-
Synapse: Virtualizing Match Tables in Programmable Hardware
Authors:
Seyyidahmed Lahmer,
Angelo Tulumello,
Alessandro Rivitti,
Giuseppe Bianchi,
Andrea Zanella
Abstract:
Efficient network packet processing increasingly demands dynamic, adaptive, and run-time resizable match table allocation to handle the diverse and heterogeneous nature of traffic patterns and rule sets. Achieving this flexibility at high performance in hardware is challenging, as fixed resource constraints and architectural limitations have traditionally restricted such adaptability. In this pape…
▽ More
Efficient network packet processing increasingly demands dynamic, adaptive, and run-time resizable match table allocation to handle the diverse and heterogeneous nature of traffic patterns and rule sets. Achieving this flexibility at high performance in hardware is challenging, as fixed resource constraints and architectural limitations have traditionally restricted such adaptability. In this paper, we introduce Synapse, an extension to programmable data plane architectures that incorporates the Virtual Matching Table (VMT) framework, drawing inspiration from virtual memory systems in Operating Systems (OSs), but specifically tailored to network processing. This abstraction layer allows logical tables to be elastic, enabling dynamic and efficient match table allocation at runtime. Our design features a hybrid memory system, leveraging on-chip associative memories for fast matching of the most popular rules and off-chip addressable memory for scalable and cost-effective storage. Furthermore, by employing a sharding mechanism across physical match tables, Synapse ensures that the power required per key match remains bounded and proportional to the key distribution and the size of the involved shard. To address the challenge of dynamic allocation, we formulate and solve an optimization problem that dynamically allocates physical match tables to logical tables based on pipeline usage and traffic characteristics at the millisecond scale. We prototype our design on FPGA and develop a simulator to evaluate the performance, demonstrating its effectiveness and scalability.
△ Less
Submitted 17 May, 2025;
originally announced May 2025.
-
Anisotropic symmetrization, convex bodies, and isoperimetric inequalities
Authors:
Gabriele Bianchi,
Andrea Cianchi,
Paolo Gronchi
Abstract:
This work is concerned with a Pólya-Szegö type inequality for anisotropic functionals of Sobolev functions. The relevant inequality entails a double-symmetrization involving both trial functions and functionals. A new approach that uncovers geometric aspects of the inequality is proposed. It relies upon anisotropic isoperimetric inequalities, fine properties of Sobolev functions, and results from…
▽ More
This work is concerned with a Pólya-Szegö type inequality for anisotropic functionals of Sobolev functions. The relevant inequality entails a double-symmetrization involving both trial functions and functionals. A new approach that uncovers geometric aspects of the inequality is proposed. It relies upon anisotropic isoperimetric inequalities, fine properties of Sobolev functions, and results from the Brunn-Minkowski theory of convex bodies. Importantly, unlike previously available proofs, the one offered in this paper does not require approximation arguments and hence allows for a characterization of extremal functions.
△ Less
Submitted 2 November, 2024;
originally announced November 2024.
-
VaultFS: Write-once Software Support at the File System Level Against Ransomware Attacks
Authors:
Pasquale Caporaso,
Giuseppe Bianchi,
Francesco Quaglia
Abstract:
The demand for data protection measures against unauthorized changes or deletions is steadily increasing. These measures are essential for maintaining the integrity and accessibility of data, effectively guarding against threats like ransomware attacks that focus on encrypting large volumes of stored data, as well as insider threats that involve tampering with or erasing system and access logs. Su…
▽ More
The demand for data protection measures against unauthorized changes or deletions is steadily increasing. These measures are essential for maintaining the integrity and accessibility of data, effectively guarding against threats like ransomware attacks that focus on encrypting large volumes of stored data, as well as insider threats that involve tampering with or erasing system and access logs. Such protection measures have become crucial in today's landscape, and hardware-based solutions like Write-Once Read-Many (WORM) storage devices, have been put forth as viable options, which however impose hardware-level investments, and the impossibility to reuse the blocks of the storage devices after they have been written. In this article we propose VaultFS, a Linux-suited file system oriented to the maintenance of cold-data, namely data that are written using a common file system interface, are kept accessible, but are not modifiable, even by threads running with (effective)root-id. Essentially, these files are supported via the write-once semantic, and cannot be subject to the rewriting (or deletion) of their content up to the end of their (potentially infinite) protection life time. Hence they cannot be subject to ransomware attacks even under privilege escalation. This takes place with no need for any underlying WORM device -- since ValutFS is a pure software solution working with common read/write devices (e.g., hard disks and SSD). Also, VaultFS offers the possibility to protect the storage against Denial-of-Service (DOS) attacks, possibly caused by un-trusted applications that simply write on the file system to make its device blocks busy with non-removable content.
△ Less
Submitted 29 October, 2024;
originally announced October 2024.
