ترغب بنشر مسار تعليمي؟ اضغط هنا

Many-body effects resulting from strong electron-electron and electron-phonon interactions play a significant role in graphene physics. We report on their manifestation in low B field magneto-phonon resonances in high quality exfoliated single-layer and bilayer graphene encapsulated in hexagonal boron nitride. These resonances allow us to extract characteristic effective Fermi velocities, as high as $1.20 times 10^6$ m/s, for the observed dressed Landau level transitions, as well as the broadening of the resonances, which increases with Landau level index.
Confocal Raman spectroscopy is a versatile, non-invasive investigation tool and a major workhorse for graphene characterization. Here we show that the experimentally observed Raman 2D line width is a measure of nanometer-scale strain variations in gr aphene. By investigating the relation between the G and 2D line at high magnetic fields we find that the 2D line width contains valuable information on nanometer-scale flatness and lattice deformations of graphene, making it a good quantity for classifying the structural quality of graphene even at zero magnetic field.
802.11 device fingerprinting is the action of characterizing a target device through its wireless traffic. This results in a signature that may be used for identification, network monitoring or intrusion detection. The fingerprinting method can be ac tive by sending traffic to the target device, or passive by just observing the traffic sent by the target device. Many passive fingerprinting methods rely on the observation of one particular network feature, such as the rate switching behavior or the transmission pattern of probe requests. In this work, we evaluate a set of global wireless network parameters with respect to their ability to identify 802.11 devices. We restrict ourselves to parameters that can be observed passively using a standard wireless card. We evaluate these parameters for two different tests: i) the identification test that returns one single result being the closest match for the target device, and ii) the similarity test that returns a set of devices that are close to the target devices. We find that the network parameters transmission time and frame inter-arrival time perform best in comparison to the other network parameters considered. Finally, we focus on inter-arrival times, the most promising parameter for device identification, and show its dependency from several device characteristics such as the wireless card and driver but also running applications.
Using a modified version of jeu de taquin, Novelli, Pak and Stoyanovskii gave a bijective proof of the hook-length formula for counting standard Young tableaux of fixed shape. In this paper we consider a natural extension of jeu de taquin to arbitrar y posets. Given a poset P, jeu de taquin defines a map from the set of bijective labelings of the poset elements with ${1,2,...,|P|}$ to the set of linear extensions of the poset. One question of particular interest is for which posets this map yields each linear extension equally often. We analyze the double-tailed diamond poset $D_{m,n}$ and show that uniform distribution is obtained if and only if $D_{m,n}$ is d-complete. Furthermore, we observe that the extended hook-length formula for counting linear extensions on d-complete posets provides a combinatorial answer to a seemingly unrelated question, namely: Given a uniformly random standard Young tableau of fixed shape, what is the expected value of the left-most entry in the second row?
In this paper, we study cache policies for cloud-based caching. Cloud-based caching uses cloud storage services such as Amazon S3 as a cache for data items that would have been recomputed otherwise. Cloud-based caching departs from classical caching: cloud resources are potentially infinite and only paid when used, while classical caching relies on a fixed storage capacity and its main monetary cost comes from the initial investment. To deal with this new context, we design and evaluate a new caching policy that minimizes the overall cost of a cloud-based system. The policy takes into account the frequency of consumption of an item and the cloud cost model. We show that this policy is easier to operate, that it scales with the demand and that it outperforms classical policies managing a fixed capacity.
Growth of large-scale graphene is still accompanied by imperfections. By means of a four-tip STM/SEM the local structure of graphene grown on SiC(0001) was correlated with scanning electron microscope images and spatially resolved transport measureme nts. The systematic variation of probe spacings and substrate temperature has clearly revealed two-dimensional transport regimes of Anderson localization as well as of diffusive transport. The detailed analysis of the temperature dependent data demonstrates that the local on-top nano-sized contacts do not induce significant strain to the epitaxial graphene films.
Trusted timestamping consists in proving that certain data existed at a particular point in time. Existing timestamping methods require either a centralized and dedicated trusted service or the collaboration of other participants using the timestampi ng service. We propose a novel trusted timestamping scheme, called DNStamp, that does not require a dedicated service nor collaboration between participants. DNStamp produces shortlived timestamps with a validity period of several days. The generation and verification involves a large number of Domain Name System cache resolvers, thus removing any single point of failure and any single point of trust. Any host with Internet access may request or verify a timestamp, with no need to register to any timestamping service. We provide a full description and analysis of DNStamp. We analyze the security against various adversaries and show resistance to forward-dating, back-dating and erasure attacks. Experiments with our implementation of DNStamp show that one can set and then reliably verify timestamps even under continuous attack conditions.
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا