3,131 research outputs found
Parallel Exhaustive Search without Coordination
We analyze parallel algorithms in the context of exhaustive search over
totally ordered sets. Imagine an infinite list of "boxes", with a "treasure"
hidden in one of them, where the boxes' order reflects the importance of
finding the treasure in a given box. At each time step, a search protocol
executed by a searcher has the ability to peek into one box, and see whether
the treasure is present or not. By equally dividing the workload between them,
searchers can find the treasure times faster than one searcher.
However, this straightforward strategy is very sensitive to failures (e.g.,
crashes of processors), and overcoming this issue seems to require a large
amount of communication. We therefore address the question of designing
parallel search algorithms maximizing their speed-up and maintaining high
levels of robustness, while minimizing the amount of resources for
coordination. Based on the observation that algorithms that avoid communication
are inherently robust, we analyze the best running time performance of
non-coordinating algorithms. Specifically, we devise non-coordinating
algorithms that achieve a speed-up of for two searchers, a speed-up of
for three searchers, and in general, a speed-up of
for any searchers. Thus, asymptotically, the speed-up is only four
times worse compared to the case of full-coordination, and our algorithms are
surprisingly simple and hence applicable. Moreover, these bounds are tight in a
strong sense as no non-coordinating search algorithm can achieve better
speed-ups. Overall, we highlight that, in faulty contexts in which coordination
between the searchers is technically difficult to implement, intrusive with
respect to privacy, and/or costly in term of resources, it might well be worth
giving up on coordination, and simply run our non-coordinating exhaustive
search algorithms
Abrupt transition in quasiparticle dynamics at optimal doping in a cuprate superconductor system
We report time-resolved measurements of the photoinduced change in
reflectivity, Delta R, in the Bi2Sr2Ca(1-y)Dy(y)Cu2O(8+delta) (BSCCO) system of
cuprate superconductors as a function of hole concentration. We find that the
kinetics of quasiparticle decay and the sign of Delta R both change abruptly
where the superconducting transition temperature Tc is maximal. These
coincident changes suggest that a sharp transition in quasiparticle dynamics
takes place precisely at optimal doping in the BSCCO system.Comment: 10 pages, 4 figure
Consider melatonin for migraine prevention
An effective migraine prevention alternative with minimal adverse effects Melatonin is an accessible and affordable option for preventing migraine headaches in chronic sufferers
Determination of the spin-flip time in ferromagnetic SrRuO3 from time-resolved Kerr measurements
We report time-resolved Kerr effect measurements of magnetization dynamics in
ferromagnetic SrRuO3. We observe that the demagnetization time slows
substantially at temperatures within 15K of the Curie temperature, which is ~
150K. We analyze the data with a phenomenological model that relates the
demagnetization time to the spin flip time. In agreement with our observations
the model yields a demagnetization time that is inversely proportional to T-Tc.
We also make a direct comparison of the spin flip rate and the Gilbert damping
coefficient showing that their ratio very close to kBTc, indicating a common
origin for these phenomena
Observation of ferromagnetic resonance in strontium ruthenate (SrRuO3)
We report the observation of ferromagnetic resonance (FMR) in SrRuO3 using
the time-resolved magneto-optical Kerr effect. The FMR oscillations in the
time-domain appear in response to a sudden, optically induced change in the
direction of easy-axis anistropy. The high FMR frequency, 250 GHz, and large
Gilbert damping parameter, alpha ~ 1, are consistent with strong spin-orbit
coupling. We find that the parameters associated with the magnetization
dynamics, including alpha, have a non-monotonic temperature dependence,
suggestive of a link to the anomalous Hall effect.Comment: submitted to Phys. Rev. Let
Selective interlayer ferromagnetic coupling between the Cu spins in YBa Cu O grown on top of La Ca MnO
Studies to date on ferromagnet/d-wave superconductor heterostructures focus
mainly on the effects at or near the interfaces while the response of bulk
properties to heterostructuring is overlooked. Here we use resonant soft x-ray
scattering spectroscopy to reveal a novel c-axis ferromagnetic coupling between
the in-plane Cu spins in YBa Cu O (YBCO) superconductor when it
is grown on top of ferromagnetic La Ca MnO (LCMO) manganite
layer. This coupling, present in both normal and superconducting states of
YBCO, is sensitive to the interfacial termination such that it is only observed
in bilayers with MnO_2but not with La Ca interfacial
termination. Such contrasting behaviors, we propose, are due to distinct
energetic of CuO chain and CuO plane at the La Ca and
MnO terminated interfaces respectively, therefore influencing the transfer
of spin-polarized electrons from manganite to cuprate differently. Our findings
suggest that the superconducting/ferromagnetic bilayers with proper interfacial
engineering can be good candidates for searching the theorized
Fulde-Ferrel-Larkin-Ovchinnikov (FFLO) state in cuprates and studying the
competing quantum orders in highly correlated electron systems.Comment: Please note the change of the title. Text might be slightly different
from the published versio
Modelowanie Rozkladu Pól Magnetycznych Sluzacych Do Prowadzenia Wiazki Plazmy Powstajacej W Wyladowaniach Lukowych
CacheZoom: How SGX Amplifies The Power of Cache Attacks
In modern computing environments, hardware resources are commonly shared, and
parallel computation is widely used. Parallel tasks can cause privacy and
security problems if proper isolation is not enforced. Intel proposed SGX to
create a trusted execution environment within the processor. SGX relies on the
hardware, and claims runtime protection even if the OS and other software
components are malicious. However, SGX disregards side-channel attacks. We
introduce a powerful cache side-channel attack that provides system adversaries
a high resolution channel. Our attack tool named CacheZoom is able to virtually
track all memory accesses of SGX enclaves with high spatial and temporal
precision. As proof of concept, we demonstrate AES key recovery attacks on
commonly used implementations including those that were believed to be
resistant in previous scenarios. Our results show that SGX cannot protect
critical data sensitive computations, and efficient AES key recovery is
possible in a practical environment. In contrast to previous works which
require hundreds of measurements, this is the first cache side-channel attack
on a real system that can recover AES keys with a minimal number of
measurements. We can successfully recover AES keys from T-Table based
implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems
(CHES '17
- …
