Skip to main content

Showing 1–37 of 37 results for author: Harrison, K

.
  1. arXiv:2405.15935  [pdf, other

    cs.IT

    Optimizing Secrecy Codes Using Gradient Descent

    Authors: David Hunn, Willie K. Harrison

    Abstract: Recent theoretical developments in coset coding theory have provided continuous-valued functions which give the equivocation and maximum likelihood (ML) decoding probability of coset secrecy codes. In this work, we develop a method for incorporating these functions, along with a complex set of constraints, into a gradient descent optimization algorithm. This algorithm employs a movement cost funct… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 25 pages, 23 figures. Submitted to Transactions on Information Theory

  2. arXiv:2401.07141  [pdf, other

    cs.IT

    Secrecy Coding for the Binary Symmetric Wiretap Channel via Linear Programming

    Authors: Ali Nikkhah, Morteza Shoushtari, Bahareh Akhbari, Willie K. Harrison

    Abstract: In this paper, we use a linear programming (LP) optimization approach to evaluate the equivocation for a wiretap channel where the main channel is noiseless, and the wiretap channel is a binary symmetric channel (BSC). Using this technique, we present an analytical limit for the achievable secrecy rate in the finite blocklength regime that is tighter than traditional fundamental limits. We also pr… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Submitted for possible Journal publication

  3. arXiv:2308.09123  [pdf, other

    quant-ph hep-ph hep-th

    Collective neutrino oscillations on a quantum computer with hybrid quantum-classical algorithm

    Authors: Pooja Siwach, Kaytlin Harrison, A. Baha Balantekin

    Abstract: We simulate the time evolution of collective neutrino oscillations in two-flavor settings on a quantum computer. We explore the generalization of Trotter-Suzuki approximation to time-dependent Hamiltonian dynamics. The trotterization steps are further optimized using the Cartan decomposition of two-qubit unitary gates U $\in$ SU (4) in the minimum number of controlled-NOT (CNOT) gates making the a… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 9 pages, 10 figures

    Report number: LLNL-JRNL-853275-DRAFT

  4. arXiv:2306.11905  [pdf

    cond-mat.mtrl-sci

    Raman Study of Layered Breathing Kagome Lattice Semiconductor Nb3Cl8

    Authors: Dylan A. Jeff, Favian Gonzalez, Kamal Harrison, Yuzhou Zhao, Tharindu Fernando, Sabin Regmi, Zhaoyu Liu, Humberto R. Gutierrez, Madhab Neupane, Jihui Yang, Jiun-Haw Chu, Xiaodong Xu, Ting Cao, Saiful I. Khondaker

    Abstract: Niobium chloride (Nb3Cl8) is a layered 2D semiconducting material with many exotic properties including a breathing kagome lattice, a topological flat band in its band structure, and a crystal structure that undergoes a structural and magnetic phase transition at temperatures below 90 K. Despite being a remarkable material with fascinating new physics, the understanding of its phonon properties is… ▽ More

    Submitted 25 October, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 18 pages, 8 figures, 1 table

    Journal ref: 2D Mater. 10 045030 (2023)

  5. arXiv:2211.01445  [pdf, other

    astro-ph.SR astro-ph.GA

    The long-term spectral changes of eta Carinae: are they caused by a dissipating occulter as indicated by CMFGEN models?

    Authors: A. Damineli, D. J. Hillier, F. Navarete, A. F. J. Moffat, G. Weigelt, M. F. Corcoran, T. R. Gull, N. D. Richardson, T. P. Ho, T. I. Madura, D. Espinoza-Galeas, H. Hartman, P. Morris, C. S. Pickett, I. R. Stevens, C. M. P. Russell, K. Hamaguchi, F. J. Jablonski, M. Teodoro, P. McGee, P. Cacella, B. Heathcote, K. Harrison, M. Johnston, T. Bohlsen , et al. (1 additional authors not shown)

    Abstract: Eta Carinae ($η$\,Car) exhibits a unique set of P Cygni profiles with both broad and narrow components. Over many decades, the spectrum has changed -- there has been an increase in observed continuum fluxes and a decrease in FeII and HI emission line equivalent widths. The spectrum is evolving towards that of a P Cygni star such as P~Cygni itself and HDE~316285. The spectral evolution has been att… ▽ More