-
The Northern Cross Fast Radio Burst project IV. Multi-wavelength study of the actively repeating FRB 20220912A
Authors:
D. Pelliciari,
G. Bernardi,
M. Pilia,
G. Naldi,
G. Maccaferri,
F. Verrecchia,
C. Casentini,
M. Perri,
F. Kirsten,
G. Bianchi,
C. Bortolotti,
L. Bruno,
D. Dallacasa,
P. Esposito,
A. Geminardi,
S. Giarratana,
M. Giroletti,
R. Lulli,
A. Maccaferri,
A. Magro,
A. Mattana,
F. Perini,
G. Pupillo,
M. Roma,
M. Schiaffino
, et al. (4 additional authors not shown)
Abstract:
Fast radio bursts (FRBs) are energetic, millisecond-duration radio pulses observed at extragalactic distances and whose origins are still a subject of heated debate. A fraction of the FRB population have shown repeating bursts, however it's still unclear whether these represent a distinct class of sources. We investigated the bursting behaviour of FRB 20220912A, one of the most active repeating FR…
▽ More
Fast radio bursts (FRBs) are energetic, millisecond-duration radio pulses observed at extragalactic distances and whose origins are still a subject of heated debate. A fraction of the FRB population have shown repeating bursts, however it's still unclear whether these represent a distinct class of sources. We investigated the bursting behaviour of FRB 20220912A, one of the most active repeating FRBs known thus far. In particular, we focused on its burst energy distribution, linked to the source energetics, and its emission spectrum, with the latter directly related to the underlying emission mechanism. We monitored FRB 20220912A at $408$ MHz with the Northern Cross radio telescope and at $1.4$ GHz using the $32$-m Medicina Grueff radio telescope. Additionally, we conducted $1.2$ GHz observations taken with the upgraded Giant Meter Wave Radio Telescope (uGMRT) searching for a persistent radio source coincident with FRB 20220912A, which included high energy observations in the $0.3-10$ keV, $0.4-100$ MeV and $0.03-30$ GeV energy range. We report $16$ new bursts from FRB 20220912A at $408$ MHz during the period between October 16$^{\rm th}$ 2022 and December 31$^{\rm st}$ 2023. Their cumulative spectral energy distribution follows a power law with slope $α_E = -1.3 \pm 0.2$ and we measured a repetition rate of $0.19 \pm 0.03$ hr$^{-1}$ for bursts having a fluence of $\mathcal{F} \geq 17$ Jy ms. Furthermore, we report no detections at 1.4 GHz for $\mathcal{F} \geq 20$ Jy ms. These non-detections imply an upper limit of $β< -2.3$, with $β$ being the $408$ MHz $-$ $1.4$ GHz spectral index of FRB 20220912A. This is inconsistent with positive $β$ values found for the only two known cases in which an FRB has been detected in separate spectral bands. We find that FRB 20220912A shows a decline of four orders of magnitude in its bursting activity at $1.4$ GHz over a .. (abridged)
△ Less
Submitted 19 July, 2024; v1 submitted 8 May, 2024;
originally announced May 2024.
-
JITScanner: Just-in-Time Executable Page Check in the Linux Operating System
Authors:
Pasquale Caporaso,
Giuseppe Bianchi,
Francesco Quaglia
Abstract:
Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis, a prevalent approach, offers advantages over static analysis by enabling observation of runtime behavior and detecting obfuscated or encrypted code…
▽ More
Modern malware poses a severe threat to cybersecurity, continually evolving in sophistication. To combat this threat, researchers and security professionals continuously explore advanced techniques for malware detection and analysis. Dynamic analysis, a prevalent approach, offers advantages over static analysis by enabling observation of runtime behavior and detecting obfuscated or encrypted code used to evade detection. However, executing programs within a controlled environment can be resource-intensive, often necessitating compromises, such as limiting sandboxing to an initial period. In our article, we propose an alternative method for dynamic executable analysis: examining the presence of malicious signatures within executable virtual pages precisely when their current content, including any updates over time, is accessed for instruction fetching. Our solution, named JITScanner, is developed as a Linux-oriented package built upon a Loadable Kernel Module (LKM). It integrates a user-level component that communicates efficiently with the LKM using scalable multi-processor/core technology. JITScanner's effectiveness in detecting malware programs and its minimal intrusion in normal runtime scenarios have been extensively tested, with the experiment results detailed in this article. These experiments affirm the viability of our approach, showcasing JITScanner's capability to effectively identify malware while minimizing runtime overhead.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
COREC: Concurrent Non-Blocking Single-Queue Receive Driver for Low Latency Networking
Authors:
Marco Faltelli,
Giacomo Belocchi,
Francesco Quaglia,
Giuseppe Bianchi
Abstract:
Existing network stacks tackle performance and scalability aspects by relying on multiple receive queues. However, at software level, each queue is processed by a single thread, which prevents simultaneous work on the same queue and limits performance in terms of tail latency. To overcome this limitation, we introduce COREC, the first software implementation of a concurrent non-blocking single-que…
▽ More
Existing network stacks tackle performance and scalability aspects by relying on multiple receive queues. However, at software level, each queue is processed by a single thread, which prevents simultaneous work on the same queue and limits performance in terms of tail latency. To overcome this limitation, we introduce COREC, the first software implementation of a concurrent non-blocking single-queue receive driver. By sharing a single queue among multiple threads, workload distribution is improved, leading to a work-conserving policy for network stacks. On the technical side, instead of relying on traditional critical sections - which would sequentialize the operations by threads - COREC coordinates the threads that concurrently access the same receive queue in non-blocking manner via atomic machine instructions from the Read-Modify-Write (RMW) class. These instructions allow threads to access and update memory locations atomically, based on specific conditions, such as the matching of a target value selected by the thread. Also, they enable making any update globally visible in the memory hierarchy, bypassing interference on memory consistency caused by the CPU store buffers. Extensive evaluation results demonstrate that the possible additional reordering, which our approach may occasionally cause, is non-critical and has minimal impact on performance, even in the worst-case scenario of a single large TCP flow, with performance impairments accounting to at most 2-3 percent. Conversely, substantial latency gains are achieved when handling UDP traffic, real-world traffic mix, and multiple shorter TCP flows.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
