double-spending. Recently, many blockchains have been proposed to achieve scale-out throughput by letting nodes only acquire a fraction of the whole transaction set. However, these schemes, e.g., sharding and off-chain techniques, suffer from a degradation in decentraliz…
▽ More
Bitcoin, as well as many of its successors, require the whole transaction record to be reliably acquired by all nodes to prevent double-spending. Recently, many blockchains have been proposed to achieve scale-out throughput by letting nodes only acquire a fraction of the whole transaction set. However, these schemes, e.g., sharding and off-chain techniques, suffer from a degradation in decentralization or the capacity of fault tolerance.
In this paper, we show that the complete set of transactions is not a necessity for the prevention of double-spending if the properties of value transfers is fully explored. In other words, we show that a value-transfer ledger like Bitcoin has the potential to scale-out by its nature without sacrificing security or decentralization. Firstly, we give a formal definition for the value-transfer ledger and its distinct features from a generic database. Then, we introduce an off-chain based scheme with a shared main chain for consensus and an individual chain for each node for recording transactions. A locally executable validation scheme is proposed with uncompromising validity and consistency. A beneficial consequence of our design is that nodes will spontaneously try to reduce their transmission cost by only providing the transactions needed to show that their transactions are double-spending-proof. As a result, the network is sharded as each node only acquires part of the transaction record and a scale-out throughput could be achieved, which we call "spontaneous sharding".
△ Less
Submitted 17 May, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries
Authors:
Gorka Irazoqui,
Kai Cong,
Xiaofei Guo,
Hareesh Khattri,
Arun Kanuparthi,
Thomas Eisenbarth,
Berk Sunar
Abstract:
This work presents a new tool to verify the correctness of cryptographic implementations with respect to cache attacks. Our methodology discovers vulnerabilities that are hard to find with other techniques, observed as exploitable leakage. The methodology works by identifying secret dependent memory and introducing forced evictions inside potentially vulnerable code to obtain cache traces that are…
▽ More
This work presents a new tool to verify the correctness of cryptographic implementations with respect to cache attacks. Our methodology discovers vulnerabilities that are hard to find with other techniques, observed as exploitable leakage. The methodology works by identifying secret dependent memory and introducing forced evictions inside potentially vulnerable code to obtain cache traces that are analyzed using Mutual Information. If dependence is observed, the cryptographic implementation is classified as to leak information.
We demonstrate the viability of our technique in the design of the three main cryptographic primitives, i.e., AES, RSA and ECC, in eight popular up to date cryptographic libraries, including OpenSSL, Libgcrypt, Intel IPP and NSS. Our results show that cryptographic code designers are far away from incorporating the appropriate countermeasures to avoid cache leakages, as we found that 50% of the default implementations analyzed leaked information that lead to key extraction. We responsibly notified the designers of all the leakages found and suggested patches to solve these vulnerabilities.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
Implicit Consensus: Blockchain with Unbounded Throughput
Authors:
Zhijie Ren,
Kelong Cong,
Johan Pouwelse,
Zekeriya Erkin
Abstract:
Recently, the blockchain technique was put in the spotlight as it introduced a systematic approach for multiple parties to reach consensus without needing trust. However, the application of this technique in practice is severely restricted due to its limitations in throughput. In this paper, we propose a novel consensus model, namely the implicit consensus, with a distinctive blockchain-based dist…
▽ More
Recently, the blockchain technique was put in the spotlight as it introduced a systematic approach for multiple parties to reach consensus without needing trust. However, the application of this technique in practice is severely restricted due to its limitations in throughput. In this paper, we propose a novel consensus model, namely the implicit consensus, with a distinctive blockchain-based distributed ledger in which each node holds its individual blockchain. In our system, the consensus is not on the transactions, but on a special type of blocks called Check Points that are used to validate individual transactions. Our system exploits the ideas of self-interest and spontaneous sharding and achieves unbounded throughput with the transaction reliability that equivalent to traditional Byzantine fault tolerance schemes.
△ Less
Submitted 14 July, 2017; v1 submitted 31 May, 2017;
originally announced May 2017.