    Submitted 7 July, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

    Comments: 71 pages, 8 figures, 4 long tables, to appear on ApJ

  6. arXiv:2209.02409  [pdf

    cond-mat.mtrl-sci physics.chem-ph

    Ultra-Low Temperature Li/CFx Batteries Enabled by Fast-transport and Anion-pairing Liquefied Gas Electrolytes

    Authors: Yijie Yin, John Holoubek, Alex Liu, Baharak Sayahpour, Ganesh Raghavendran, Guorui Cai, Bing Han, Matthew Mayer, Noah B. Schorr, Timothy N. Lambert, Katharine L. Harrison, Weikang Li, Zheng Chen, Y. Shirley Meng

    Abstract: Lithium fluorinated carbon is one of the most promising chemistries for high-energy-density primary energy storage systems in applications where rechargeability is not required. Though Li/CFx demonstrates high energy density under ambient conditions, achieving such a high energy density when exposed to subzero temperatures remains a challenge, particularly under high current density. Here, we repo… ▽ More

    Submitted 1 September, 2022; originally announced September 2022.

  7. arXiv:2205.11723  [pdf, ps, other

    cond-mat.mtrl-sci physics.chem-ph

    Galvanic Corrosion and Electric Field in Lithium Anode Passivation Films: Effects on Self-Discharge

    Authors: Kevin Leung, Laura C. Merrill, Katharine L. Harrison

    Abstract: Battery interfaces help govern rate capability, safety/stability, cycle life, and self-discharge, but significant gaps remain in our understanding at atomic length scales that can be exploited to improve interfacial properties. In particular, Li partially plated on copper current collectors, relevant to the anodeless, lithium metal cell which is a holy grail of high density energy battery research… ▽ More

    Submitted 23 May, 2022; originally announced May 2022.

    Comments: 41 pages. 8 figures

    Journal ref: Journal of Physical Chemistry C (2022)

  8. arXiv:2107.01289  [pdf, ps, other

    cond-mat.mtrl-sci physics.chem-ph

    Edge-Propagation Discharge Mechanism in CFx Batteries -- a First Principles and Experimental Study

    Authors: Kevin Leung, Noah B. Schorr, Matthew Mayer, Timothy N. Lambert, Y. Shirley Meng, K. L. Harrison

    Abstract: Graphite fluoride (CFx) cathodes coupled with lithium anodes yield one of the highest theoretical energy densities (>860 Wh/g) among primary batteries. In practice, the observed discharge voltage (~2.5 V) is significantly lower than thermodynamic limits (>4.5 V), the discharge rate is low, and so far Li/CFx has only been used in primary batteries. Understanding the discharge mechanism at atomic le… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Comments: 31 pages, 7 figures

    Journal ref: Chemistry of Materials vol. 33, pp. 1760-1770 (2021)

  9. arXiv:2104.02220  [pdf, ps, other

    quant-ph

    Quantum Theory of Measurement

    Authors: Alan K. Harrison

    Abstract: We describe a quantum mechanical measurement as a variational principle including interaction between the system under measurement and the measurement apparatus. Augmenting the action with a nonlocal term (a double integration over the duration of the interaction) results in a theory capable of describing both the measurement process (agreement between system state and pointer state) and the colla… ▽ More

    Submitted 5 April, 2021; originally announced April 2021.

    Report number: LA-UR-21-20902

  10. Supervised Neural Networks for RFI Flagging

    Authors: Kyle Harrison, Amit Kumar Mishra

    Abstract: Neural network (NN) based methods are applied to the detection of radio frequency interference (RFI) in post-correlation,post-calibration time/frequency data. While calibration doesaffect RFI for the sake of this work a reduced dataset inpost-calibration is used. Two machine learning approachesfor flagging real measurement data are demonstrated usingthe existing RFI flagging technique AOFlagger as… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

    Comments: This paper has been published in the Proceedings of RFI 2019 Workshop by IEEE Xplorer at: https://ieeexplore.ieee.org/xpl/conhome/9108774/proceeding

    Report number: INSPEC Accession Number: 19675340 INSPEC Accession Number: 19675340

  11. arXiv:2007.12332  [pdf, other

    cs.NE cs.HC

    Image-Based Benchmarking and Visualization for Large-Scale Global Optimization

    Authors: Kyle Robert Harrison, Azam Asilian Bidgoli, Shahryar Rahnamayan, Kalyanmoy Deb

    Abstract: In the context of optimization, visualization techniques can be useful for understanding the behaviour of optimization algorithms and can even provide a means to facilitate human interaction with an optimizer. Towards this goal, an image-based visualization framework, without dimension reduction, that visualizes the solutions to large-scale global optimization problems as images is proposed. In th… ▽ More

    Submitted 23 July, 2020; originally announced July 2020.

    Comments: Preprint submitted to Applied Intelligence. 43 pages, 30 figures

  12. arXiv:1902.04273  [pdf, ps, other

    math.RA math.OA

    Nest algebras in an arbitrary vector space

    Authors: Don Hadwin, K. J. Harrison

    Abstract: We examine the properties of algebras of linear transformations that leave invariant all subspaces in a totally ordered lattice of subspaces of an arbitrary vector space. We compare our results with those that apply for the corresponding algebras of bounded operators that act on a Hilbert space.

    Submitted 12 February, 2019; originally announced February 2019.

    MSC Class: 15A30

  13. arXiv:1811.06591  [pdf, other

    cs.CR

    Physical-Layer Security: Does it Work in a Real Environment?

    Authors: Benjamin Jensen, Bradford Clark, Dakota Flanary, Kalin Norman, Michael Rice, Willie K. Harrison

    Abstract: This paper applies channel sounding measurements to enable physical-layer security coding. The channel measurements were acquired in an indoor environment and used to assess the secrecy capacity as a function of physical location. A variety of Reed-Muller wiretap codes were applied to the channel measurements to determine the most effective code for the environment. The results suggest that deploy… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: 7 pages, 7 figures

  14. arXiv:1701.05484  [pdf, other

    cs.IT

    Quantifying Equivocation for Finite Blocklength Wiretap Codes

    Authors: Jack Pfister, Marco A. C. Gomes, Joao P. Vilela, Willie K. Harrison

    Abstract: This paper presents a new technique for providing the analysis and comparison of wiretap codes in the small blocklength regime over the binary erasure wiretap channel. A major result is the development of Monte Carlo strategies for quantifying a code's equivocation, which mirrors techniques used to analyze normal error correcting codes. For this paper, we limit our analysis to coset-based wiretap… ▽ More

    Submitted 19 January, 2017; originally announced January 2017.

    Comments: Submitted to ICC 2017

  15. arXiv:1701.04704  [pdf

    physics.geo-ph

    Using impact exsolution to link the Chicxulub collision and Deccan volcanism

    Authors: Kevin G. Harrison

    Abstract: Observations suggest that impactors and volcanism are connected, but the mechanism that links these events is unknown. This research proposes the impact exsolution hypothesis to explain how planetary scale collisions trigger volcanism. This hypothesis says that when large objects such as asteroids or comets hit planets, they generate seismic waves that cause exsolution in magma, which initiates er… ▽ More

    Submitted 29 January, 2017; v1 submitted 17 January, 2017; originally announced January 2017.

  16. arXiv:1605.07142  [pdf, ps, other

    cond-mat.mtrl-sci

    Stability of Solid Electrolyte Interphase Components on Lithium Metal and Reactive Anode Material Surfaces

    Authors: Kevin Leung, Fernando Soto, Kie Hankins, Perla B. Balbuena, Katharine L. Harrison

    Abstract: Lithium ion batteries (LIB) can feature reactive anodes that operate at low potentials, such as lithium metal or silicon, passivated by solid electrolyte interphase (SEI) films. SEI is known to evolve over time as cycling proceeds. In this modeling work, we focus on the stability of two main SEI components, lithium carbonate (Li2CO3) and lithium ethylene dicarbonate (LEDC). Both components are ele… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

    Journal ref: Journal of Physical Chemistry C 120, 6302-6313 (2016)