The Northern Cross Fast Radio Burst project -- III. The FRB-magnetar connection in a sample of nearby galaxies
Authors:
Davide Pelliciari,
Gianni Bernardi,
Maura Pilia,
Giovanni Naldi,
Giuseppe Pupillo,
Matteo Trudu,
Antonio Addis,
Germano Bianchi,
Claudio Bortolotti,
Daniele Dallacasa,
Roberto Lulli,
Andrea Maccaferri,
Alessio Magro,
Andrea Mattana,
Federico Perini,
Mauro Roma,
Marco Schiaffino,
Giancarlo Setti,
Marco Tavani,
Francesco Verrecchia,
Claudio Casentini
Abstract:
Fast radio bursts (FRBs) are millisecond radio transients observed at cosmological distances. The nature of their progenitors is still a matter of debate, although magnetars are invoked by most models. The proposed FRB-magnetar connection was strengthened by the discovery of an FRB-like event from the Galactic magnetar SGR J1935+2154. In this work, we aim to investigate how prevalent magnetars suc…
▽ More
Fast radio bursts (FRBs) are millisecond radio transients observed at cosmological distances. The nature of their progenitors is still a matter of debate, although magnetars are invoked by most models. The proposed FRB-magnetar connection was strengthened by the discovery of an FRB-like event from the Galactic magnetar SGR J1935+2154. In this work, we aim to investigate how prevalent magnetars such as SGR J1935+2154 are within FRB progenitors. We carried out an FRB search in a sample of seven nearby (< 12 Mpc) galaxies with the Northern Cross radio telescope for a total of 692 h. We detected one 1.8 ms burst in the direction of M101 with a fluence of $58 \pm 5$ Jy ms. Its dispersion measure of 303 pc cm$^{-3}$ places it most-likely beyond M101. Considering that no significant detection comes indisputably from the selected galaxies, we place a 38 yr$^{-1}$ upper limit on the total burst rate (i.e. including the whole sample) at the 95\% confidence level. This upper limit constrains the event rate per magnetar $λ_{\rm mag} < 0.42$ magnetar$^{-1}$ yr$^{-1}$ or, if combined with literature observations of a similar sample of nearby galaxies, it yields a joint constraint of $λ_{\rm mag} < 0.25$ magnetar$^{-1}$ yr$^{-1}$. We also provide the first constraints on the expected rate of FRBs hypothetically originating from ultraluminous X-ray (ULX) sources, since some of the galaxies observed during our observational campaign host confirmed ULXs. We obtain $< 13$ yr$^{-1}$ per ULX for the total sample of galaxies observed. Our results indicate that bursts with energies $E>10^{34}$ erg from magnetars like SGR J1935+2154 appear more rarely compared to previous observations and further disfavour them as unique progenitors for the cosmological FRB population, leaving more space open to the contribution from a population of more exotic magnetars, not born via core-collapsed supernovae.
△ Less
Submitted 28 June, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
Roadmap for Optical Tweezers
Authors:
Giovanni Volpe,
Onofrio M. Maragò,
Halina Rubinzstein-Dunlop,
Giuseppe Pesce,
Alexander B. Stilgoe,
Giorgio Volpe,
Georgiy Tkachenko,
Viet Giang Truong,
Síle Nic Chormaic,
Fatemeh Kalantarifard,
Parviz Elahi,
Mikael Käll,
Agnese Callegari,
Manuel I. Marqués,
Antonio A. R. Neves,
Wendel L. Moreira,
Adriana Fontes,
Carlos L. Cesar,
Rosalba Saija,
Abir Saidi,
Paul Beck,
Jörg S. Eismann,
Peter Banzer,
Thales F. D. Fernandes,
Francesco Pedaci
, et al. (58 additional authors not shown)
Abstract:
Optical tweezers are tools made of light that enable contactless pushing, trapping, and manipulation of objects ranging from atoms to space light sails. Since the pioneering work by Arthur Ashkin in the 1970s, optical tweezers have evolved into sophisticated instruments and have been employed in a broad range of applications in life sciences, physics, and engineering. These include accurate force…
▽ More
Optical tweezers are tools made of light that enable contactless pushing, trapping, and manipulation of objects ranging from atoms to space light sails. Since the pioneering work by Arthur Ashkin in the 1970s, optical tweezers have evolved into sophisticated instruments and have been employed in a broad range of applications in life sciences, physics, and engineering. These include accurate force and torque measurement at the femtonewton level, microrheology of complex fluids, single micro- and nanoparticle spectroscopy, single-cell analysis, and statistical-physics experiments. This roadmap provides insights into current investigations involving optical forces and optical tweezers from their theoretical foundations to designs and setups. It also offers perspectives for applications to a wide range of research fields, from biophysics to space exploration.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
The Pólya-Szegő inequality for smoothing rearrangements
Authors:
Gabriele Bianchi,
Richard J. Gardner,
Paolo Gronchi,
Markus Kiderlen
Abstract:
A basic version of the Pólya-Szegő inequality states that if $Φ$ is a Young function, the $Φ$-Dirichlet energy -- the integral of $Φ(\|\nabla f\|)$ -- of a suitable function $f\in \mathcal{V}(\mathbb{R}^n)$, the class of nonnegative measurable functions on $\mathbb{R}^n$ that vanish at infinity, does not increase under symmetric decreasing rearrangement. This fact, along with variants that apply t…
▽ More
A basic version of the Pólya-Szegő inequality states that if $Φ$ is a Young function, the $Φ$-Dirichlet energy -- the integral of $Φ(\|\nabla f\|)$ -- of a suitable function $f\in \mathcal{V}(\mathbb{R}^n)$, the class of nonnegative measurable functions on $\mathbb{R}^n$ that vanish at infinity, does not increase under symmetric decreasing rearrangement. This fact, along with variants that apply to polarizations and to Steiner and certain other rearrangements, has numerous applications. Very general versions of the inequality are proved that hold for all smoothing rearrangements, those that do not increase the modulus of continuity of functions. The results cover all the main classes of functions previously considered: Lipschitz functions $f\in \mathcal{V}(\mathbb{R}^n)$, functions $f\in W^{1,p}(\mathbb{R}^n)\cap\mathcal{V}(\mathbb{R}^n)$ (when $1\le p<\infty$ and $Φ(t)=t^p$), and functions $f\in W^{1,1}_{loc}(\mathbb{R}^n)\cap\mathcal{V}(\mathbb{R}^n)$. In addition, anisotropic versions of these results, in which the role of the unit ball is played by a convex body containing the origin in its interior, are established. Taken together, the results bring together all the basic versions of the Pólya-Szegő inequality previously available under a common and very general framework.
