-
Graph Theory for Consent Management: A New Approach for Complex Data Flows
Authors:
Dorota Filipczuk,
Enrico H. Gerding,
George Konstantinidis
Abstract:
Through legislation and technical advances users gain more control over how their data is processed, and they expect online services to respect their privacy choices and preferences. However, data may be processed for many different purposes by several layers of algorithms that create complex data workflows. To date, there is no existing approach to automatically satisfy fine-grained privacy const…
▽ More
Through legislation and technical advances users gain more control over how their data is processed, and they expect online services to respect their privacy choices and preferences. However, data may be processed for many different purposes by several layers of algorithms that create complex data workflows. To date, there is no existing approach to automatically satisfy fine-grained privacy constraints of a user in a way which optimises the service provider's gains from processing. In this article, we propose a solution to this problem by modelling a data flow as a graph. User constraints and processing purposes are pairs of vertices which need to be disconnected in this graph. In general, this problem is NP-hard, thus, we propose several heuristics and algorithms. We discuss the optimality versus efficiency of our algorithms and evaluate them using synthetically generated data. On the practical side, our algorithms can provide nearly optimal solutions for tens of constraints and graphs of thousands of nodes, in a few seconds.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
A Review of SHACL: From Data Validation to Schema Reasoning for RDF Graphs
Authors:
Paolo Pareti,
George Konstantinidis
Abstract:
We present an introduction and a review of the Shapes Constraint Language (SHACL), the W3C recommendation language for validating RDF data. A SHACL document describes a set of constraints on RDF nodes, and a graph is valid with respect to the document if its nodes satisfy these constraints. We revisit the basic concepts of the language, its constructs and components and their interaction. We revie…
▽ More
We present an introduction and a review of the Shapes Constraint Language (SHACL), the W3C recommendation language for validating RDF data. A SHACL document describes a set of constraints on RDF nodes, and a graph is valid with respect to the document if its nodes satisfy these constraints. We revisit the basic concepts of the language, its constructs and components and their interaction. We review the different formal frameworks used to study this language and the different semantics proposed. We examine a number of related problems, from containment and satisfiability to the interaction of SHACL with inference rules, and exhibit how different modellings of the language are useful for different problems. We also cover practical aspects of SHACL, discussing its implementations and state of adoption, to present a holistic review useful to practitioners and theoreticians alike.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Satisfiability and Containment of Recursive SHACL
Authors:
Paolo Pareti,
George Konstantinidis,
Fabio Mogavero
Abstract:
The Shapes Constraint Language (SHACL) is the recent W3C recommendation language for validating RDF data, by verifying certain shapes on graphs. Previous work has largely focused on the validation problem and the standard decision problems of satisfiability and containment, crucial for design and optimisation purposes, have only been investigated for simplified versions of SHACL. Moreover, the SHA…
▽ More
The Shapes Constraint Language (SHACL) is the recent W3C recommendation language for validating RDF data, by verifying certain shapes on graphs. Previous work has largely focused on the validation problem and the standard decision problems of satisfiability and containment, crucial for design and optimisation purposes, have only been investigated for simplified versions of SHACL. Moreover, the SHACL specification does not define the semantics of recursively-defined constraints, which led to several alternative recursive semantics being proposed in the literature. The interaction between these different semantics and important decision problems has not been investigated yet. In this article we provide a comprehensive study of the different features of SHACL, by providing a translation to a new first-order language, called SCL, that precisely captures the semantics of SHACL. We also present MSCL, a second-order extension of SCL, which allows us to define, in a single formal logic framework, the main recursive semantics of SHACL. Within this language we also provide an effective treatment of filter constraints which are often neglected in the related literature. Using this logic we provide a detailed map of (un)decidability and complexity results for the satisfiability and containment decision problems for different SHACL fragments. Notably, we prove that both problems are undecidable for the full language, but we present decidable combinations of interesting features, even in the face of recursion.