  17. arXiv:1603.08940  [pdf

    astro-ph.IM astro-ph.EP

    Inflight Radiometric Calibration of New Horizons' Multispectral Visible Imaging Camera (MVIC)

    Authors: C. J. A. Howett, A. H. Parker, C. B. Olkin, D. C. Reuter, K. Ennico, W. M Grundy, A. L. Graps, K. P. Harrison, H. B. Throop, M. W. Buie, J. R. Lovering, S. B. Porter, H. A. Weaver, L. A. Young, S. A. Stern, R. A. Beyer, R. P. Binzell, B. J. Buratti, A. F. Cheng, J. C. Cook, D. P. Cruikshank, C. M. Dalle Ore, A. M. Earle, D. E. Jennings, I. R. Linscott , et al. (13 additional authors not shown)

    Abstract: We discuss two semi-independent calibration techniques used to determine the in-flight radiometric calibration for the New Horizons' Multi-spectral Visible Imaging Camera (MVIC). The first calibration technique compares the observed stellar flux to modeled values. The difference between the two provides a calibration factor that allows the observed flux to be adjusted to the expected levels for al… ▽ More

    Submitted 29 March, 2016; originally announced March 2016.

  18. arXiv:1509.07092  [pdf, other

    cs.CR cs.IT

    Analysis of Short Blocklength Codes for Secrecy

    Authors: Willie K. Harrison, Dinis Sarmento, João P. Vilela, Marco Gomes

    Abstract: In this paper we provide secrecy metrics applicable to physical-layer coding techniques with finite blocklengths over Gaussian and fading wiretap channel models. Our metrics go beyond some of the known practical secrecy measures, such as bit error rate and security gap, so as to make lower bound probabilistic guarantees on error rates over short blocklengths both preceding and following a secrecy… ▽ More

    Submitted 23 September, 2015; originally announced September 2015.

    Comments: 10 pages, 9 figures

  19. arXiv:1307.6360  [pdf

    cs.GR physics.chem-ph

    Electronic Visualisation in Chemistry: From Alchemy to Art

    Authors: Karl Harrison, Jonathan P. Bowen, Alice M. Bowen

    Abstract: Chemists now routinely use software as part of their work. For example, virtual chemistry allows chemical reactions to be simulated. In particular, a selection of software is available for the visualisation of complex 3-dimensional molecular structures. Many of these are very beautiful in their own right. As well as being included as illustrations in academic papers, such visualisations are often… ▽ More

    Submitted 24 July, 2013; originally announced July 2013.

    Comments: 8 pages, 27 figures, EVA London 2013

    ACM Class: I.3.m; J.3; J.5

    Journal ref: EVA London 2013 Conference Proceedings, Electronic Workshops in Computing (eWiC), British Computer Society, 29-31 July 2013

  20. arXiv:1306.4137  [pdf, ps, other

    quant-ph

    Quantum communication without the necessity of quantum memories

    Authors: W. J. Munro, A. M. Stephens, S. J. Devitt, K. A. Harrison, Kae Nemoto

    Abstract: Quantum physics is known to allow for completely new ways to create, manipulate and store information. Quantum communication - the ability to transmit quantum information - is a primitive necessary for any quantum internet. At its core, quantum communication generally requires the formation of entangled links between remote locations. The performance of these links is limited by the classical sign… ▽ More

    Submitted 18 June, 2013; originally announced June 2013.

    Journal ref: Nature Photonics 6, 777 - 781 (2012)

  21. arXiv:1209.3315  [pdf, ps, other

    cs.PF

    Storage Workload Modelling by Hidden Markov Models: Application to FLASH Memory

    Authors: P. G. Harrison, S. K. Harrison, N. M. Patel, S. Zertal

    Abstract: A workload analysis technique is presented that processes data from operation type traces and creates a Hidden Markov Model (HMM) to represent the workload that generated those traces. The HMM can be used to create representative traces for performance models, such as simulators, avoiding the need to repeatedly acquire suitable traces. It can also be used to estimate directly the transition probab… ▽ More

    Submitted 14 September, 2012; originally announced September 2012.

