-
Conservation laws for a generalized seventh order KdV equation
Authors:
María de los Santos Bruzón,
Almudena del Pilar Márquez,
Tamara María Garrido,
Elena Recio,
Rafael de la Rosa
Abstract:
In this paper, by applying the multiplier method we obtain a complete classification of low-order local conservation laws for a generalized seventh-order KdV equation depending on seven arbitrary nonzero parameters. We apply the Lie method in order to classify all point symmetries admitted by the equation in terms of the arbitrary parameters. We find that there are no special cases of the paramete…
▽ More
In this paper, by applying the multiplier method we obtain a complete classification of low-order local conservation laws for a generalized seventh-order KdV equation depending on seven arbitrary nonzero parameters. We apply the Lie method in order to classify all point symmetries admitted by the equation in terms of the arbitrary parameters. We find that there are no special cases of the parameters for which the equation admits extra symmetries, other than those that can be found by inspection (scaling symmetry and space and time translation symmetries). We consider the reduced ordinary differential equations and we determined all integrating factors of the reduced equation from the combined $x$- and $t$- translation symmetries. Finally, we observe that all integrating factors arise by reduction of the low-order multipliers of the generalized seventh-order KdV equation.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Lie symmetries, conservation laws and exact solutions of a generalized quasilinear KdV equation with degenerate dispersion
Authors:
María de los Santos Bruzón,
Elena Recio,
Tamara María Garrido,
Rafael de la Rosa
Abstract:
We provide a complete classification of point symmetries and low-order local conservation laws of the generalized quasilinear KdV equation in terms of the arbitrary function. The corresponding interpretation of symmetry transformation groups are given. In addition, a physical description of the conserved quantities is included. Finally, few travelling wave solutions have been obtained.
We provide a complete classification of point symmetries and low-order local conservation laws of the generalized quasilinear KdV equation in terms of the arbitrary function. The corresponding interpretation of symmetry transformation groups are given. In addition, a physical description of the conserved quantities is included. Finally, few travelling wave solutions have been obtained.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
SoK: The Gap Between Data Rights Ideals and Reality
Authors:
Yu** Kwon,
Ella Corren,
Gonzalo Munilla Garrido,
Chris Hoofnagle,
Dawn Song
Abstract:
As information economies burgeon, they unlock innovation and economic wealth while posing novel threats to civil liberties and altering power dynamics between individuals, companies, and governments. Legislatures have reacted with privacy laws designed to empower individuals over their data. These laws typically create rights for "data subjects" (individuals) to make requests of data collectors (c…
▽ More
As information economies burgeon, they unlock innovation and economic wealth while posing novel threats to civil liberties and altering power dynamics between individuals, companies, and governments. Legislatures have reacted with privacy laws designed to empower individuals over their data. These laws typically create rights for "data subjects" (individuals) to make requests of data collectors (companies and governments). The European Union General Data Protection Regulation (GDPR) exemplifies this, granting extensive data rights to data subjects, a model embraced globally. However, the question remains: do these rights-based privacy laws effectively empower individuals over their data? This paper scrutinizes these approaches by reviewing 201 interdisciplinary empirical studies, news articles, and blog posts. We pinpoint 15 key questions concerning the efficacy of rights allocations. The literature often presents conflicting results regarding the effectiveness of rights-based frameworks, but it generally emphasizes their limitations. We offer recommendations to policymakers and Computer Science (CS) groups committed to these frameworks, and suggest alternative privacy regulation approaches.
△ Less
Submitted 3 December, 2023;
originally announced December 2023.
-
Impact of family-friendly HRM policies in organizational performance
Authors:
Jose Maria Biedma Ferrer,
Jose Aurelio Medina Garrido
Abstract:
Purpose: The objective of this work is to analyze the impact of implementing work-family reconciliation measures on workers' perception and how this can influence their behavior, especially in their organizational performance. Design/methodology/approach: A literature review and the main research works related to the work-family conflict and reconciliation measures to overcome this conflict have b…
▽ More
Purpose: The objective of this work is to analyze the impact of implementing work-family reconciliation measures on workers' perception and how this can influence their behavior, especially in their organizational performance. Design/methodology/approach: A literature review and the main research works related to the work-family conflict and reconciliation measures to overcome this conflict have been conducted to draw conclusions about their impact on worker performance. Contributions and results: This work proposes an integrative model that shows the existing relationships between work-family reconciliation and perceptual variables on one side, and those related to the worker's organizational behavior on the other. Perceptual variables such as stress, job satisfaction, and motivation are analyzed. Regarding variables related to the worker's organizational behavior, absenteeism, turnover, and performance are analyzed. The results of the analysis provide evidence that the existence of work-family reconciliation is perceived favorably by workers and improves their organizational behavior, especially their performance. Originality/Added value: This study integrates different perspectives related to the conflict and work-family reconciliation, from an eclectic vision. Thus, it contributes to existing literature with a more comprehensive approach to the investigated topic. Additionally, the proposed integrative model allows for useful conclusions for management from both a purely human resources management perspective and organizational productivity improvement. Keywords: Work-family conflict, work-family reconciliation, perceptual variables, organizational performance, human resources managements
△ Less
Submitted 14 December, 2023; v1 submitted 24 November, 2023;
originally announced November 2023.
-
SoK: Privacy-Preserving Data Synthesis
Authors:
Yuzheng Hu,
Fan Wu,
Qinbin Li,
Yunhui Long,
Gonzalo Munilla Garrido,
Chang Ge,
Bolin Ding,
David Forsyth,
Bo Li,
Dawn Song
Abstract:
As the prevalence of data analysis grows, safeguarding data privacy has become a paramount concern. Consequently, there has been an upsurge in the development of mechanisms aimed at privacy-preserving data analyses. However, these approaches are task-specific; designing algorithms for new tasks is a cumbersome process. As an alternative, one can create synthetic data that is (ideally) devoid of pr…
▽ More
As the prevalence of data analysis grows, safeguarding data privacy has become a paramount concern. Consequently, there has been an upsurge in the development of mechanisms aimed at privacy-preserving data analyses. However, these approaches are task-specific; designing algorithms for new tasks is a cumbersome process. As an alternative, one can create synthetic data that is (ideally) devoid of private information. This paper focuses on privacy-preserving data synthesis (PPDS) by providing a comprehensive overview, analysis, and discussion of the field. Specifically, we put forth a master recipe that unifies two prominent strands of research in PPDS: statistical methods and deep learning (DL)-based methods. Under the master recipe, we further dissect the statistical methods into choices of modeling and representation, and investigate the DL-based methods by different generative modeling principles. To consolidate our findings, we provide comprehensive reference tables, distill key takeaways, and identify open problems in the existing literature. In doing so, we aim to answer the following questions: What are the design principles behind different PPDS methods? How can we categorize these methods, and what are the advantages and disadvantages associated with each category? Can we provide guidelines for method selection in different real-world scenarios? We proceed to benchmark several prominent DL-based methods on the task of private image synthesis and conclude that DP-MERF is an all-purpose approach. Finally, upon systematizing the work over the past decade, we identify future directions and call for actions from researchers.