△ Less
Submitted 14 June, 2022; v1 submitted 30 August, 2021;
originally announced August 2021.
-
SHACL Satisfiability and Containment (Extended Paper)
Authors:
Paolo Pareti,
George Konstantinidis,
Fabio Mogavero,
Timothy J. Norman
Abstract:
The Shapes Constraint Language (SHACL) is a recent W3C recommendation language for validating RDF data. Specifically, SHACL documents are collections of constraints that enforce particular shapes on an RDF graph. Previous work on the topic has provided theoretical and practical results for the validation problem, but did not consider the standard decision problems of satisfiability and containment…
▽ More
The Shapes Constraint Language (SHACL) is a recent W3C recommendation language for validating RDF data. Specifically, SHACL documents are collections of constraints that enforce particular shapes on an RDF graph. Previous work on the topic has provided theoretical and practical results for the validation problem, but did not consider the standard decision problems of satisfiability and containment, which are crucial for verifying the feasibility of the constraints and important for design and optimization purposes. In this paper, we undertake a thorough study of different features of non-recursive SHACL by providing a translation to a new first-order language, called SCL, that precisely captures the semantics of SHACL w.r.t. satisfiability and containment. We study the interaction of SHACL features in this logic and provide the detailed map of decidability and complexity results of the aforementioned decision problems for different SHACL sublanguages. Notably, we prove that both problems are undecidable for the full language, but we present decidable combinations of interesting features.
△ Less
Submitted 5 November, 2020; v1 submitted 31 August, 2020;
originally announced September 2020.
-
Some Game Theoretic Remarks on Two-Player Generalized Cops and Robbers Games
Authors:
Athanasios Kehagias,
Georgios Konstantinidis
Abstract:
In this paper we study the two-player generalized Cops and Robber (GCR) games introduced by Bonato and MacGillivray. Our main goal is to present a full, self-contained game theoretic analysis of such games.
In this paper we study the two-player generalized Cops and Robber (GCR) games introduced by Bonato and MacGillivray. Our main goal is to present a full, self-contained game theoretic analysis of such games.
△ Less
Submitted 19 November, 2020; v1 submitted 29 July, 2020;
originally announced July 2020.
-
A Policy Editor for Semantic Sensor Networks
Authors:
Paolo Pareti,
George Konstantinidis,
Timothy J. Norman
Abstract:
An important use of sensors and actuator networks is to comply with health and safety policies in hazardous environments. In order to deal with increasingly large and dynamic environments, and to quickly react to emergencies, tools are needed to simplify the process of translating high-level policies into executable queries and rules. We present a framework to produce such tools, which uses rules…
▽ More
An important use of sensors and actuator networks is to comply with health and safety policies in hazardous environments. In order to deal with increasingly large and dynamic environments, and to quickly react to emergencies, tools are needed to simplify the process of translating high-level policies into executable queries and rules. We present a framework to produce such tools, which uses rules to aggregate low-level sensor data, described using the Semantic Sensor Network Ontology, into more useful and actionable abstractions. Using the schema of the underlying data sources as an input, we automatically generate abstractions which are relevant to the use case at hand. In this demonstration we present a policy editor tool and a simulation on which policies can be tested.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
SHACL Constraints with Inference Rules
Authors:
Paolo Pareti,
George Konstantinidis,
Timothy J. Norman,
Murat Şensoy
Abstract:
The Shapes Constraint Language (SHACL) has been recently introduced as a W3C recommendation to define constraints that can be validated against RDF graphs. Interactions of SHACL with other Semantic Web technologies, such as ontologies or reasoners, is a matter of ongoing research. In this paper we study the interaction of a subset of SHACL with inference rules expressed in datalog. On the one hand…
▽ More
The Shapes Constraint Language (SHACL) has been recently introduced as a W3C recommendation to define constraints that can be validated against RDF graphs. Interactions of SHACL with other Semantic Web technologies, such as ontologies or reasoners, is a matter of ongoing research. In this paper we study the interaction of a subset of SHACL with inference rules expressed in datalog. On the one hand, SHACL constraints can be used to define a "schema" for graph datasets. On the other hand, inference rules can lead to the discovery of new facts that do not match the original schema. Given a set of SHACL constraints and a set of datalog rules, we present a method to detect which constraints could be violated by the application of the inference rules on some graph instance of the schema, and update the original schema, i.e, the set of SHACL constraints, in order to capture the new facts that can be inferred. We provide theoretical and experimental results of the various components of our approach.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
