3,131 research outputs found

    Parallel Exhaustive Search without Coordination

    Get PDF
    We analyze parallel algorithms in the context of exhaustive search over totally ordered sets. Imagine an infinite list of "boxes", with a "treasure" hidden in one of them, where the boxes' order reflects the importance of finding the treasure in a given box. At each time step, a search protocol executed by a searcher has the ability to peek into one box, and see whether the treasure is present or not. By equally dividing the workload between them, kk searchers can find the treasure kk times faster than one searcher. However, this straightforward strategy is very sensitive to failures (e.g., crashes of processors), and overcoming this issue seems to require a large amount of communication. We therefore address the question of designing parallel search algorithms maximizing their speed-up and maintaining high levels of robustness, while minimizing the amount of resources for coordination. Based on the observation that algorithms that avoid communication are inherently robust, we analyze the best running time performance of non-coordinating algorithms. Specifically, we devise non-coordinating algorithms that achieve a speed-up of 9/89/8 for two searchers, a speed-up of 4/34/3 for three searchers, and in general, a speed-up of k4(1+1/k)2\frac{k}{4}(1+1/k)^2 for any k1k\geq 1 searchers. Thus, asymptotically, the speed-up is only four times worse compared to the case of full-coordination, and our algorithms are surprisingly simple and hence applicable. Moreover, these bounds are tight in a strong sense as no non-coordinating search algorithm can achieve better speed-ups. Overall, we highlight that, in faulty contexts in which coordination between the searchers is technically difficult to implement, intrusive with respect to privacy, and/or costly in term of resources, it might well be worth giving up on coordination, and simply run our non-coordinating exhaustive search algorithms

    Abrupt transition in quasiparticle dynamics at optimal doping in a cuprate superconductor system

    Full text link
    We report time-resolved measurements of the photoinduced change in reflectivity, Delta R, in the Bi2Sr2Ca(1-y)Dy(y)Cu2O(8+delta) (BSCCO) system of cuprate superconductors as a function of hole concentration. We find that the kinetics of quasiparticle decay and the sign of Delta R both change abruptly where the superconducting transition temperature Tc is maximal. These coincident changes suggest that a sharp transition in quasiparticle dynamics takes place precisely at optimal doping in the BSCCO system.Comment: 10 pages, 4 figure

    Consider melatonin for migraine prevention

    Get PDF
    An effective migraine prevention alternative with minimal adverse effects Melatonin is an accessible and affordable option for preventing migraine headaches in chronic sufferers

    Determination of the spin-flip time in ferromagnetic SrRuO3 from time-resolved Kerr measurements

    Get PDF
    We report time-resolved Kerr effect measurements of magnetization dynamics in ferromagnetic SrRuO3. We observe that the demagnetization time slows substantially at temperatures within 15K of the Curie temperature, which is ~ 150K. We analyze the data with a phenomenological model that relates the demagnetization time to the spin flip time. In agreement with our observations the model yields a demagnetization time that is inversely proportional to T-Tc. We also make a direct comparison of the spin flip rate and the Gilbert damping coefficient showing that their ratio very close to kBTc, indicating a common origin for these phenomena

    Observation of ferromagnetic resonance in strontium ruthenate (SrRuO3)

    Get PDF
    We report the observation of ferromagnetic resonance (FMR) in SrRuO3 using the time-resolved magneto-optical Kerr effect. The FMR oscillations in the time-domain appear in response to a sudden, optically induced change in the direction of easy-axis anistropy. The high FMR frequency, 250 GHz, and large Gilbert damping parameter, alpha ~ 1, are consistent with strong spin-orbit coupling. We find that the parameters associated with the magnetization dynamics, including alpha, have a non-monotonic temperature dependence, suggestive of a link to the anomalous Hall effect.Comment: submitted to Phys. Rev. Let

    Selective interlayer ferromagnetic coupling between the Cu spins in YBa2_2 Cu3_3 O7x_{7-x} grown on top of La0.7_{0.7} Ca0.3_{0.3} MnO3_3

    Full text link
    Studies to date on ferromagnet/d-wave superconductor heterostructures focus mainly on the effects at or near the interfaces while the response of bulk properties to heterostructuring is overlooked. Here we use resonant soft x-ray scattering spectroscopy to reveal a novel c-axis ferromagnetic coupling between the in-plane Cu spins in YBa2_2 Cu3_3 O7x_{7-x} (YBCO) superconductor when it is grown on top of ferromagnetic La0.7_{0.7} Ca0.3_{0.3} MnO3_3 (LCMO) manganite layer. This coupling, present in both normal and superconducting states of YBCO, is sensitive to the interfacial termination such that it is only observed in bilayers with MnO_2but not with La0.7_{0.7} Ca0.3_{0.3} interfacial termination. Such contrasting behaviors, we propose, are due to distinct energetic of CuO chain and CuO2_2 plane at the La0.7_{0.7} Ca0.3_{0.3} and MnO2_2 terminated interfaces respectively, therefore influencing the transfer of spin-polarized electrons from manganite to cuprate differently. Our findings suggest that the superconducting/ferromagnetic bilayers with proper interfacial engineering can be good candidates for searching the theorized Fulde-Ferrel-Larkin-Ovchinnikov (FFLO) state in cuprates and studying the competing quantum orders in highly correlated electron systems.Comment: Please note the change of the title. Text might be slightly different from the published versio

    CacheZoom: How SGX Amplifies The Power of Cache Attacks

    Get PDF
    In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.Comment: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17
    corecore