△ Less
Submitted 5 August, 2023; v1 submitted 5 July, 2023;
originally announced July 2023.
-
A ring-like accretion structure in M87 connecting its black hole and jet
Authors:
Ru-Sen Lu,
Keiichi Asada,
Thomas P. Krichbaum,
Jongho Park,
Fumie Tazaki,
Hung-Yi Pu,
Masanori Nakamura,
Andrei Lobanov,
Kazuhiro Hada,
Kazunori Akiyama,
Jae-Young Kim,
Ivan Marti-Vidal,
José L. Gómez,
Tomohisa Kawashima,
Feng Yuan,
Eduardo Ros,
Walter Alef,
Silke Britzen,
Michael Bremer,
Avery E. Broderick,
Akihiro Doi,
Gabriele Giovannini,
Marcello Giroletti,
Paul T. P. Ho,
Mareki Honma
, et al. (96 additional authors not shown)
Abstract:
The nearby radio galaxy M87 is a prime target for studying black hole accretion and jet formation^{1,2}. Event Horizon Telescope observations of M87 in 2017, at a wavelength of 1.3 mm, revealed a ring-like structure, which was interpreted as gravitationally lensed emission around a central black hole^3. Here we report images of M87 obtained in 2018, at a wavelength of 3.5 mm, showing that the comp…
▽ More
The nearby radio galaxy M87 is a prime target for studying black hole accretion and jet formation^{1,2}. Event Horizon Telescope observations of M87 in 2017, at a wavelength of 1.3 mm, revealed a ring-like structure, which was interpreted as gravitationally lensed emission around a central black hole^3. Here we report images of M87 obtained in 2018, at a wavelength of 3.5 mm, showing that the compact radio core is spatially resolved. High-resolution imaging shows a ring-like structure of 8.4_{-1.1}^{+0.5} Schwarzschild radii in diameter, approximately 50% larger than that seen at 1.3 mm. The outer edge at 3.5 mm is also larger than that at 1.3 mm. This larger and thicker ring indicates a substantial contribution from the accretion flow with absorption effects in addition to the gravitationally lensed ring-like emission. The images show that the edge-brightened jet connects to the accretion flow of the black hole. Close to the black hole, the emission profile of the jet-launching region is wider than the expected profile of a black-hole-driven jet, suggesting the possible presence of a wind associated with the accretion flow.
△ Less
Submitted 25 April, 2023;
originally announced April 2023.
-
SoK: Data Privacy in Virtual Reality
Authors:
Gonzalo Munilla Garrido,
Vivek Nair,
Dawn Song
Abstract:
The adoption of virtual reality (VR) technologies has rapidly gained momentum in recent years as companies around the world begin to position the so-called "metaverse" as the next major medium for accessing and interacting with the internet. While consumers have become accustomed to a degree of data harvesting on the web, the real-time nature of data sharing in the metaverse indicates that privacy…
▽ More
The adoption of virtual reality (VR) technologies has rapidly gained momentum in recent years as companies around the world begin to position the so-called "metaverse" as the next major medium for accessing and interacting with the internet. While consumers have become accustomed to a degree of data harvesting on the web, the real-time nature of data sharing in the metaverse indicates that privacy concerns are likely to be even more prevalent in the new "Web 3.0." Research into VR privacy has demonstrated that a plethora of sensitive personal information is observable by various would-be adversaries from just a few minutes of telemetry data. On the other hand, we have yet to see VR parallels for many privacy-preserving tools aimed at mitigating threats on conventional platforms. This paper aims to systematize knowledge on the landscape of VR privacy threats and countermeasures by proposing a comprehensive taxonomy of data attributes, protections, and adversaries based on the study of 68 collected publications. We complement our qualitative discussion with a statistical analysis of the risk associated with various data sources inherent to VR in consideration of the known attacks and defenses. By focusing on highlighting the clear outstanding opportunities, we hope to motivate and guide further research into this increasingly important field.
△ Less
Submitted 18 May, 2023; v1 submitted 14 January, 2023;
originally announced January 2023.
-
Exact solutions and conservation lawsof a one-dimensional PDE model for a blood vessel
Authors:
Stephen C. Anco,
Almudena P. Marquez,
Tamara M. Garrido,
Maria L. Gandarias
Abstract:
Two aspects of a widely used 1D model of blood flow in a single blood vessel are studied by symmetry analysis, where the variables in the model are the blood pressure and the cross-section area of the blood vessel. As one main result, all travelling wave solutions are found by explicit quadrature of the model. The features, behaviour, and boundary conditions for these solutions are discussed. Solu…
▽ More
Two aspects of a widely used 1D model of blood flow in a single blood vessel are studied by symmetry analysis, where the variables in the model are the blood pressure and the cross-section area of the blood vessel. As one main result, all travelling wave solutions are found by explicit quadrature of the model. The features, behaviour, and boundary conditions for these solutions are discussed. Solutions of interest include shock waves and sharp wave-front pulses for the pressure and the blood flow. Another main result is that three new conservation laws are derived for inviscid flows. Compared to the well-known conservation laws in 1D compressible fluid flow, they describe generalized momentum and generalized axial and volumetric energies. For viscous flows, these conservation laws get replaced by conservation balance equations which contain a dissipative term proportional to the friction coefficient in the model.
△ Less
Submitted 16 February, 2023; v1 submitted 7 November, 2022;
originally announced December 2022.
-
Symmetry analysis and hidden variational structure of Westervelt's equation in nonlinear acoustics
Authors:
Stephen C. Anco,
Almudena P. Marquez,
Tamara M. Garrido,
Maria L. Gandarias
Abstract:
Westervelt's equation is a nonlinear wave equation that is widely used to model the propagation of sound waves in a compressible medium, with one important application being ultra-sound in human tissue. Two fundamental aspects of this equation -- symmetries and conservation laws -- are studied in the present work by modern methods. Numerous results are obtained: new conserved integrals; potential…
▽ More
Westervelt's equation is a nonlinear wave equation that is widely used to model the propagation of sound waves in a compressible medium, with one important application being ultra-sound in human tissue. Two fundamental aspects of this equation -- symmetries and conservation laws -- are studied in the present work by modern methods. Numerous results are obtained: new conserved integrals; potential systems yielding hidden symmetries and nonlocal conservation laws; map** of Westervelt's equation in the undamped case into a linear wave equation; exact solutions arising from the map**; hidden variational structures, including a Lagrangian and a Hamiltonian; a recursion operator and a Noether operator; contact symmetries; higher-order symmetries and conservation laws.
△ Less
Submitted 8 June, 2023; v1 submitted 13 December, 2022;
originally announced December 2022.
-
Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
Authors:
Gonzalo Munilla Garrido,
Xiaoyuan Liu,
Florian Matthes,
Dawn Song
Abstract:
Since its introduction in 2006, differential privacy has emerged as a predominant statistical tool for quantifying data privacy in academic works. Yet despite the plethora of research and open-source utilities that have accompanied its rise, with limited exceptions, differential privacy has failed to achieve widespread adoption in the enterprise domain. Our study aims to shed light on the fundamen…
▽ More
Since its introduction in 2006, differential privacy has emerged as a predominant statistical tool for quantifying data privacy in academic works. Yet despite the plethora of research and open-source utilities that have accompanied its rise, with limited exceptions, differential privacy has failed to achieve widespread adoption in the enterprise domain. Our study aims to shed light on the fundamental causes underlying this academic-industrial utilization gap through detailed interviews of 24 privacy practitioners across 9 major companies. We analyze the results of our survey to provide key findings and suggestions for companies striving to improve privacy protection in their data workflows and highlight the necessary and missing requirements of existing differential privacy tools, with the goal of guiding researchers working towards the broader adoption of differential privacy. Our findings indicate that analysts suffer from lengthy bureaucratic processes for requesting access to sensitive data, yet once granted, only scarcely-enforced privacy policies stand between rogue practitioners and misuse of private information. We thus argue that differential privacy can significantly improve the processes of requesting and conducting data exploration across silos, and conclude that with a few of the improvements suggested herein, the practical use of differential privacy across the enterprise is within striking distance.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Exploring privacy-enhancing technologies in the automotive value chain
Authors:
Gonzalo Munilla Garrido,
Kaja Schmidt,
Christopher Harth-Kitzerow,
Johannes Klepsch,
Andre Luckow,
Florian Matthes
Abstract:
Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and th…
▽ More
Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements. However, applying PETs in organizations requires a precise understanding of use cases, technologies, and limitations. This paper investigates several industrial use cases, their characteristics, and the potential applicability of PETs to these. We conduct expert interviews to identify and classify uses cases, a gray literature review of relevant open-source PET tools, and discuss how the use case characteristics can be addressed using PETs' capabilities. While we focus mainly on automotive use cases, the results also apply to other use case domains.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Conservation laws and variational structure of damped nonlinear wave equations
Authors:
Stephen C. Anco,
Almudena P. Marquez,
Tamara M. Garrido,
Maria L. Gandarias
Abstract:
All low-order conservation laws are found for a general class of nonlinear wave equations in one dimension with linear dam** which is allowed to be time-dependent. Such equations arise in numerous physical applications and have attracted much attention in analysis. The conservation laws describe generalized momentum and boost momentum, conformal momentum, generalized energy, dilational energy, a…
▽ More
All low-order conservation laws are found for a general class of nonlinear wave equations in one dimension with linear dam** which is allowed to be time-dependent. Such equations arise in numerous physical applications and have attracted much attention in analysis. The conservation laws describe generalized momentum and boost momentum, conformal momentum, generalized energy, dilational energy, and light-cone energies. Both the conformal momentum and dilational energy have no counterparts for nonlinear undamped wave equations in one dimension. All of the conservation laws are obtainable through Noether's theorem, which is applicable because the dam** term can be transformed into a time-dependent self-interaction term by a change of dependent variable. For several of the conservation laws, the corresponding variational symmetries have a novel form which is different than any of the well known variation symmetries admitted by nonlinear undamped wave equations in one dimension.
△ Less
Submitted 26 January, 2023; v1 submitted 16 August, 2022;
originally announced August 2022.
-
Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VR
Authors:
Vivek Nair,
Gonzalo Munilla Garrido,
Dawn Song
Abstract:
Virtual reality (VR) telepresence applications and the so-called "metaverse" promise to be the next major medium of human-computer interaction. However, with recent studies demonstrating the ease at which VR users can be profiled and deanonymized, metaverse platforms carry many of the privacy risks of the conventional internet (and more) while at present offering few of the defensive utilities tha…
▽ More
Virtual reality (VR) telepresence applications and the so-called "metaverse" promise to be the next major medium of human-computer interaction. However, with recent studies demonstrating the ease at which VR users can be profiled and deanonymized, metaverse platforms carry many of the privacy risks of the conventional internet (and more) while at present offering few of the defensive utilities that users are accustomed to having access to. To remedy this, we present the first known method of implementing an "incognito mode" for VR. Our technique leverages local differential privacy to quantifiably obscure sensitive user data attributes, with a focus on intelligently adding noise when and where it is needed most to maximize privacy while minimizing usability impact. Our system is capable of flexibly adapting to the unique needs of each VR application to further optimize this trade-off. We implement our solution as a universal Unity (C#) plugin that we then evaluate using several popular VR applications. Upon faithfully replicating the most well-known VR privacy attack studies, we show a significant degradation of attacker capabilities when using our solution.
△ Less
Submitted 23 October, 2023; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Exploring the Privacy Risks of Adversarial VR Game Design
Authors:
Vivek Nair,
Gonzalo Munilla Garrido,
Dawn Song,
James F. O'Brien
Abstract:
Fifty study participants playtested an innocent-looking "escape room" game in virtual reality (VR). Within just a few minutes, an adversarial program had accurately inferred over 25 of their personal data attributes, from anthropometrics like height and wingspan to demographics like age and gender. As notoriously data-hungry companies become increasingly involved in VR development, this experiment…
▽ More
Fifty study participants playtested an innocent-looking "escape room" game in virtual reality (VR). Within just a few minutes, an adversarial program had accurately inferred over 25 of their personal data attributes, from anthropometrics like height and wingspan to demographics like age and gender. As notoriously data-hungry companies become increasingly involved in VR development, this experimental scenario may soon represent a typical VR user experience. Since the Cambridge Analytica scandal of 2018, adversarially designed gamified elements have been known to constitute a significant privacy threat in conventional social platforms. In this work, we present a case study of how metaverse environments can similarly be adversarially constructed to covertly infer dozens of personal data attributes from seemingly anonymous users. While existing VR privacy research largely focuses on passive observation, we argue that because individuals subconsciously reveal personal information via their motion in response to specific stimuli, active attacks pose an outsized risk in VR environments.
