We present a microscopic theory of heat and particle transport of an interacting, low-temperature Bose- Einstein condensate in a quantum point contact.We show that, in contrast to charged, fermionic superconductors, bosonic systems feature tunneling proces ...
Following up mass surveillance and privacy issues, modern secure communication protocols now seek more security such as forward secrecy and post-compromise security. They cannot rely on an assumption such as synchronization, predictable sender/receiver rol ...
Environmental transport processes are highly coupled with the shape of landscapes.
Modern catchment analysis with high-resolution data and huge computational powers
demand more detailed within-cell metrics for surface evolution modeling. This
dissertation ...
Density, speed and energy efficiency of integrated circuits have been increasing exponentially for the last four decades following Moore's law. However, power and reliability pose several challenges to the future of technology scaling. Approximate computin ...
With ever greater computational resources and more accessible software, deep neural networks have become ubiquitous across industry and academia.
Their remarkable ability to generalize to new samples defies the conventional view, which holds that complex, ...
Quantum memory management is becoming a pressing problem, especially given the recent research effort to develop new and more complex quantum algorithms. The only existing automatic method for quantum states clean-up relies on the availability of many extr ...
We use a dynamic model of financing decisions to measure agency conflicts for a large panel of 12,652 firms from 14 countries. Our estimates show that agency conflicts are large and vary significantly across firms and countries. Differences in agency confl ...
In our daily lives, people or devices frequently need to learn their location for many reasons as some services depend on the absolute location or the proximity. The outcomes of positioning systems can have critical effects e.g., on military, emergency. Th ...
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research
of AE as a primitive in its own right started in 2000.The security goals of AE wer ...