On positionality of trigger strategies Nash Equilibria in SCAR
Authors:
George Konstantinidis,
Athanasios Kehagias
Abstract:
We study the positionality of \emph{trigger strategies} Nash equilibria $\overlineσ$ for the $N$-player SCAR games $Γ_{N}(G|s_{0},γ,\varepsilon)$ (with $N\geq3$). Our study is exhaustive with respect to types of graphs $G$, initial states $s_{0}$ and values of $N,γ,\varepsilon$. We conclude that in the majority of cases, profiles $\overlineσ$ are nonpositional. Whenever $\overlineσ$ are positional…
▽ More
We study the positionality of \emph{trigger strategies} Nash equilibria $\overlineσ$ for the $N$-player SCAR games $Γ_{N}(G|s_{0},γ,\varepsilon)$ (with $N\geq3$). Our study is exhaustive with respect to types of graphs $G$, initial states $s_{0}$ and values of $N,γ,\varepsilon$. We conclude that in the majority of cases, profiles $\overlineσ$ are nonpositional. Whenever $\overlineσ$ are positional a key role is played by paths and the $\varepsilon$, $γ$ values (especially whether $\varepsilon>0$ or not). A crucial concept in our analysis is the \emph{state cop number}, which is first introduced in the current paper.
△ Less
Submitted 25 October, 2019;
originally announced October 2019.
-
Rule Applicability on RDF Triplestore Schemas
Authors:
Paolo Pareti,
George Konstantinidis,
Timothy J. Norman,
Murat Şensoy
Abstract:
Rule-based systems play a critical role in health and safety, where policies created by experts are usually formalised as rules. When dealing with increasingly large and dynamic sources of data, as in the case of Internet of Things (IoT) applications, it becomes important not only to efficiently apply rules, but also to reason about their applicability on datasets confined by a certain schema. In…
▽ More
Rule-based systems play a critical role in health and safety, where policies created by experts are usually formalised as rules. When dealing with increasingly large and dynamic sources of data, as in the case of Internet of Things (IoT) applications, it becomes important not only to efficiently apply rules, but also to reason about their applicability on datasets confined by a certain schema. In this paper we define the notion of a triplestore schema which models a set of RDF graphs. Given a set of rules and such a schema as input we propose a method to determine rule applicability and produce output schemas. Output schemas model the graphs that would be obtained by running the rules on the graph models of the input schema. We present two approaches: one based on computing a canonical (critical) instance of the schema, and a novel approach based on query rewriting. We provide theoretical, complexity and evaluation results that show the superior efficiency of our rewriting approach.
△ Less
Submitted 2 July, 2019;
originally announced July 2019.
-
Dataset search: a survey
Authors:
Adriane Chapman,
Elena Simperl,
Laura Koesten,
George Konstantinidis,
Luis-Daniel Ibáñez-Gonzalez,
Emilia Kacprzak,
Paul Groth
Abstract:
Generating value from data requires the ability to find, access and make sense of datasets. There are many efforts underway to encourage data sharing and reuse, from scientific publishers asking authors to submit data alongside manuscripts to data marketplaces, open data portals and data communities. Google recently beta released a search service for datasets, which allows users to discover data s…
▽ More
Generating value from data requires the ability to find, access and make sense of datasets. There are many efforts underway to encourage data sharing and reuse, from scientific publishers asking authors to submit data alongside manuscripts to data marketplaces, open data portals and data communities. Google recently beta released a search service for datasets, which allows users to discover data stored in various online repositories via keyword queries. These developments foreshadow an emerging research field around dataset search or retrieval that broadly encompasses frameworks, methods and tools that help match a user data need against a collection of datasets. Here, we survey the state of the art of research and commercial systems in dataset retrieval. We identify what makes dataset search a research field in its own right, with unique challenges and methods and highlight open problems. We look at approaches and implementations from related areas dataset search is drawing upon, including information retrieval, databases, entity-centric and tabular search in order to identify possible paths to resolve these open problems as well as immediate next steps that will take the field forward.