△ Less
Submitted 13 December, 2023; v1 submitted 26 July, 2022;
originally announced July 2022.
-
Mitigating Sovereign Data Exchange Challenges: A Map** to Apply Privacy- and Authenticity-Enhancing Technologies
Authors:
Kaja Schmidt,
Gonzalo Munilla Garrido,
Alexander Mühle,
Christoph Meinel
Abstract:
Harmful repercussions from sharing sensitive or personal data can hamper institutions' willingness to engage in data exchange. Thus, institutions consider Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) to engage in Sovereign Data Exchange (SDE), i.e., sharing data with third parties without compromising their own or their users' data sovereignty. However, thes…
▽ More
Harmful repercussions from sharing sensitive or personal data can hamper institutions' willingness to engage in data exchange. Thus, institutions consider Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) to engage in Sovereign Data Exchange (SDE), i.e., sharing data with third parties without compromising their own or their users' data sovereignty. However, these technologies are often technically complex, which impedes their adoption. To support practitioners select PETs and AETs for SDE use cases and highlight SDE challenges researchers and practitioners should address, this study empirically constructs a challenge-oriented technology map**. First, we compile challenges of SDE by conducting a systematic literature review and expert interviews. Second, we map PETs and AETs to the SDE challenges and identify which technologies can mitigate which challenges. We validate the map** through investigator triangulation. Although the most critical challenge concerns data usage and access control, we find that the majority of PETs and AETs focus on data processing issues.
△ Less
Submitted 20 June, 2022;
originally announced July 2022.
-
Towards Verifiable Differentially-Private Polling
Authors:
Gonzalo Munilla Garrido,
Matthias Babel,
Johannes Sedlmeir
Abstract:
Analyses that fulfill differential privacy provide plausible deniability to individuals while allowing analysts to extract insights from data. However, beyond an often acceptable accuracy tradeoff, these statistical disclosure techniques generally inhibit the verifiability of the provided information, as one cannot check the correctness of the participants' truthful information, the differentially…
▽ More
Analyses that fulfill differential privacy provide plausible deniability to individuals while allowing analysts to extract insights from data. However, beyond an often acceptable accuracy tradeoff, these statistical disclosure techniques generally inhibit the verifiability of the provided information, as one cannot check the correctness of the participants' truthful information, the differentially private mechanism, or the unbiased random number generation. While related work has already discussed this opportunity, an efficient implementation with a precise bound on errors and corresponding proofs of the differential privacy property is so far missing. In this paper, we follow an approach based on zero-knowledge proofs~(ZKPs), in specific succinct non-interactive arguments of knowledge, as a verifiable computation technique to prove the correctness of a differentially private query output. In particular, we ensure the guarantees of differential privacy hold despite the limitations of ZKPs that operate on finite fields and have limited branching capabilities. We demonstrate that our approach has practical performance and discuss how practitioners could employ our primitives to verifiably query individuals' age from their digitally signed ID card in a differentially private manner.
△ Less
Submitted 14 June, 2022;
originally announced June 2022.
-
Verifying Outsourced Computation in an Edge Computing Marketplace
Authors:
Christopher Harth-Kitzerow,
Gonzalo Munilla Garrido
Abstract:
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions and is resistant to both dishonest Outsourcers and Contractors who try…
▽ More
An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions and is resistant to both dishonest Outsourcers and Contractors who try to maximize their expected payoff. We tested our verification scheme with state-of-the-art pre-trained Convolutional Neural Network models designed for object detection. On all devices, our verification scheme causes less than 1ms computational overhead and a negligible network bandwidth overhead of at most 84 bytes per frame. Our implementation can also perform our verification scheme's tasks parallel to the object detection to eliminate any latency overhead. Compared to other proposed verification schemes, our scheme resists a comprehensive set of protocol violations without sacrificing performance.
△ Less
Submitted 23 March, 2022;
originally announced March 2022.
-
Exponential Randomized Response: Boosting Utility in Differentially Private Selection
Authors:
Gonzalo Munilla Garrido,
Florian Matthes
Abstract:
A differentially private selection algorithm outputs from a finite set the item that approximately maximizes a data-dependent quality function. The most widely adopted mechanisms tackling this task are the pioneering exponential mechanism and permute-and-flip, which can offer utility improvements of up to a factor of two over the exponential mechanism. This work introduces a new differentially pri…
▽ More
A differentially private selection algorithm outputs from a finite set the item that approximately maximizes a data-dependent quality function. The most widely adopted mechanisms tackling this task are the pioneering exponential mechanism and permute-and-flip, which can offer utility improvements of up to a factor of two over the exponential mechanism. This work introduces a new differentially private mechanism for private selection and conducts theoretical and empirical comparisons with the above mechanisms. For reasonably common scenarios, our mechanism can provide utility improvements of factors significantly larger than two over the exponential and permute-and-flip mechanisms. Because the utility can deteriorate in niche scenarios, we recommend our mechanism to analysts who can tolerate lower utility for some datasets.
△ Less
Submitted 3 August, 2022; v1 submitted 11 January, 2022;
originally announced January 2022.
-
Large deviations principle for the cubic NLS equation
Authors:
Miguel Angel Garrido,
Ricardo Grande,
Kristin M. Kurianski,
Gigliola Staffilani
Abstract:
In this paper, we present a probabilistic study of rare phenomena of the cubic nonlinear Schrödinger equation on the torus in a weakly nonlinear setting. This equation has been used as a model to numerically study the formation of rogue waves in deep sea. Our results are twofold: first, we introduce a notion of criticality and prove a Large Deviations Principle (LDP) for the subcritical and critic…
▽ More
In this paper, we present a probabilistic study of rare phenomena of the cubic nonlinear Schrödinger equation on the torus in a weakly nonlinear setting. This equation has been used as a model to numerically study the formation of rogue waves in deep sea. Our results are twofold: first, we introduce a notion of criticality and prove a Large Deviations Principle (LDP) for the subcritical and critical cases. Second, we study the most likely initial conditions that lead to the formation of a rogue wave, from a theoretical and numerical point of view. Finally, we propose several open questions for future research.
△ Less
Submitted 15 November, 2021; v1 submitted 29 October, 2021;
originally announced October 2021.
-
Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries
Authors:
Gonzalo Munilla Garrido,
Joseph Near,
Aitsam Muhammad,
Warren He,
Roman Matzutt,
Florian Matthes
Abstract:
An increasing number of open-source libraries promise to bring differential privacy to practice, even for non-experts. This paper studies five libraries that offer differentially private analytics: Google DP, SmartNoise, diffprivlib, diffpriv, and Chorus. We compare these libraries qualitatively (capabilities, features, and maturity) and quantitatively (utility and scalability) across four analyti…
▽ More
An increasing number of open-source libraries promise to bring differential privacy to practice, even for non-experts. This paper studies five libraries that offer differentially private analytics: Google DP, SmartNoise, diffprivlib, diffpriv, and Chorus. We compare these libraries qualitatively (capabilities, features, and maturity) and quantitatively (utility and scalability) across four analytics queries (count, sum, mean, and variance) executed on synthetic and real-world datasets. We conclude that these libraries provide similar utility (except in some notable scenarios). However, there are significant differences in the features provided, and we find that no single library excels in all areas. Based on our results, we provide guidance for practitioners to help in choosing a suitable library, guidance for library designers to enhance their software, and guidance for researchers on open challenges in differential privacy tools for non-experts.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
Revealing the Landscape of Privacy-Enhancing Technologies in the Context of Data Markets for the IoT: A Systematic Literature Review
Authors:
Gonzalo Munilla Garrido,
Johannes Sedlmeir,
Ömer Uludağ,
Ilias Soto Alaoui,
Andre Luckow,
Florian Matthes
Abstract:
IoT data markets in public and private institutions have become increasingly relevant in recent years because of their potential to improve data availability and unlock new business models. However, exchanging data in markets bears considerable challenges related to disclosing sensitive information. Despite considerable research focused on different aspects of privacy-enhancing data markets for th…
▽ More
IoT data markets in public and private institutions have become increasingly relevant in recent years because of their potential to improve data availability and unlock new business models. However, exchanging data in markets bears considerable challenges related to disclosing sensitive information. Despite considerable research focused on different aspects of privacy-enhancing data markets for the IoT, none of the solutions proposed so far seems to find a practical adoption. Thus, this study aims to organize the state-of-the-art solutions, analyze and scope the technologies that have been suggested in this context, and structure the remaining challenges to determine areas where future research is required. To accomplish this goal, we conducted a systematic literature review on privacy enhancement in data markets for the IoT, covering 50 publications dated up to July 2020, and provided updates with 24 publications dated up to May 2022. Our results indicate that most research in this area has emerged only recently, and no IoT data market architecture has established itself as canonical. Existing solutions frequently lack the required combination of anonymization and secure computation technologies. Furthermore, there is no consensus on the appropriate use of blockchain technology for IoT data markets and a low degree of leveraging existing libraries or reusing generic data market architectures. We also identified significant challenges remaining, such as the copy problem and the recursive enforcement problem that-while solutions have been suggested to some extent-are often not sufficiently addressed in proposed designs. We conclude that privacy-enhancing technologies need further improvements to positively impact data markets so that, ultimately, the value of data is preserved through data scarcity and users' privacy and businesses-critical information are protected.
△ Less
Submitted 12 July, 2022; v1 submitted 25 July, 2021;
originally announced July 2021.
-
The jet collimation profile at high resolution in BL Lacertae
Authors:
C. Casadio,
N. R. MacDonald,
B. Boccardi,
S. G. Jorstad,
A. P. Marscher,
T. P. Krichbaum,
J. A. Hodgson,
J-Y. Kim,
E. Traianou,
Z. R. Weaver,
M. Gómez Garrido,
J. González García,
J. Kallunki,
M. Lindqvist,
S. Sánchez,
J. Yang,
J. A. Zensus
Abstract:
Controversial studies on the jet collimation profile of BL Lacertae (BL Lac), the eponymous blazar of BL Lac objects class, complicate the scenario in this already puzzling class of objects. Understanding the jet geometry, in connection with the jet kinematics and the physical conditions in the surrounding medium, is fundamental to better constrain the formation, acceleration and collimation mecha…
▽ More
Controversial studies on the jet collimation profile of BL Lacertae (BL Lac), the eponymous blazar of BL Lac objects class, complicate the scenario in this already puzzling class of objects. Understanding the jet geometry, in connection with the jet kinematics and the physical conditions in the surrounding medium, is fundamental to better constrain the formation, acceleration and collimation mechanisms in extragalactic jets. With the aim of investigating the jet geometry in the innermost regions of the jet of BL Lac, and solving the controversy, we explore the radio jet in this source, using high resolution millimeter-wave VLBI data. We collect 86GHz GMVA and 43GHz VLBA data to obtain stacked images that we use to infer the jet collimation profile by means of two comparable methods. We analyze the kinematics at 86GHz, and we discuss it in the context of the jet expansion. Finally we consider a possible implication of the Bondi sphere in sha** the different expanding region observed along the jet. We found that the jet in BL Lac expands with an overall conical geometry. A higher expanding rate region is observed between ~5 and 10 pc (de-projected) from the black hole. Such a region is associated with the decrease in brightness usually observed in high-frequency VLBI images of BL Lac. The jet retrieves the original jet expansion around 17 pc, where the presence of a recollimation shock is supported by both the jet profile and the 15GHz kinematics (MOJAVE survey). The change in the jet expansion profile occurring at ~5 pc could be associated with a change in the external pressure profile in correspondence of the Bondi radius (~3.3X10$^5$$R_s$).
△ Less
Submitted 9 March, 2021; v1 submitted 17 February, 2021;
originally announced February 2021.
-
Mathematical model optimized for prediction and health care planning for COVID-19
Authors:
Jose Manuel Garrido,
David Martinez-Rodriguez,
Fernando Rodriguez-Serrano,
Jose Miguel Perez-Villares,
Andrea Ferreiro-Marzal,
Maria del Mar Jimenez-Quintana,
Grupo de Estudio COVID-19_Granada,
Rafael Jacinto Villanueva
Abstract:
Objective. The COVID-19 pandemic has threatened to collapse hospital and ICU services, and it has affected the care programs for non-COVID patients. The objective was to develop a mathematical model designed to optimize predictions related to the need for hospitalization and ICU admission by COVID-19 patients.
