ﻻ يوجد ملخص باللغة العربية
We use modular invariance to derive constraints on the spectrum of warped conformal field theories (WCFTs) --- nonrelativistic quantum field theories described by a chiral Virasoro and $U(1)$ Kac-Moody algebra. We focus on holographic WCFTs and interpret our results in the simplest holographic set up: three dimensional gravity with Compere-Song-Strominger boundary conditions. Holographic WCFTs feature a negative $U(1)$ level that is responsible for negative norm descendant states. Despite the violation of unitarity we show that the modular bootstrap is still viable provided the (Virasoro-Kac-Moody) primaries carry positive norm. In particular, we show that holographic WCFTs must feature either primary states with negative norm or states with imaginary $U(1)$ charge, the latter of which have a natural holographic interpretation. For large central charge and arbitrary level, we show that the first excited primary state in any WCFT satisfies the Hellerman bound. Moreover, when the level is positive we point out that known bounds for CFTs with internal $U(1)$ symmetries readily apply to unitary WCFTs.
Cost-based query optimizers remain one of the most important components of database management systems for analytic workloads. Though modern optimizers select plans close to optimal performance in the common case, a small number of queries are an ord
Star-formation rates (SFR) of disk galaxies strongly correlate with stellar mass, with a small dispersion in SSFR at fixed mass, sigma~0.3 dex. With such small scatter this star-formation main sequence (SFMS) has been interpreted as deterministic and
Adversarial training, a special case of multi-objective optimization, is an increasingly prevalent machine learning technique: some of its most notable applications include GAN-based generative modeling and self-play techniques in reinforcement learn
This paper is a `spiritual child of the 2005 lecture notes Kindergarten Quantum Mechanics, which showed how a simple, pictorial extension of Dirac notation allowed several quantum features to be easily expressed and derived, using language even a kin
In an adversarial environment, a hostile player performing a task may behave like a non-hostile one in order not to reveal its identity to an opponent. To model such a scenario, we define identity concealment games: zero-sum stochastic reachability g