△ Less
Submitted 3 January, 2019;
originally announced January 2019.
-
The Bag Semantics of Ontology-Based Data Access
Authors:
Charalampos Nikolaou,
Egor V. Kostylev,
George Konstantinidis,
Mark Kaminski,
Bernardo Cuenca Grau,
Ian Horrocks
Abstract:
Ontology-based data access (OBDA) is a popular approach for integrating and querying multiple data sources by means of a shared ontology. The ontology is linked to the sources using mappings, which assign views over the data to ontology predicates. Motivated by the need for OBDA systems supporting database-style aggregate queries, we propose a bag semantics for OBDA, where duplicate tuples in the…
▽ More
Ontology-based data access (OBDA) is a popular approach for integrating and querying multiple data sources by means of a shared ontology. The ontology is linked to the sources using mappings, which assign views over the data to ontology predicates. Motivated by the need for OBDA systems supporting database-style aggregate queries, we propose a bag semantics for OBDA, where duplicate tuples in the views defined by the mappings are retained, as is the case in standard databases. We show that bag semantics makes conjunctive query answering in OBDA coNP-hard in data complexity. To regain tractability, we consider a rather general class of queries and show its rewritability to a generalisation of the relational calculus to bags.
△ Less
Submitted 19 May, 2017;
originally announced May 2017.
-
Selfish Cops and Active Robber: Multi-Player Pursuit Evasion on Graphs
Authors:
G. Konstantinidis,
Ath. Kehagias
Abstract:
We introduce and study the game of "Selfish Cops and Active Robber" (SCAR) which can be seen as an multiplayer variant of the "classic" two-player Cops and Robbers (CR) game. In classic CR all cops are controlled by a single player, who has no preference over which cop captures the robber. In SCAR, on the other hand, each of N-1 cops is controlled by a separate player, and a single robber is contr…
▽ More
We introduce and study the game of "Selfish Cops and Active Robber" (SCAR) which can be seen as an multiplayer variant of the "classic" two-player Cops and Robbers (CR) game. In classic CR all cops are controlled by a single player, who has no preference over which cop captures the robber. In SCAR, on the other hand, each of N-1 cops is controlled by a separate player, and a single robber is controlled by the N-th player; and the capturing cop player receives a higher reward than the non-capturing ones. Consequently, SCAR is an N-player pursuit game on graphs, in which each cop player has an increased motive to be the one who captures the robber. The focus of our study is the existence and properties of SCAR Nash Equilibria (NE). In particular, we prove that SCAR always has one NE in deterministic positional strategies and (for N greater than two) another in deterministic nonpositional strategies. Furthermore, we study conditions which, at equilibrium, guarantee either capture or escape of the robber and show that (because of the antagonism between the "selfish" cop players) the robber may, in certain SCAR configurations, be captured later than he would be in classic CR, or even not captured at all. Finally we define the selfish cop number of a graph and study its connection to the classic cop number.
△ Less
Submitted 12 September, 2018; v1 submitted 22 March, 2017;
originally announced March 2017.