Design. Prospective study. Setting. Province of Granada (Spain). Population. Consecuti…
▽ More
Objective. The COVID-19 pandemic has threatened to collapse hospital and ICU services, and it has affected the care programs for non-COVID patients. The objective was to develop a mathematical model designed to optimize predictions related to the need for hospitalization and ICU admission by COVID-19 patients.
Design. Prospective study. Setting. Province of Granada (Spain). Population. Consecutive COVID-19 patients hospitalized, admitted to ICU, recovered and died from March 15 to September 22, 2020. Study variables. The number of patients infected with SARS-CoV-2 and hospitalized or admitted to ICU for COVID-19.
Results. The data reported by hospitals was used to develop a mathematical model that reflects the flow of the population among the different interest groups in relation to COVID-19. This tool has allowed us to analyse different scenarios based on socio-health restriction measures, and to forecast the number of people infected, hospitalized and admitted to the ICU until May 2021.
Conclusions. The mathematical model is capable of providing predictions on the evolution of the COVID-19 sufficiently in advance as to anticipate the peaks of prevalence and hospital and ICU care demands, and also the appearance of periods in which the care for non-COVID patients could be intensified.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
Simplifying Karnaugh Maps by Making Groups of a Non-Power-of-Two Number of Elements
Authors:
Mario Garrido
Abstract:
When we study the Karnaugh map in the switching theory course, we learn that the ones in the map must be combined in groups of $a \times b$ elements, being $a$ and $b$ powers of two. The result is the logic function described as a sum of products. This paper shows that we can also make groups where $a$ and/or $b$ are equal to three. This does not result in a sum of products, but in a logic functio…
▽ More
When we study the Karnaugh map in the switching theory course, we learn that the ones in the map must be combined in groups of $a \times b$ elements, being $a$ and $b$ powers of two. The result is the logic function described as a sum of products. This paper shows that we can also make groups where $a$ and/or $b$ are equal to three. This does not result in a sum of products, but in a logic function that is simpler than the sum of products in terms of logic gates. This idea is extended later in the paper to groups of $2^n-1$ elements.
△ Less
Submitted 3 December, 2020;
originally announced December 2020.
-
The Gaia-ESO Survey: Calibrating the lithium-age relation with open clusters and associations. I. Cluster age range and initial membership selections
Authors:
M. L. Gutiérrez Albarrán,
D. Montes,
M. Gómez Garrido,
H. M. Tabernero,
J. I. Gónzalez Hernández,
E. Marfil,
A. Frasca,
A. C. Lanzafame,
A. Klutsch,
E. Franciosini,
S. Randich,
R. Smiljanic,
A. J. Korn,
G. Gilmore,
E. J. Alfaro,
M. Baratella,
A. Bayo,
T. Bensby,
R. Bonito,
G. Carraro,
E. Delgado Mena,
S. Feltzing,
A. Gonneau,
U. Heiter,
A. Hourihane
, et al. (11 additional authors not shown)
Abstract:
Previous studies of open clusters have shown that lithium depletion is not only strongly age dependent but also shows a complex pattern with other parameters that is not yet understood. For pre- and main-sequence late-type stars, these parameters include metallicity, mixing mechanisms, convection structure, rotation, and magnetic activity. We perform a thorough membership analysis for a large numb…
▽ More
Previous studies of open clusters have shown that lithium depletion is not only strongly age dependent but also shows a complex pattern with other parameters that is not yet understood. For pre- and main-sequence late-type stars, these parameters include metallicity, mixing mechanisms, convection structure, rotation, and magnetic activity. We perform a thorough membership analysis for a large number of stars observed within the Gaia-ESO survey (GES) in the field of 20 open clusters, ranging in age from young clusters and associations, to intermediate-age and old open clusters. Based on the parameters derived from the GES spectroscopic observations, we obtained lists of candidate members for each of the clusters in the sample by deriving RV distributions and studying the position of the kinematic selections in the EW(Li) versus Teff plane to obtain lithium members. We used gravity indicators to discard field contaminants and studied [Fe/H] metallicity to further confirm the membership of the candidates. We also made use of studies using recent data from the Gaia DR1 and DR2 releases to assess our member selections. We identified likely member candidates for the sample of 20 clusters observed in GES (iDR4) with UVES and GIRAFFE, and conducted a comparative study that allowed us to characterize the properties of these members, as well as identify field contaminant stars, both lithium-rich giants and non-giant outliers. This work is the first step towards the calibration of the lithium-age relation and its dependence on other GES parameters. During this project we aim to use this relation to infer the ages of GES field stars, and identify their potential membership to young associations and stellar kinematic groups of different ages.
△ Less
Submitted 30 August, 2020;
originally announced September 2020.
-
A 128-point Multi-Path SC FFT Architecture
Authors:
Shun-Che Hsu,
Shen-Jui Huang,
Sau-Gee Chen,
Shin-Che Lin,
Mario Garrido
Abstract:
This paper presents a new radix-2^k multi-path FFT architecture, named MSC FFT, which is based on a single-path radix-2 serial commutator (SC) FFT architecture. The proposed multi-path architecture has a very high hardware utilization that results in a small chip area, while providing high throughput. In addition, the adoption of radix-2^k FFT algorithms allows for simplifying the rotators even fu…
▽ More
This paper presents a new radix-2^k multi-path FFT architecture, named MSC FFT, which is based on a single-path radix-2 serial commutator (SC) FFT architecture. The proposed multi-path architecture has a very high hardware utilization that results in a small chip area, while providing high throughput. In addition, the adoption of radix-2^k FFT algorithms allows for simplifying the rotators even further. It is achieved by optimizing the structure of the processing element (PE). The implemented architecture is a 128-point 4-parallel multi-path SC FFT using 90 nm process. Its area and power consumption at 250 MHz are only 0.167 mm2 and 14.81 mW, respectively. Compared with existing works, the proposed design reduces significantly the chip rea and the power consumption, while providing high throughput.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
The Contact and Mobility Networks of Mexico City
Authors:
Guillermo de Anda-Jáuregui,
Plinio Guzmán,
Oscar Fontanelli,
Amilcar Meneses,
Alfredo Hernández,
Janeth de Anda-Gil,
Marisol Flores Garrido,
Maribel Hernández-Rosales
Abstract:
Mexico City, the largest city in Mexico, is also one of the largest cities in the world. It has over 9 million inhabitants and concentrates the vast majority of government and business centers. In this work we describe algorithms that use anonymized location data from mobile devices to construct Mexico City's contact and mobility networks aiming to help the analysis of the city's complexity by und…
▽ More
Mexico City, the largest city in Mexico, is also one of the largest cities in the world. It has over 9 million inhabitants and concentrates the vast majority of government and business centers. In this work we describe algorithms that use anonymized location data from mobile devices to construct Mexico City's contact and mobility networks aiming to help the analysis of the city's complexity by understanding movement and physical interaction patterns between its inhabitants. We show the effectiveness and usefulness of our approach by building networks with data collected in February 2020 and performing a general descriptive analysis on them. We found that contact networks in Mexico City are very sparse, characterized by a largest connected component, and with a heavy-tailed degree distribution. On the other hand, we observed that paths conformed by the highest-degrree nodes of mobility networks resemble Mexico City's street network; moreover, we found interesting qualitative differences in the degree distribution of these networks between weekends and weekdays. We present these results along with the release of contact and mobility networks.