△ Less
Submitted 20 June, 2022;
originally announced June 2022.
-
The Northern Cross Fast Radio Burst project - II. Monitoring of repeating FRB 20180916B, 20181030A, 20200120E and 20201124A
Authors:
M. Trudu,
M. Pilia,
G. Bernardi,
A. Addis,
G. Bianchi,
A. Magro,
G. Naldi,
D. Pelliciari,
G. Pupillo,
G. Setti,
C. Bortolotti,
C. Casentini,
D. Dallacasa,
V. Gajjar,
N. Locatelli,
R. Lulli,
G. Maccaferri,
A. Mattana,
D. Michilli,
F. Perini,
A. Possenti,
M. Roma,
M. Schiaffino,
M. Tavani,
F. Verrecchia
Abstract:
In this work we report the results of a nineteen-month Fast Radio Burst observational campaign carried out with the North-South arm of the Medicina Northern Cross radio telescope at 408~MHz in which we monitored four repeating sources: FRB20180916B, FRB20181030A, FRB20200120E and FRB20201124A. We present the current state of the instrument and the detection and characterisation of three bursts fro…
▽ More
In this work we report the results of a nineteen-month Fast Radio Burst observational campaign carried out with the North-South arm of the Medicina Northern Cross radio telescope at 408~MHz in which we monitored four repeating sources: FRB20180916B, FRB20181030A, FRB20200120E and FRB20201124A. We present the current state of the instrument and the detection and characterisation of three bursts from FRB20180916B. Given our observing time, our detections are consistent with the event number we expect from the known burst rate ($2.7 \pm 1.9$ above our 10$σ$, 38~Jy~ms detection threshold) in the 5.2 day active window of the source, further confirming the source periodicity. We detect no bursts from the other sources. We turn this result into a 95\% confidence level lower limit on the slope of the differential fluence distribution $α$ to be $α> 2.1$ and $α> 2.2$ for FRB20181030A and FRB20200120E respectively. Given the known rate for FRB20201124A, we expect $1.0 \pm 1.1$ bursts from our campaign, consistent with our non-detection.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
Full rotational symmetry from reflections or rotational symmetries in finitely many subspaces
Authors:
Gabriele Bianchi,
Richard J. Gardner,
Paolo Gronchi
Abstract:
Two related questions are discussed. The first is when reflection symmetry in a finite set of $i$-dimensional subspaces, $i\in \{1,\dots,n-1\}$, implies full rotational symmetry, i.e., the closure of the group generated by the reflections equals $O(n)$. For $i=n-1$, this has essentially been solved by Burchard, Chambers, and Dranovski, but new results are obtained for $i\in \{1,\dots,n-2\}$. The s…
▽ More
Two related questions are discussed. The first is when reflection symmetry in a finite set of $i$-dimensional subspaces, $i\in \{1,\dots,n-1\}$, implies full rotational symmetry, i.e., the closure of the group generated by the reflections equals $O(n)$. For $i=n-1$, this has essentially been solved by Burchard, Chambers, and Dranovski, but new results are obtained for $i\in \{1,\dots,n-2\}$. The second question, to which an essentially complete answer is given, is when (full) rotational symmetry with respect to a finite set of $i$-dimensional subspaces, $i\in \{1,\dots,n-2\}$, implies full rotational symmetry, i.e., the closure of the group generated by all the rotations about each of the subspaces equals $SO(n)$. The latter result also shows that a closed set in $\mathbb{R}^n$ that is invariant under rotations about more than one axis must be a union of spheres with their centers at the origin.
△ Less
Submitted 4 May, 2022; v1 submitted 8 February, 2022;
originally announced February 2022.
-
Probabilistic Regression with Huber Distributions
Authors:
David Mohlin,
Gerald Bianchi,
Josephine Sullivan
Abstract:
In this paper we describe a probabilistic method for estimating the position of an object along with its covariance matrix using neural networks. Our method is designed to be robust to outliers, have bounded gradients with respect to the network outputs, among other desirable properties. To achieve this we introduce a novel probability distribution inspired by the Huber loss. We also introduce a n…
▽ More
In this paper we describe a probabilistic method for estimating the position of an object along with its covariance matrix using neural networks. Our method is designed to be robust to outliers, have bounded gradients with respect to the network outputs, among other desirable properties. To achieve this we introduce a novel probability distribution inspired by the Huber loss. We also introduce a new way to parameterize positive definite matrices to ensure invariance to the choice of orientation for the coordinate system we regress over. We evaluate our method on popular body pose and facial landmark datasets and get performance on par or exceeding the performance of non-heatmap methods. Our code is available at github.com/Davmo049/Public_prob_regression_with_huber_distributions
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Design and Experimental Assessment of Detection Schemes for Air Interface Attacks in Adverse Scenarios
Authors:
Danilo Orlando,
Ivan Palamà,
Stefania Bartoletti,
Giuseppe Bianchi,
Nicola Blefari Melazzi
Abstract:
In this letter, we propose three schemes designed to detect attacks over the air interface in cellular networks. These decision rules rely on the generalized likelihood ratio test, and are fed by data that can be acquired using common off-the-shelf receivers. In addition to more classical (barrage/smart) noise jamming attacks, we further assess the capability of the proposed schemes to detect the…
▽ More
In this letter, we propose three schemes designed to detect attacks over the air interface in cellular networks. These decision rules rely on the generalized likelihood ratio test, and are fed by data that can be acquired using common off-the-shelf receivers. In addition to more classical (barrage/smart) noise jamming attacks, we further assess the capability of the proposed schemes to detect the stealthy activation of a rogue base station. The evaluation is carried out through an experimentation of a LTE system concretely reproduced using Software-Defined Radios. Illustrative examples confirm that the proposed schemes can effectively detect air interface threats with high probability.