-
Late-time Structure of the Bunch-Davies FRW Wavefunction
Authors:
George Konstantinidis,
Raghu Mahajan,
Edgar Shaghoulian
Abstract:
In this short note we organize a perturbation theory for the Bunch-Davies wavefunction in flat, accelerating cosmologies. The calculational technique avoids the in-in formalism and instead uses an analytic continuation from Euclidean signature. We will consider both massless and conformally coupled self-interacting scalars. These calculations explicitly illustrate two facts. The first is that IR d…
▽ More
In this short note we organize a perturbation theory for the Bunch-Davies wavefunction in flat, accelerating cosmologies. The calculational technique avoids the in-in formalism and instead uses an analytic continuation from Euclidean signature. We will consider both massless and conformally coupled self-interacting scalars. These calculations explicitly illustrate two facts. The first is that IR divergences get sharper as the acceleration slows. The second is that UV-divergent contact terms in the Euclidean computation can contribute to the absolute value of the wavefunction in Lorentzian signature. Here UV divergent refers to terms involving inverse powers of the radial cutoff in the Euclidean computation. In Lorentzian signature such terms encode physical time dependence of the wavefunction.
△ Less
Submitted 22 August, 2016;
originally announced August 2016.
-
Selfish Cops and Passive Robber: Qualitative Games
Authors:
Athanasios Kehagias,
Georgios Konstantinidis
Abstract:
Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a "passive robber". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study seque…
▽ More
Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a "passive robber". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study sequential and concurrent versions of the SCPR game. For both cases we prove the existence of value and optimal strategies and present algorithms for the computation of these.
△ Less
Submitted 19 November, 2016; v1 submitted 19 July, 2016;
originally announced July 2016.
-
Simultaneously Moving Cops and Robbers
Authors:
Georgios Konstantinidis,
Athanasios Kehagias
Abstract:
In this paper we study the concurrent cops and robber (CCCR) game. CCCR follows the same rules as the classical, turn-based game, except for the fact that the players move simultaneously. The cops' goal is to capture the robber and the concurrent cop number of a graph is defined the minimum number of cops which guarantees capture. For the variant in which it it required to capture the robber in th…
▽ More
In this paper we study the concurrent cops and robber (CCCR) game. CCCR follows the same rules as the classical, turn-based game, except for the fact that the players move simultaneously. The cops' goal is to capture the robber and the concurrent cop number of a graph is defined the minimum number of cops which guarantees capture. For the variant in which it it required to capture the robber in the shortest possible time, we let time to capture be the payoff function of CCCR; the (game theoretic) value of CCCR is the optimal capture time and (cop and robber) time optimal strategies are the ones which achieve the value. In this paper we prove the following.
(1) For every graph G, the concurrent cop number is equal to the "classical" cop number.
(2) For every graph G, CCCR has a value, the cops have an optimal strategy and, for every epsilon>0, the robber has an epsilon-optimal strategy.
△ Less
Submitted 11 June, 2015;
originally announced June 2015.
-
Cops and Robbers, Game Theory and Zermelo's Early Results
Authors:
Athanasios Kehagias,
Georgios Konstantinidis
Abstract:
We provide a game theoretic framework for the game of cops and robbers (CR). Within this framework we study certain assumptions which underlie the concepts of optimal strategies and capture time. We also point out a connection of these concepts to early work by Zermelo and D. Konig. Finally, we discuss the relationship between CR and related pursuit games to reachability games.
We provide a game theoretic framework for the game of cops and robbers (CR). Within this framework we study certain assumptions which underlie the concepts of optimal strategies and capture time. We also point out a connection of these concepts to early work by Zermelo and D. Konig. Finally, we discuss the relationship between CR and related pursuit games to reachability games.
△ Less
Submitted 7 July, 2014;
originally announced July 2014.