△ Less
Submitted 22 August, 2022; v1 submitted 29 July, 2020;
originally announced July 2020.
-
The Samuel realcompactification
Authors:
M. Isabel Garrido,
Ana S. Meroño
Abstract:
For a uniform space (X, $μ$), we introduce a realcompactification of X by means of the family $U_μ(X)$ of all the real-valued uniformly continuous functions, in the same way that the known Samuel compactification is given by $U^{*}_μ(X)$ the set of all the bounded functions in $U_μ(X)$. We will call it "the Samuel realcompactification" by several resemblances to the Samuel compactification. In thi…
▽ More
For a uniform space (X, $μ$), we introduce a realcompactification of X by means of the family $U_μ(X)$ of all the real-valued uniformly continuous functions, in the same way that the known Samuel compactification is given by $U^{*}_μ(X)$ the set of all the bounded functions in $U_μ(X)$. We will call it "the Samuel realcompactification" by several resemblances to the Samuel compactification. In this note, we present different ways to construct such realcompactification as well as we study the corresponding problem of knowing when a uniform space is Samuel realcompact, that is, it coincides with its Samuel realcompactification. At this respect we obtain as main result a theorem of Katětov-Shirota type, by means of a new property of completeness recently introduced by the authors, called Bourbaki-completeness.
△ Less
Submitted 1 June, 2017;
originally announced June 2017.
-
Reaction Studies of Neutral Atomic ${\rm C}$ with ${\rm H_3^+}$ using a Merged-Beams Apparatus
Authors:
A. P. O'Connor,
X. Urbain,
J. Stützel,
K. A. Miller,
N. de Ruette,
M. Garrido,
D. W. Savin
Abstract:
We have investigated the chemistry of ${\rm C + H_3^+}$ forming CH$^+$, CH$_2^+$, and CH$_3^+$. These reactions are believed to be some of the key gas-phase astrochemical processes initiating the formation of organic molecules in molecular clouds. For this work we have constructed a novel merged fast-beams apparatus which overlaps a beam of molecular ions onto a beam of ground-term neutral atoms.…
▽ More
We have investigated the chemistry of ${\rm C + H_3^+}$ forming CH$^+$, CH$_2^+$, and CH$_3^+$. These reactions are believed to be some of the key gas-phase astrochemical processes initiating the formation of organic molecules in molecular clouds. For this work we have constructed a novel merged fast-beams apparatus which overlaps a beam of molecular ions onto a beam of ground-term neutral atoms. Here we present cross section data for forming CH$^+$ and CH$_2^+$ at collision energies from $\approx 9$ meV to $\approx20$ and 3 eV, respectively. Using these data we have derived thermal rate coefficients for reaction temperatures from $\approx72$ K to $\approx2.3 \times 10^5$ and $3.4 \times 10^4$ K, respectively. For the formation of CH$_3^+$ we are able only to put an upper limit on the rate coefficient. Our results for CH$^+$ and CH$_2^+$ are in good agreement with the mass-scaled results from a previous ion trap study of ${\rm C + D_3^+}$ at a reaction temperature of $\sim 1000$ K. At molecular cloud temperatures our thermal rate coefficient for forming CH$^+$ lies a factor of $\sim 2-4$ below the Langevin rate coefficient currently given in astrochemical databases and below the published semi-classical calculations. Our results for CH$_2^+$ formation are a factor of $\sim 26$ above the semi-classical results. Astrochemical databases do not currently include this channel.
△ Less
Submitted 27 April, 2015; v1 submitted 20 August, 2014;
originally announced August 2014.
-
Probabilistic Inference from Arbitrary Uncertainty using Mixtures of Factorized Generalized Gaussians
Authors:
M. C. Garrido,
P. E. Lopez-de-Teruel,
A. Ruiz
Abstract:
This paper presents a general and efficient framework for probabilistic inference and learning from arbitrary uncertain information. It exploits the calculation properties of finite mixture models, conjugate families and factorization. Both the joint probability density of the variables and the likelihood function of the (objective or subjective) observation are approximated by a…
▽ More
This paper presents a general and efficient framework for probabilistic inference and learning from arbitrary uncertain information. It exploits the calculation properties of finite mixture models, conjugate families and factorization. Both the joint probability density of the variables and the likelihood function of the (objective or subjective) observation are approximated by a special mixture model, in such a way that any desired conditional distribution can be directly obtained without numerical integration. We have developed an extended version of the expectation maximization (EM) algorithm to estimate the parameters of mixture models from uncertain training examples (indirect observations). As a consequence, any piece of exact or uncertain information about both input and output values is consistently handled in the inference and learning stages. This ability, extremely useful in certain situations, is not found in most alternative methods. The proposed framework is formally justified from standard probabilistic principles and illustrative examples are provided in the fields of nonparametric pattern classification, nonlinear regression and pattern completion. Finally, experiments on a real application and comparative results over standard databases provide empirical evidence of the utility of the method in a wide range of applications.
△ Less
Submitted 18 May, 2011;
originally announced May 2011.