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
Metronome: adaptive and precise intermittent packet retrieval in DPDK
Authors:
Marco Faltelli,
Giacomo Belocchi,
Francesco Quaglia,
Salvatore Pontarelli,
Giuseppe Bianchi
Abstract:
The increasing performance requirements of modern applications place a significant burden on software-based packet processing. Most of today's software input/output accelerations achieve high performance at the expense of reserving CPU resources dedicated to continuously poll the Network Interface Card. This is specifically the case with DPDK (Data Plane Development Kit), probably the most widely…
▽ More
The increasing performance requirements of modern applications place a significant burden on software-based packet processing. Most of today's software input/output accelerations achieve high performance at the expense of reserving CPU resources dedicated to continuously poll the Network Interface Card. This is specifically the case with DPDK (Data Plane Development Kit), probably the most widely used framework for software-based packet processing today. The approach presented in this paper, descriptively called Metronome, has the dual goals of providing CPU utilization proportional to the load, and allowing flexible sharing of CPU resources between I/O tasks and applications. Metronome replaces DPDK's continuous polling with an intermittent sleep&wake mode, and revolves around a new multi-threaded operation, which improves service continuity. Since the proposed operation trades CPU usage with buffering delay, we propose an analytical model devised to dynamically adapt the sleep&wake parameters to the actual traffic load, meanwhile providing a target average latency. Our experimental results show a significant reduction of the CPU cycles, improvements in power usage, and robustness to CPU sharing even when challenged with CPU-intensive applications.
△ Less
Submitted 21 May, 2021; v1 submitted 24 March, 2021;
originally announced March 2021.
-
Anomaly Detection Algorithms for Location Security in 5G Scenarios
Authors:
Stefania Bartoletti,
Ivan Palamà,
Danilo Orlando,
Giuseppe Bianchi,
Nicola Blefari Melazzi
Abstract:
Location based services are expected to play a major role in future generation cellular networks, starting from the incoming 5G systems. At the same time, localization technologies may be severely affected by attackers capable to deploy low cost fake base stations and use them to alter localization signals. In this paper, we concretely focus on two classes of threats: noise-like jammers, whose obj…
▽ More
Location based services are expected to play a major role in future generation cellular networks, starting from the incoming 5G systems. At the same time, localization technologies may be severely affected by attackers capable to deploy low cost fake base stations and use them to alter localization signals. In this paper, we concretely focus on two classes of threats: noise-like jammers, whose objective is to reduce the signal-to-noise ratio, and spoofing/meaconing attacks, whose objective is to inject false or erroneous information into the receiver. Then, we formulate the detection problems as binary hypothesis tests and solve them resorting to the generalized likelihood ratio test design procedure as well as the Latent Variable Models, which involves the expectation-maximization algorithm to estimate the unknown data distribution parameters. The proposed techniques can be applied to a large class of location data regardless the subsumed network architecture. The performance analysis is conducted over simulated data generated by using measurement models from the literature and highlights the effectiveness of the proposed approaches in detecting the aforementioned classes of attacks.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Multi-frequency observations of SGR J1935+2154
Authors:
M. Bailes,
C. G. Bassa,
G. Bernardi,
S. Buchner,
M. Burgay,
M. Caleb,
A. J. Cooper,
G. Desvignes,
P. J. Groot,
I. Heywood,
F. Jankowski,
R. Karuppusamy,
M. Kramer,
M. Malenta,
G. Naldi,
M. Pilia,
G. Pupillo,
K. M. Rajwade,
L. Spitler,
M. Surnis,
B. W. Stappers,
A. Addis,
S. Bloemen,
M. C. Bezuidenhout,
G. Bianchi
, et al. (32 additional authors not shown)
Abstract:
Magnetars are a promising candidate for the origin of Fast Radio Bursts (FRBs). The detection of an extremely luminous radio burst from the Galactic magnetar SGR J1935+2154 on 2020 April 28 added credence to this hypothesis. We report on simultaneous and non-simultaneous observing campaigns using the Arecibo, Effelsberg, LOFAR, MeerKAT, MK2 and Northern Cross radio telescopes and the MeerLICHT opt…
▽ More
Magnetars are a promising candidate for the origin of Fast Radio Bursts (FRBs). The detection of an extremely luminous radio burst from the Galactic magnetar SGR J1935+2154 on 2020 April 28 added credence to this hypothesis. We report on simultaneous and non-simultaneous observing campaigns using the Arecibo, Effelsberg, LOFAR, MeerKAT, MK2 and Northern Cross radio telescopes and the MeerLICHT optical telescope in the days and months after the April 28 event. We did not detect any significant single radio pulses down to fluence limits between 25 mJy ms and 18 Jy ms. Some observing epochs overlapped with times when X-ray bursts were detected. Radio images made on four days using the MeerKAT telescope revealed no point-like persistent or transient emission at the location of the magnetar. No transient or persistent optical emission was detected over seven days. Using the multi-colour MeerLICHT images combined with relations between DM, NH and reddening we constrain the distance to SGR J1935+2154, to be between 1.5 and 6.5 kpc. The upper limit is consistent with some other distance indicators and suggests that the April 28 burst is closer to two orders of magnitude less energetic than the least energetic FRBs. The lack of single-pulse radio detections shows that the single pulses detected over a range of fluences are either rare, or highly clustered, or both. It may also indicate that the magnetar lies somewhere between being radio-quiet and radio-loud in terms of its ability to produce radio emission efficiently.