    Comments: 29 pages, 18 figures

    Journal ref: Performance Evaluation 69, 1 (2012), 17-40

  22. Calculation of the electron two-slit experiment using a quantum mechanical variational principle

    Authors: Alan K. Harrison

    Abstract: A nonlocal relativistic variational principle (VP) has recently been proposed as an alternative to the Dirac wave equation of standard quantum mechanics. We apply that principle to the electron two-slit experiment. The detection system is modelled as a screen made of atoms, any one of which can be excited by the incident electron, but we avoid restricting the detection mechanism further. The VP is… ▽ More

    Submitted 2 August, 2012; originally announced August 2012.

    Comments: This is an author-created, un-copyedited version of an article accepted for publication in Physica Scripta T. IOP Publishing Ltd is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The definitive publisher-authenticated version will be available in the near future

    Report number: LA-UR-12-20455

    Journal ref: Phys. Scr. T 151 (2012) 014006

  23. arXiv:1204.3969  [pdf, ps, other

    quant-ph

    Wavefunction collapse via a nonlocal relativistic variational principle

    Authors: Alan K. Harrison

    Abstract: We propose, as an alternative theory of quantum mechanics, a relativistically covariant variational principle (VP) capable of describing both wavefunction collapse and, as an appropriate limiting case, evolution of the wavefunction according to the standard quantum mechanical (SQM) wave equation. This results in a nonlinear, nonlocal, time-symmetric hidden-variable theory; the hidden variable is t… ▽ More

    Submitted 17 April, 2012; originally announced April 2012.

    Report number: LA-UR 12-20152

  24. Physical-Layer Security over Correlated Erasure Channels

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: We explore the additional security obtained by noise at the physical layer in a wiretap channel model setting. Security enhancements at the physical layer have been proposed recently using a secrecy metric based on the degrees of freedom that an attacker has with respect to the sent ciphertext. Prior work focused on cases in which the wiretap channel could be modeled as statistically independent p… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, submitted to ISIT 2011

  25. Coding for Cryptographic Security Enhancement using Stop** Sets

    Authors: W. K. Harrison, J. Almeida, S. W. McLaughlin, J. Barros

    Abstract: In this paper we discuss the ability of channel codes to enhance cryptographic secrecy. Toward that end, we present the secrecy metric of degrees of freedom in an attacker's knowledge of the cryptogram, which is similar to equivocation. Using this notion of secrecy, we show how a specific practical channel coding system can be used to hide information about the ciphertext, thus increasing the diff… ▽ More

    Submitted 15 February, 2011; originally announced February 2011.

    Comments: 13 pages, 8 figures

  26. arXiv:1010.4576  [pdf, other

    quant-ph cond-mat.stat-mech

    Information propagation for interacting particle systems

    Authors: Norbert Schuch, Sarah K. Harrison, Tobias J. Osborne, Jens Eisert

    Abstract: We show that excitations of interacting quantum particles in lattice models always propagate with a finite speed of sound. Our argument is simple yet general and shows that by focusing on the physically relevant observables one can generally expect a bounded speed of information propagation. The argument applies equally to quantum spins, bosons such as in the Bose-Hubbard model, fermions, anyons,… ▽ More

    Submitted 27 January, 2011; v1 submitted 21 October, 2010; originally announced October 2010.

    Comments: 4 pages, 1 figure, minor changes

    Report number: Mittag-Leffler-2010fall

    Journal ref: Phys. Rev. A 84, 032309 (2011)

  27. From quantum fusiliers to high-performance networks

    Authors: W. J. Munro, K. A. Harrison, A. M. Stephens, S. J. Devitt, Kae Nemoto

    Abstract: Our objective was to design a quantum repeater capable of achieving one million entangled pairs per second over a distance of 1000km. We failed, but not by much. In this letter we will describe the series of developments that permitted us to approach our goal. We will describe a mechanism that permits the creation of entanglement between two qubits, connected by fibre, with probability arbitrari… ▽ More

    Submitted 21 October, 2009; originally announced October 2009.

    Comments: 2 figures, Comments welcome

    Journal ref: Nature Photonics, vol 4, pp 792-796 (2010)

  28. Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both… ▽ More

    Submitted 4 May, 2009; originally announced May 2009.