-
Late-time Structure of the Bunch-Davies De Sitter Wavefunction
Authors:
Dionysios Anninos,
Tarek Anous,
Daniel Z. Freedman,
George Konstantinidis
Abstract:
We examine the late time behavior of the Bunch-Davies wavefunction for interacting light fields in a de Sitter background. We use perturbative techniques developed in the framework of AdS/CFT, and analytically continue to compute tree and loop level contributions to the Bunch-Davies wavefunction. We consider self-interacting scalars of general mass, but focus especially on the massless and conform…
▽ More
We examine the late time behavior of the Bunch-Davies wavefunction for interacting light fields in a de Sitter background. We use perturbative techniques developed in the framework of AdS/CFT, and analytically continue to compute tree and loop level contributions to the Bunch-Davies wavefunction. We consider self-interacting scalars of general mass, but focus especially on the massless and conformally coupled cases. We show that certain contributions grow logarithmically in conformal time both at tree and loop level. We also consider gauge fields and gravitons. The four-dimensional Fefferman-Graham expansion of classical asymptotically de Sitter solutions is used to show that the wavefunction contains no logarithmic growth in the pure graviton sector at tree level. Finally, assuming a holographic relation between the wavefunction and the partition function of a conformal field theory, we interpret the logarithmic growths in the language of conformal field theory.
△ Less
Submitted 1 December, 2015; v1 submitted 20 June, 2014;
originally announced June 2014.
-
Quantum coherence in momentum space of light-matter condensates
Authors:
C. Antón,
G. Tosi,
M. D. Martín,
Z. Hatzopoulos,
G. Konstantinidis,
P. S. Eldridge,
P. G. Savvidis,
C. Tejedor,
L. Viña
Abstract:
We show that the use of momentum-space optical interferometry, which avoids any spatial overlap between two parts of a macroscopic quantum state, presents a unique way to study coherence phenomena in polariton condensates. In this way, we address the longstanding question in quantum mechanics: "\emph{Do two components of a condensate, which have never seen each other, possess a definitive phase?}"…
▽ More
We show that the use of momentum-space optical interferometry, which avoids any spatial overlap between two parts of a macroscopic quantum state, presents a unique way to study coherence phenomena in polariton condensates. In this way, we address the longstanding question in quantum mechanics: "\emph{Do two components of a condensate, which have never seen each other, possess a definitive phase?}" [P. W. Anderson, \emph{Basic Notions of Condensed Matter Physics} (Benjamin, 1984)]. A positive answer to this question is experimentally obtained here for light-matter condensates, created under precise symmetry conditions, in semiconductor microcavities taking advantage of the direct relation between the angle of emission and the in-plane momentum of polaritons.
△ Less
Submitted 22 August, 2014; v1 submitted 7 December, 2013;
originally announced December 2013.
-
Conformal Quivers and Melting Molecules
Authors:
Dionysios Anninos,
Tarek Anous,
Paul de Lange,
George Konstantinidis
Abstract:
Quiver quantum mechanics describes the low energy dynamics of a system of wrapped D-branes. It captures several aspects of single and multicentered BPS black hole geometries in four-dimensional $\mathcal{N} = 2$ supergravity such as the presence of bound states and an exponential growth of microstates. The Coulomb branch of an Abelian three node quiver is obtained by integrating out the massive st…
▽ More
Quiver quantum mechanics describes the low energy dynamics of a system of wrapped D-branes. It captures several aspects of single and multicentered BPS black hole geometries in four-dimensional $\mathcal{N} = 2$ supergravity such as the presence of bound states and an exponential growth of microstates. The Coulomb branch of an Abelian three node quiver is obtained by integrating out the massive strings connecting the D-particles. It allows for a scaling regime corresponding to a deep AdS$_2$ throat on the gravity side. In this scaling regime, the Coulomb branch is shown to be an $SL(2,\mathbb{R})$ invariant multi-particle superconformal quantum mechanics. Finally, we integrate out the strings at finite temperature---rather than in their ground state---and show how the Coulomb branch `melts' into the Higgs branch at high enough temperatures. For scaling solutions the melting occurs for arbitrarily small temperatures, whereas bound states can be metastable and thus long lived. Throughout the paper, we discuss how far the analogy between the quiver model and the gravity picture, particularly within the AdS$_2$ throat, can be taken.
△ Less
Submitted 29 October, 2013;
originally announced October 2013.