△ Less
Submitted 10 March, 2021;
originally announced March 2021.
-
hXDP: Efficient Software Packet Processing on FPGA NICs
Authors:
Marco Spaziani Brunella,
Giacomo Belocchi,
Marco Bonola,
Salvatore Pontarelli,
Giuseppe Siracusano,
Giuseppe Bianchi,
Aniello Cammarano,
Alessandro Palumbo,
Luca Petrucci,
Roberto Bifulco
Abstract:
FPGA accelerators on the NIC enable the offloading of expensive packet processing tasks from the CPU. However, FPGAs have limited resources that may need to be shared among diverse applications, and programming them is difficult.
We present a solution to run Linux's eXpress Data Path programs written in eBPF on FPGAs, using only a fraction of the available hardware resources while matching the p…
▽ More
FPGA accelerators on the NIC enable the offloading of expensive packet processing tasks from the CPU. However, FPGAs have limited resources that may need to be shared among diverse applications, and programming them is difficult.
We present a solution to run Linux's eXpress Data Path programs written in eBPF on FPGAs, using only a fraction of the available hardware resources while matching the performance of high-end CPUs. The iterative execution model of eBPF is not a good fit for FPGA accelerators. Nonetheless, we show that many of the instructions of an eBPF program can be compressed, parallelized or completely removed, when targeting a purpose-built FPGA executor, thereby significantly improving performance. We leverage that to design hXDP, which includes (i) an optimizing-compiler that parallelizes and translates eBPF bytecode to an extended eBPF Instruction-set Architecture defined by us; a (ii) soft-CPU to execute such instructions on FPGA; and (iii) an FPGA-based infrastructure to provide XDP's maps and helper functions as defined within the Linux kernel.
We implement hXDP on an FPGA NIC and evaluate it running real-world unmodified eBPF programs. Our implementation is clocked at 156.25MHz, uses about 15% of the FPGA resources, and can run dynamically loaded programs. Despite these modest requirements, it achieves the packet processing throughput of a high-end CPU core and provides a 10x lower packet forwarding latency.
△ Less
Submitted 27 October, 2020;
originally announced October 2020.
-
"Cellular Network Densification Increases Radio-Frequency Pollution": True or False?
Authors:
Luca Chiaraviglio,
Sara Turco,
Giuseppe Bianchi,
Nicola Blefari Melazzi
Abstract:
A very popular theory circulating among non-scientific communities claims that the massive deployment of Base Stations (BSs) over the territory, a.k.a. cellular network densification, always triggers an uncontrolled and exponential increase of human exposure to Radio Frequency "Pollution" (RFP). To face such concern in a way that can be understood by the layman, in this work we develop a very simp…
▽ More
A very popular theory circulating among non-scientific communities claims that the massive deployment of Base Stations (BSs) over the territory, a.k.a. cellular network densification, always triggers an uncontrolled and exponential increase of human exposure to Radio Frequency "Pollution" (RFP). To face such concern in a way that can be understood by the layman, in this work we develop a very simple model to compute the RFP, based on a set of worst-case and conservative assumptions. We then provide closed-form expressions to evaluate the RFP variation in a pair of candidate 5G deployments, subject to different densification levels. Results, obtained over a wide set of representative 5G scenarios, dispel the myth: cellular network densification triggers an RFP decrease (up to three orders of magnitude) when the radiated power from the BS is adjusted to ensure a minimum sensitivity at the cell edge. Eventually, we analyze the conditions under which the RFP may increase when the network is densified (e.g., when the radiated power does not scale with the cell size), proving that the amount of RFP is always controlled. Finally, the results obtained by simulation confirm the outcomes of the RFP model.
△ Less
Submitted 27 September, 2022; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Probabilistic orientation estimation with matrix Fisher distributions
Authors:
D. Mohlin,
G. Bianchi,
J. Sullivan
Abstract:
This paper focuses on estimating probability distributions over the set of 3D rotations ($SO(3)$) using deep neural networks. Learning to regress models to the set of rotations is inherently difficult due to differences in topology between $\mathbb{R}^N$ and $SO(3)$. We overcome this issue by using a neural network to output the parameters for a matrix Fisher distribution since these parameters ar…
▽ More
This paper focuses on estimating probability distributions over the set of 3D rotations ($SO(3)$) using deep neural networks. Learning to regress models to the set of rotations is inherently difficult due to differences in topology between $\mathbb{R}^N$ and $SO(3)$. We overcome this issue by using a neural network to output the parameters for a matrix Fisher distribution since these parameters are homeomorphic to $\mathbb{R}^9$. By using a negative log likelihood loss for this distribution we get a loss which is convex with respect to the network outputs. By optimizing this loss we improve state-of-the-art on several challenging applicable datasets, namely Pascal3D+, ModelNet10-$SO(3)$ and UPNA head pose.
△ Less
Submitted 17 June, 2020;
originally announced June 2020.