    Comments: 11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)

  29. Ganga: a tool for computational-task management and easy access to Grid resources

    Authors: J. T. Mościcki, F. Brochu, J. Ebke, U. Egede, J. Elmsheuser, K. Harrison, R. W. L. Jones, H. C. Lee, D. Liko, A. Maier, A. Muraru, G. N. Patrick, K. Pajchel, W. Reece, B. H. Samset, M. W. Slater, A. Soroko, C. L. Tan, D. C. Vanderster, M. Williams

    Abstract: In this paper, we present the computational task-management tool Ganga, which allows for the specification, submission, bookkee** and post-processing of computational tasks on a wide set of distributed resources. Ganga has been developed to solve a problem increasingly common in scientific projects, which is that researchers must regularly switch between different processing systems, each with… ▽ More

    Submitted 9 June, 2009; v1 submitted 16 February, 2009; originally announced February 2009.

    Comments: Extended and clarified information on the Grid computing context for Ganga, supported job model etc. Additional minor corrections and clarifications. Updated the author list as agreed with the Ganga team

    ACM Class: C.2.4; H.3.4; J.2; J.3

  30. Physical-Layer Security: Combining Error Control Coding and Cryptography

    Authors: Willie K Harrison, Steven W. McLaughlin

    Abstract: In this paper we consider tandem error control coding and cryptography in the setting of the {\em wiretap channel} due to Wyner. In a typical communications system a cryptographic application is run at a layer above the physical layer and assumes the channel is error free. However, in any real application the channels for friendly users and passive eavesdroppers are not error free and Wyner's wi… ▽ More

    Submitted 16 April, 2009; v1 submitted 2 January, 2009; originally announced January 2009.

    Comments: 12 pages, 5 figures. Submitted and accepted to the International Conference on Communications (ICC) 2009. v2: equivalent to the version that will be published in the conference proceedings. Has some altered notation from version 1 as well as slight changes in the wording to make the paper more readable and easier to understand

    ACM Class: H.1.1; K.6.5

  31. Backlund-Transformation-Related Recursion Operators: Application to the Self-Dual Yang-Mills Equation

    Authors: C. J. Papachristou, B. Kent Harrison

    Abstract: By using the self-dual Yang-Mills (SDYM) equation as an example, we study a method for relating symmetries and recursion operators of two partial differential equations connected to each other by a non-auto-Backlund transformation. We prove the Lie-algebra isomorphism between the symmetries of the SDYM equation and those of the potential SDYM (PSDYM) equation, and we describe the construction of t… ▽ More

    Submitted 20 June, 2023; v1 submitted 5 September, 2008; originally announced September 2008.

    Comments: 16 pages; minor correction; final, published version

    Journal ref: J. Nonlin. Math. Phys., Vol. 17, No. 1 (2010) 35

  32. arXiv:0805.1312  [pdf

    math-ph

    A Method for Constructing a Lax Pair for the Ernst Equation

    Authors: C. J. Papachristou, B. Kent Harrison

    Abstract: A systematic construction of a Lax pair and an infinite set of conservation laws for the Ernst equation is described. The matrix form of this equation is rewritten as a differential ideal of gl(2,R)-valued differential forms, and its symmetry condition is expressed as an exterior equation which is linear in the symmetry characteristic and has the form of a conservation law. By means of a recursi… ▽ More

    Submitted 26 October, 2009; v1 submitted 9 May, 2008; originally announced May 2008.

    Comments: 12 pages; minor corrections

    Journal ref: Electron. J. Theor. Phys. 6, No. 22 (2009) 29 ; http://www.ejtp.biz/articles/ejtpv6i22p29.pdf

  33. Low Cost and Compact Quantum Cryptography

    Authors: J. L. Duligall, M. S. Godfrey, K. A. Harrison, W. J. Munro, J. G. Rarity

    Abstract: We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is sho… ▽ More

    Submitted 3 October, 2006; v1 submitted 28 August, 2006; originally announced August 2006.