-
Dicke Superradiance in Solids
Authors:
Kankan Cong,
Qi Zhang,
Yongrui Wang,
G. Timothy Noe II,
Alexey Belyanin,
Junichiro Kono
Abstract:
Recent advances in optical studies of condensed matter have led to the emergence of phenomena that have conventionally been studied in the realm of quantum optics. These studies have not only deepened our understanding of light-matter interactions but also introduced aspects of many-body correlations inherent in optical processes in condensed matter systems. This article is concerned with superrad…
▽ More
Recent advances in optical studies of condensed matter have led to the emergence of phenomena that have conventionally been studied in the realm of quantum optics. These studies have not only deepened our understanding of light-matter interactions but also introduced aspects of many-body correlations inherent in optical processes in condensed matter systems. This article is concerned with superradiance (SR), a profound quantum optical process predicted by Dicke in 1954. The basic concept of SR applies to a general $N$-body system where constituent oscillating dipoles couple together through interaction with a common light field and accelerate the radiative decay of the system. In the most fascinating manifestation of SR, known as superfluorescence (SF), an incoherently prepared system of $N$ inverted atoms spontaneously develops macroscopic coherence from vacuum fluctuations and produces a delayed pulse of coherent light whose peak intensity $\propto N^2$. Such SF pulses have been observed in atomic and molecular gases, and their intriguing quantum nature has been unambiguously demonstrated. Here, we focus on the rapidly develo** field of research on SR in solids, where not only photon-mediated coupling but also strong Coulomb interactions and ultrafast scattering exist. We describe SR and SF in molecular centers in solids, molecular aggregates and crystals, quantum dots, and quantum wells. In particular, we will summarize a series of studies we have recently performed on quantum wells in strong magnetic fields. These studies show that cooperative effects in solid-state systems are not merely small corrections that require exotic conditions to be observed; rather, they can dominate the nonequilibrium dynamics and light emission processes of the entire system of interacting electrons.
△ Less
Submitted 29 May, 2016; v1 submitted 13 February, 2016;
originally announced February 2016.
-
OpenRISC System-on-Chip Design Emulation
Authors:
Kai Cong,
Li Lei,
Zhenkun Yang,
Fei Xie
Abstract:
Recently the hardware emulation technique has emerged as a promising approach to accelerating hardware verification/debugging process. To fully evaluate the powerfulness of the emulation approach and demonstrate its potential impact, we propose to emulate a system-on-chip (SoC) design using Mentor Graphics Veloce emulation platform. This article presents our project setup and the results we have a…
▽ More
Recently the hardware emulation technique has emerged as a promising approach to accelerating hardware verification/debugging process. To fully evaluate the powerfulness of the emulation approach and demonstrate its potential impact, we propose to emulate a system-on-chip (SoC) design using Mentor Graphics Veloce emulation platform. This article presents our project setup and the results we have achieved. The results are encouraging. ORPSoC emulation with Veloce has more than ten times faster than hardware simulation. Our experimental results demonstrate that Mentor Graphics Veloce has major advantages in emulation, verification, and debugging of complicated real hardware designs, especially in the context of SoC complexity. Through our three major tasks, we will demonstrate that (1) Veloce can successfully emulate large-scale SoC designs; (2) it has much better performance comparing to the state-of-the-art simulation tools; (3) it can significantly accelerate the process of hardware verification and debugging while maintaining full signal visibility.
△ Less
Submitted 9 February, 2016;
originally announced February 2016.
-
Limiting Lamport Exposure to Distant Failures in Globally-Managed Distributed Systems
Authors:
Cristina Băsescu,
Georgia Fragkouli,
Enis Ceyhun Alp,
Michael F. Nowlan,
Jose M. Faleiro,
Gaylor Bosson,
Kelong Cong,
Pierluca Borsò-Tan,
Vero Estrada-Galiñanes,
Bryan Ford
Abstract:
Globalized computing infrastructures offer the convenience and elasticity of globally managed objects and services, but lack the resilience to distant failures that localized infrastructures such as private clouds provide. Providing both global management and resilience to distant failures, however, poses a fundamental problem for configuration services: How to discover a possibly migratory, stron…
▽ More
Globalized computing infrastructures offer the convenience and elasticity of globally managed objects and services, but lack the resilience to distant failures that localized infrastructures such as private clouds provide. Providing both global management and resilience to distant failures, however, poses a fundamental problem for configuration services: How to discover a possibly migratory, strongly-consistent service/object in a globalized infrastructure without dependencies on globalized state? Limix is the first metadata configuration service that addresses this problem. With Limix, global strongly-consistent data-plane services and objects are insulated from remote gray failures by ensuring that the definitive, strongly-consistent metadata for any object is always confined to the same region as the object itself. Limix guarantees availability bounds: any user can continue accessing any strongly consistent object that matters to the user located at distance $Δ$ away, insulated from failures outside a small multiple of $Δ$. We built a Limix metadata service based on CockroachDB. Our experiments on Internet-like networks and on AWS, using realistic trace-driven workloads, show that Limix enables global management and significantly improves availability over the state-of-the-art.
△ Less
Submitted 15 July, 2022; v1 submitted 3 May, 2014;
originally announced May 2014.