-
An X-Ray Burst from a Magnetar Enlightening the Mechanism of Fast Radio Bursts
Authors:
M. Tavani,
C. Casentini,
A. Ursi,
F. Verrecchia,
A. Addis,
L. A. Antonelli,
A. Argan,
G. Barbiellini,
L. Baroncelli,
G. Bernardi,
G. Bianchi,
A. Bulgarelli,
P. Caraveo,
M. Cardillo,
P. W. Cattaneo,
A. W. Chen,
E. Costa,
E. Del Monte,
G. Di Cocco,
G. Di Persio,
I. Donnarumma,
Y. Evangelista,
M. Feroci,
A. Ferrari,
V. Fioretti
, et al. (38 additional authors not shown)
Abstract:
Fast radio bursts (FRBs) are short (millisecond) radio pulses originating from enigmatic sources at extragalactic distances so far lacking a detection in other energy bands. Magnetized neutron stars (magnetars) have been considered as the sources powering the FRBs, but the connection is controversial because of differing energetics and the lack of radio and X-ray detections with similar characteri…
▽ More
Fast radio bursts (FRBs) are short (millisecond) radio pulses originating from enigmatic sources at extragalactic distances so far lacking a detection in other energy bands. Magnetized neutron stars (magnetars) have been considered as the sources powering the FRBs, but the connection is controversial because of differing energetics and the lack of radio and X-ray detections with similar characteristics in the two classes. We report here the detection by the AGILE satellite on April 28, 2020 of an X-ray burst in coincidence with the very bright radio burst from the Galactic magnetar SGR 1935+2154. The burst detected by AGILE in the hard X-ray band (18-60 keV) lasts about 0.5 seconds, it is spectrally cutoff above 80 keV, and implies an isotropically emitted energy ~ $10^{40}$ erg. This event is remarkable in many ways: it shows for the first time that a magnetar can produce X-ray bursts in coincidence with FRB-like radio bursts; it also suggests that FRBs associated with magnetars may emit X-ray bursts of both magnetospheric and radio-pulse types that may be discovered in nearby sources. Guided by this detection, we discuss SGR 1935+2154 in the context of FRBs, and especially focus on the class of repeating-FRBs. Based on energetics, magnetars with fields B ~ $10^{15}$ G may power the majority of repeating-FRBs. Nearby repeating-FRBs offer a unique occasion to consolidate the FRB-magnetar connection, and we present new data on the X-ray monitoring of nearby FRBs. Our detection enlightens and constrains the physical process leading to FRBs: contrary to previous expectations, high-brightness temperature radio emission coexists with spectrally-cutoff X-ray radiation.
△ Less
Submitted 25 May, 2020;
originally announced May 2020.
-
Gamma-Ray and X-Ray Observations of the Periodic-Repeater FRB 180916 During Active Phases
Authors:
M. Tavani,
F. Verrecchia,
C. Casentini,
M. Perri,
A. Ursi,
L. Pacciani,
C. Pittori,
A. Bulgarelli,
G. Piano,
M. Pilia,
G. Bernardi,
A. Addis,
L. A. Antonelli,
A. Argan,
L. Baroncelli,
P. Caraveo,
P. W. Cattaneo,
A. Chen,
E. Costa,
G. Di Persio,
I. Donnarumma,
Y. Evangelista,
M. Feroci,
A. Ferrari,
V. Fioretti
, et al. (11 additional authors not shown)
Abstract:
FRB 180916 is a most intriguing source at 150 Mpc distance capable of producing repeating fast radio bursts with a periodic 16.35 day temporal pattern. We report on the X-ray and $γ$-ray observations of FRB 180916 obtained by AGILE and Swift. We focused on the recurrent 5-day time intervals of active radio bursting and present results obtained on Feb. 3 - 8; Feb. 25; Mar. 5 - 10; Mar. 22 - 28, 202…
▽ More
FRB 180916 is a most intriguing source at 150 Mpc distance capable of producing repeating fast radio bursts with a periodic 16.35 day temporal pattern. We report on the X-ray and $γ$-ray observations of FRB 180916 obtained by AGILE and Swift. We focused on the recurrent 5-day time intervals of active radio bursting and present results obtained on Feb. 3 - 8; Feb. 25; Mar. 5 - 10; Mar. 22 - 28, 2020 during a multiwavelength campaign involving high-energy and radio observations. We also searched for temporal coincidences at millisecond timescales between all known radio bursts of FRB 180916 and X-ray and MeV events detectable by AGILE. We do not detect any simultaneous event or any extended X-ray and $γ$-ray emission on timescales of hours/days/weeks. Our cumulative X-ray (0.3-10 keV) flux upper limit of $5 \times\,10^{-14} \rm \, erg \, cm^{-2} s^{-1}$ (obtained during 5-day active intervals) translates into an isotropic luminosity upper limit of $L_{X,UL} \sim 1.5 \times\, 10^{41} \rm erg \, s^{-1}$. Observations above 100 MeV over a many-year timescale provide an average luminosity upper limit one order of magnitude larger. These results provide the so-far most stringent limits on high-energy emission from FRB 180916 and constrain the dissipation of magnetic energy from a magnetar-like source of radius $R_m$, internal magnetic field $B_m$ and dissipation timescale $τ_d$ to satisfy the relation $R_{m,6}^3 B_{m,16}^2 τ_{d,8}^{-1} \lesssim 1$, where $R_{m,6}$ is $R_m$ in units of $10^6$ cm, $B_{m,16}$ is $B_m$ in units of $10^{16}$ G, and $τ_{d,8}$ in units of $10^8$ s.
△ Less
Submitted 7 April, 2020;
originally announced April 2020.