    Comments: 18 pages, 9 figures, to be published in New Journal of Physics

    Journal ref: New J. Phys. 8 (2006) 249

  34. The Differential Form Method for Finding Symmetries

    Authors: B. Kent Harrison

    Abstract: This article reviews the use of differential forms and Lie derivatives to find symmetries of differential equations, as originally presented by Harrison and Estabrook, J. Math. Phys., 12 (1971), 653. An outline of the method is given, followed by examples and references to recent papers using the method.

    Submitted 18 October, 2005; originally announced October 2005.

    Comments: Published in SIGMA (Symmetry, Integrability and Geometry: Methods and Applications) at http://www.emis.de/journals/SIGMA/

    MSC Class: 22E70; 34A26; 35A25; 35A30; 53Z05

    Journal ref: SIGMA 1 (2005), 001, 12 pages

  35. arXiv:cs/0306085  [pdf, ps, other

    cs.SE

    GANGA: a user-Grid interface for Atlas and LHCb

    Authors: K. Harrison, W. T. L. P. Lavrijsen, P. Mato, A. Soroko, C. L. Tan, C. E. Tull, N. Brook, R. W. L. Jones

    Abstract: The Gaudi/Athena and Grid Alliance (GANGA) is a front-end for the configuration, submission, monitoring, bookkee**, output collection, and reporting of computing jobs run on a local batch system or on the grid. In particular, GANGA handles jobs that use applications written for the Gaudi software framework shared by the Atlas and LHCb experiments. GANGA exploits the commonality of Gaudi-based… ▽ More

    Submitted 13 June, 2003; originally announced June 2003.

    Comments: 9 pages, 3 figures, CHEP 2003, March 2003, La Jolla, California, PSN TUCT002

    ACM Class: D.2.6

  36. arXiv:cs/0306060  [pdf

    cs.DC

    DIRAC - Distributed Infrastructure with Remote Agent Control

    Authors: N. Brook, A. Bogdanchikov, A. Buckley, J. Closier, U. Egede, M. Frank, D. Galli, M. Gandelman, V. Garonne, C. Gaspar, R. Graciani Diaz, K. Harrison, E. van Herwijnen, A. Khan, S. Klous, I. Korolko, G. Kuznetsov, F. Loverre, U. Marconi, J. P. Palacios, G. N. Patrick, A. Pickford, S. Ponce, V. Romanovski, J. J. Saborido , et al. (5 additional authors not shown)

    Abstract: This paper describes DIRAC, the LHCb Monte Carlo production system. DIRAC has a client/server architecture based on: Compute elements distributed among the collaborating institutes; Databases for production management, bookkee** (the metadata catalogue) and software configuration; Monitoring and cataloguing services for updating and accessing the databases. Locally installed software agents im… ▽ More

    Submitted 12 June, 2003; originally announced June 2003.

    Comments: Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 8 pages, Word, 5 figures. PSN TUAT006

    ACM Class: C.2.4

  37. The Host Galaxy of GRB 990123

    Authors: J. S. Bloom, S. C. Odewahn, S. G. Djorgovski, S. R. Kulkarni F. A. Harrison, C. Koresko, G. Neugebauer, L. Armus, D. A. Frail, R. R. Gal, R. Sari, G. Squires, G. Illingworth, D. Kelson, F. Chaffee, R. Goodrich, M. Feroci, E. Costa, L. Piro, F. Frontera, S. Mao, C. Akerlof, T. A. McKay

    Abstract: We present deep images of the field of gamma-ray burst (GRB) 990123 obtained in a broad-band UV/visible bandpass with the Hubble Space Telescope, and deep near-infrared images obtained with the Keck-I 10-m telescope. Both the HST and Keck images show that the optical transient (OT) is clearly offset by 0.6 arcsec from an extended object, presumably the host galaxy. This galaxy is the most likely… ▽ More

    Submitted 12 February, 1999; v1 submitted 11 February, 1999; originally announced February 1999.

    Comments: Updated references. 12 pages including 3 Postscript figures. Camera- ready reproductions of the figures can be found at http://astro.caltech.edu/~jsb/GRB/grb990123.html

    Journal ref: Astrophys.J. 518 (1999) L1-L4