-
Microwave and millimeterwave electrical permittivity of graphene monolayer
Authors:
Alina Cismaru,
Mircea Dragoman,
Adrian Dinescu,
Daniela Dragoman,
G. Stavrinidis,
G. Konstantinidis
Abstract:
The effective electrical permittivity of a graphene monolayer is experimentally investigated in the 5-40 GHz range, which encompasses the microwave and the lower part of millimeterwave spectrum. The measurements were carried out using a coupled coplanar waveguide placed over a graphene monolayer flake, which is deposited on Si/SiO2. In contrast to some initial predictions, the effective permittivi…
▽ More
The effective electrical permittivity of a graphene monolayer is experimentally investigated in the 5-40 GHz range, which encompasses the microwave and the lower part of millimeterwave spectrum. The measurements were carried out using a coupled coplanar waveguide placed over a graphene monolayer flake, which is deposited on Si/SiO2. In contrast to some initial predictions, the effective permittivity of the graphene monolayer is slightly decreasing in the above-mentioned frequency range and has an average value of 3.3.
△ Less
Submitted 4 September, 2013;
originally announced September 2013.
-
Higher Spin de Sitter Holography from Functional Determinants
Authors:
Dionysios Anninos,
Frederik Denef,
George Konstantinidis,
Edgar Shaghoulian
Abstract:
We discuss further aspects of the higher spin dS/CFT correspondence. Using a recent result of Dunne and Kirsten, it is shown how to numerically compute the partition function of the free Sp(N) model for a large class of SO(3) preserving deformations of the flat/round metric on R^3/S^3 and the source of the spin-zero single-trace operator dual to the bulk scalar. We interpret this partition functio…
▽ More
We discuss further aspects of the higher spin dS/CFT correspondence. Using a recent result of Dunne and Kirsten, it is shown how to numerically compute the partition function of the free Sp(N) model for a large class of SO(3) preserving deformations of the flat/round metric on R^3/S^3 and the source of the spin-zero single-trace operator dual to the bulk scalar. We interpret this partition function as a Hartle-Hawking wavefunctional. It has a local maximum about the pure de Sitter vacuum. Restricting to SO(3) preserving deformations, other local maxima (which exceed the one near the de Sitter vacuum) can peak at inhomogeneous and anisotropic values of the late time metric and scalar profile. Numerical experiments suggest the remarkable observation that, upon fixing a certain average of the bulk scalar profile at I^+, the wavefunction becomes normalizable in all the other (infinite) directions of the deformation. We elucidate the meaning of double trace deformations in the context of dS/CFT as a change of basis and as a convolution. Finally, we discuss possible extensions of higher spin de Sitter holography by coupling the free theory to a Chern-Simons term.
△ Less
Submitted 14 October, 2013; v1 submitted 27 May, 2013;
originally announced May 2013.
-
Supergoop Dynamics
Authors:
Dionysios Anninos,
Tarek Anous,
Frederik Denef,
George Konstantinidis,
Edgar Shaghoulian
Abstract:
We initiate a systematic study of the dynamics of multi-particle systems with supersymmetric Van der Waals and electron-monopole type interactions. The static interaction allows a complex continuum of ground state configurations, while the Lorentz interaction tends to counteract this configurational fluidity by magnetic trapping, thus producing an exotic low temperature phase of matter aptly named…
▽ More
We initiate a systematic study of the dynamics of multi-particle systems with supersymmetric Van der Waals and electron-monopole type interactions. The static interaction allows a complex continuum of ground state configurations, while the Lorentz interaction tends to counteract this configurational fluidity by magnetic trapping, thus producing an exotic low temperature phase of matter aptly named supergoop. Such systems arise naturally in $\mathcal{N}=2$ gauge theories as monopole-dyon mixtures, and in string theory as collections of particles or black holes obtained by wrapping D-branes on internal space cycles. After discussing the general system and its relation to quiver quantum mechanics, we focus on the case of three particles. We give an exhaustive enumeration of the classical and quantum ground states of a probe in an arbitrary background with two fixed centers. We uncover a hidden conserved charge and show that the dynamics of the probe is classically integrable. In contrast, the dynamics of one heavy and two light particles moving on a line shows a nontrivial transition to chaos, which we exhibit by studying the Poincaré sections. Finally we explore the complex dynamics of a probe particle in a background with a large number of centers, observing hints of ergodicity breaking. We conclude by discussing possible implications in a holographic context.