-
Quasi-conjugate Bayes estimates for GPD parameters and application to heavy tails modelling
Authors:
Jean Diebolt,
Mhamed El-Aroui,
Myriam Garrido,
Stéphane Girard
Abstract:
We present a quasi-conjugate Bayes approach for estimating Generalized Pareto Distribution (GPD) parameters, distribution tails and extreme quantiles within the Peaks-Over-Threshold framework. Damsleth conjugate Bayes structure on Gamma distributions is transfered to GPD. Posterior estimates are then computed by Gibbs samplers with Hastings-Metropolis steps. Accurate Bayes credibility intervals ar…
▽ More
We present a quasi-conjugate Bayes approach for estimating Generalized Pareto Distribution (GPD) parameters, distribution tails and extreme quantiles within the Peaks-Over-Threshold framework. Damsleth conjugate Bayes structure on Gamma distributions is transfered to GPD. Posterior estimates are then computed by Gibbs samplers with Hastings-Metropolis steps. Accurate Bayes credibility intervals are also defined, they provide assessment of the quality of the extreme events estimates. An empirical Bayesian method is used in this work, but the suggested approach could incorporate prior information. It is shown that the obtained quasi-conjugate Bayes estimators compare well with the GPD standard estimators when simulated and real data sets are studied.
△ Less
Submitted 31 March, 2011;
originally announced March 2011.
-
A Layer Correlation technique for pion energy calibration at the 2004 ATLAS Combined Beam Test
Authors:
E. Abat,
J. M. Abdallah,
T. N. Addy,
P. Adragna,
M. Aharrouche,
A. Ahmad,
T. P. A. Akesson,
M. Aleksa,
C. Alexa,
K. Anderson,
A. Andreazza,
F. Anghinolfi,
A. Antonaki,
G. Arabidze,
E. Arik,
T. Atkinson,
J. Baines,
O. K. Baker,
D. Banfi,
S. Baron,
A. J. Barr,
R. Beccherle,
H. P. Beck,
B. Belhorma,
P. J. Bell
, et al. (460 additional authors not shown)
Abstract:
A new method for calibrating the hadron response of a segmented calorimeter is developed and successfully applied to beam test data. It is based on a principal component analysis of energy deposits in the calorimeter layers, exploiting longitudinal shower development information to improve the measured energy resolution. Corrections for invisible hadronic energy and energy lost in dead material in…
▽ More
A new method for calibrating the hadron response of a segmented calorimeter is developed and successfully applied to beam test data. It is based on a principal component analysis of energy deposits in the calorimeter layers, exploiting longitudinal shower development information to improve the measured energy resolution. Corrections for invisible hadronic energy and energy lost in dead material in front of and between the calorimeters of the ATLAS experiment were calculated with simulated Geant4 Monte Carlo events and used to reconstruct the energy of pions im**ing on the calorimeters during the 2004 Barrel Combined Beam Test at the CERN H8 area. For pion beams with energies between 20 GeV and 180 GeV, the particle energy is reconstructed within 3% and the energy resolution is improved by between 11% and 25% compared to the resolution at the electromagnetic scale.
△ Less
Submitted 12 May, 2011; v1 submitted 20 December, 2010;
originally announced December 2010.
-
Characterization of the Shell Structure in Coupled Quantum Dots through Resonant Optical Probing
Authors:
Mauricio Garrido,
Kushal C. Wijesundara,
Swati Ramanathan,
E. A. Stinaff,
M. Scheibner,
A. S. Bracker,
D. Gammon
Abstract:
Excited states in single quantum dots (QDs) have been shown to be useful for spin state initialization and manipulation. For scalable quantum information processing it is necessary to have multiple spins interacting. Therefore, we present initial results from photoluminescence excitation studies of excited states in coupled quantum dots (CQDs). Due to the rich set of possible excitation and reco…
▽ More
Excited states in single quantum dots (QDs) have been shown to be useful for spin state initialization and manipulation. For scalable quantum information processing it is necessary to have multiple spins interacting. Therefore, we present initial results from photoluminescence excitation studies of excited states in coupled quantum dots (CQDs). Due to the rich set of possible excitation and recombination possibilities, a technique for visualizing photoluminescence excitation in coupled quantum dots is discussed, by which both the interaction between the dots and the type of absorption and emission that generated the photoluminescence is easily and clearly revealed. As an example, this technique is applied to characterize the shell structure of the hole in the top dot and the results are compared with those using Level Anti-Crossing Spectroscopy (LACS).
△ Less
Submitted 12 March, 2009; v1 submitted 29 January, 2009;
originally announced January 2009.
-
Electric field tunable exchange interaction in InAs/GaAs coupled quantum dots
Authors:
Kushal C. Wijesundara,
Mauricio Garrido,
Swati Ramanathan,
E. A. Stinaff,
M. Scheibner,
A. S. Bracker,
D. Gammon
Abstract:
Spin manipulation in coupled quantum dots is of interest for quantum information applications. Control of the exchange interaction between electrons and holes via an applied electric field may provide a promising technique for such spin control. Polarization dependent photoluminescence (PL) spectra were used to investigate the spin dependent interactions in coupled quantum dot systems and by var…
▽ More
Spin manipulation in coupled quantum dots is of interest for quantum information applications. Control of the exchange interaction between electrons and holes via an applied electric field may provide a promising technique for such spin control. Polarization dependent photoluminescence (PL) spectra were used to investigate the spin dependent interactions in coupled quantum dot systems and by varying an electric field, the ground state hole energy levels are brought into resonance, resulting in the formation of molecular orbitals observed as anticrossings between the direct and indirect transitions in the spectra. The indirect and direct transitions of the neutral exciton demonstrate high and low circular polarization memory respectively due to variation in the exchange interaction. The ratio between the polarization values as a function of electric field, and the barrier height was measured. These results indicate a possible method of tuning between indirect and direct configurations to control the degree of exchange interaction.
△ Less
Submitted 29 January, 2009;
originally announced January 2009.
-
Expected Performance of the ATLAS Experiment - Detector, Trigger and Physics
Authors:
The ATLAS Collaboration,
G. Aad,
E. Abat,
B. Abbott,
J. Abdallah,
A. A. Abdelalim,
A. Abdesselam,
O. Abdinov,
B. Abi,
M. Abolins,
H. Abramowicz,
B. S. Acharya,
D. L. Adams,
T. N. Addy,
C. Adorisio,
P. Adragna,
T. Adye,
J. A. Aguilar-Saavedra,
M. Aharrouche,
S. P. Ahlen,
F. Ahles,
A. Ahmad,
H. Ahmed,
G. Aielli,
T. Akdogan
, et al. (2587 additional authors not shown)
Abstract:
A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on…
▽ More
A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on simulations of the detector and physics processes, with particular emphasis given to the data expected from the first years of operation of the LHC at CERN.
△ Less
Submitted 14 August, 2009; v1 submitted 28 December, 2008;
originally announced January 2009.