△ Less
Submitted 25 October, 2012; v1 submitted 4 May, 2012;
originally announced May 2012.
-
Radio frequency signal detection by ballistic transport in Y-shaped graphene nanoribbons
Authors:
George Deligeorgis,
Fabio Coccetti,
George Konstantinidis,
Robert Plana
Abstract:
We report on the fabrication and room temperature measurements of a high frequency electrical signal detector. The device is based on the ballistic transport in graphene to detect a high frequency signal. The observed response is linear in the considered power range (-40dBm - 0dBm) and exhibits a sensitivity as high as 10 Volts/Watt. Finally the device detected signals up to 50GHz with a maximum r…
▽ More
We report on the fabrication and room temperature measurements of a high frequency electrical signal detector. The device is based on the ballistic transport in graphene to detect a high frequency signal. The observed response is linear in the considered power range (-40dBm - 0dBm) and exhibits a sensitivity as high as 10 Volts/Watt. Finally the device detected signals up to 50GHz with a maximum response at 10GHz. This device outperforms any previously reported carbon based detectors in frequency response and compares to current state of the art Schottky based detectors in dynamic range.
△ Less
Submitted 8 March, 2012;
originally announced March 2012.
-
Graphene-like metallic-on-silicon field effect transistor
Authors:
M. Dragoman,
G. Konstantinidis,
K. Tsagaraki,
T. Kostopoulos,
D. Dragoman,
D. Neculoiu
Abstract:
In this manuscript, we present a field effect transistor with a channel consisting of a two-dimensional electron gas located at the interface between an ultrathin metallic film of Ni and a p-type Si(111) substrate. We have demonstrated that the two-dimensional electron gas channel is modulated by the gate voltage. The dependence of the drain current on the drain voltage has no saturation region, s…
▽ More
In this manuscript, we present a field effect transistor with a channel consisting of a two-dimensional electron gas located at the interface between an ultrathin metallic film of Ni and a p-type Si(111) substrate. We have demonstrated that the two-dimensional electron gas channel is modulated by the gate voltage. The dependence of the drain current on the drain voltage has no saturation region, similar to a field effect transistor based on graphene. However, the transport in this transistor is not ambipolar, as in graphene, but unipolar.
△ Less
Submitted 20 February, 2012;
originally announced February 2012.
-
Graphene radio: Detecting radiowaves with a single atom sheet
Authors:
Mircea Dragoman,
Dan Neculoiu,
Alina Cismaru,
George Deligeorgis,
George Konstantinidis,
Daniela Dragoman
Abstract:
We present the experimental evidence of RF demodulation by a graphene monolayer embedded in a coplanar structure. The demodulator was tested in the frequency range from 100 MHz to 25 GHz using amplitude modulated input signals. An input power of 0 dBm (1 mW) was used which is the typical power emitted for short range wireless communication systems, such as Bluetooth. The graphene demodulator exhib…
▽ More
We present the experimental evidence of RF demodulation by a graphene monolayer embedded in a coplanar structure. The demodulator was tested in the frequency range from 100 MHz to 25 GHz using amplitude modulated input signals. An input power of 0 dBm (1 mW) was used which is the typical power emitted for short range wireless communication systems, such as Bluetooth. The graphene demodulator exhibits good signal response in the frequency range associated to industrial, scientific and medical (ISM) radio band (2.4 GHz).
△ Less
Submitted 9 February, 2012;
originally announced February 2012.