-
The lowest frequency Fast Radio Bursts: Sardinia Radio Telescope detection of the periodic FRB 180916 at 328 MHz
Authors:
M. Pilia,
M. Burgay,
A. Possenti,
A. Ridolfi,
V. Gajjar,
A. Corongiu,
D. Perrodin,
G. Bernardi,
G. Naldi,
G. Pupillo,
F. Ambrosino,
G. Bianchi,
A. Burtovoi,
P. Casella,
C. Casentini,
M. Cecconi,
C. Ferrigno,
M. Fiori,
K. C. Gendreau,
A. Ghedina,
G. Naletto,
L. Nicastro,
P. Ochner,
E. Palazzi,
F. Panessa
, et al. (13 additional authors not shown)
Abstract:
We report on the lowest-frequency detection to date of three bursts from the fast radio burst FRB 180916, observed at 328 MHz with the Sardinia Radio Telescope (SRT). The SRT observed the periodic repeater FRB 180916 for five days from 2020 February 20 to 24 during a time interval of active radio bursting, and detected the three bursts during the first hour of observations; no more bursts were det…
▽ More
We report on the lowest-frequency detection to date of three bursts from the fast radio burst FRB 180916, observed at 328 MHz with the Sardinia Radio Telescope (SRT). The SRT observed the periodic repeater FRB 180916 for five days from 2020 February 20 to 24 during a time interval of active radio bursting, and detected the three bursts during the first hour of observations; no more bursts were detected during the remaining ~ 30 hours. Simultaneous SRT observations at 1548 MHz did not detect any bursts. Burst fluences are in the range 37 to 13 Jy ms. No relevant scattering is observed for these bursts. We also present the results of the multi-wavelength campaign we performed on FRB 180916, during the five days of the active window. Simultaneously with the SRT observations, others with different time spans were performed with the Northern Cross at 408 MHz, with XMM-Newton, NICER, INTEGRAL, AGILE, and with the TNG and two optical telescopes in Asiago, which are equipped with fast photometers. XMM-Newton obtained data simultaneously with the three bursts detected by the SRT, and determined a luminosity upper limit in the 0.3-10 keV energy range of ~$10^{45}$ erg/s for the burst emission. AGILE obtained data simultaneously with the first burst and determined a fluence upper limit in the MeV range for millisecond timescales of $ 10^{-8}$ erg cm$^{-2}$.Our results show that absorption from the circumburst medium does not significantly affect the emission from FRB 180916, thus limiting the possible presence of a superluminous supernova around the source, and indicate that a cutoff for the bursting mechanism, if present, must be at lower frequencies. Our multi-wavelength campaign sensitively constrains the broadband emission from FRB 180916, and provides the best limits so far for the electromagnetic response to the radio bursting of this remarkable source of fast radio bursts.
△ Less
Submitted 3 July, 2020; v1 submitted 28 March, 2020;
originally announced March 2020.
-
Mechanical Ventilator Milano (MVM): A Novel Mechanical Ventilator Designed for Mass Scale Production in Response to the COVID-19 Pandemic
Authors:
C. Galbiati,
A. Abba,
P. Agnes,
P. Amaudruz,
M. Arba,
F. Ardellier-Desages,
C. Badia,
G. Batignani,
G. Bellani,
G. Bianchi,
D. Bishop,
V. Bocci,
W. Bonivento,
B. Bottino,
M. Bouchard,
S. Brice,
G. Buccino,
S. Bussino,
A. Caminata,
A. Capra,
M. Caravati,
M. Carlini,
L. Carrozzi,
J. M. Cela,
B. Celano
, et al. (123 additional authors not shown)
Abstract:
Presented here is the design of the Mechanical Ventilator Milano (MVM), a novel mechanical ventilator designed for rapid mass production in response to the COVID-19 pandemic to address the urgent shortage of intensive therapy ventilators in many countries, and the growing difficulty in procuring these devices through normal supply chains across borders. This ventilator is an electro-mechanical equ…
▽ More
Presented here is the design of the Mechanical Ventilator Milano (MVM), a novel mechanical ventilator designed for rapid mass production in response to the COVID-19 pandemic to address the urgent shortage of intensive therapy ventilators in many countries, and the growing difficulty in procuring these devices through normal supply chains across borders. This ventilator is an electro-mechanical equivalent of the old and reliable Manley Ventilator, and is able to operate in both pressure-controlled and pressure-supported ventilation modes. MVM is optimized for the COVID-19 emergency, thanks to the collaboration with medical doctors in the front line. MVM is designed for large-scale production in a short amount of time and at a limited cost, as it relays on off-the-shelf components, readily available worldwide. Operation of the MVM requires only a source of compressed oxygen (or compressed medical air) and electrical power. Initial tests of a prototype device with a breathing simulator are also presented. Further tests and developments are underway. At this stage the MVM is not yet a certified medical device but certification is in progress.
△ Less
Submitted 10 April, 2020; v1 submitted 23 March, 2020;
originally announced March 2020.
-
The Northern Cross Fast Radio Burst project. I. Overview and pilot observations at 408 MHz
Authors:
Nicola T. Locatelli,
Gianni Bernardi,
Germano Bianchi,
Riccardo Chiello,
Alessio Magro,
Giovanni Naldi,
Maura Pilia,
Giuseppe Pupillo,
Alessandro Ridolfi,
Giancarlo Setti,
Franco Vazza
Abstract:
Fast radio bursts remain one of the most enigmatic astrophysical sources. Observations have significantly progressed over the last few years, thanks to the capabilities of new radio telescopes and the refurbishment of existing ones. Here we describe the upgrade of the Northern Cross radio telescope, operating in the 400-416~MHz frequency band, with the ultimate goal of turning the array into a ded…
▽ More
Fast radio bursts remain one of the most enigmatic astrophysical sources. Observations have significantly progressed over the last few years, thanks to the capabilities of new radio telescopes and the refurbishment of existing ones. Here we describe the upgrade of the Northern Cross radio telescope, operating in the 400-416~MHz frequency band, with the ultimate goal of turning the array into a dedicated instrument to survey the sky for fast radio bursts. We present test observations of the pulsar B0329+54 to characterize the system performance and forecast detectability. Observations with the system currently in place are still limited by modest sky coverage ($\sim 9.4$~deg$^2$) and biased by smearing of high dispersion measure events within each frequency channels. In its final, upgraded configuration, however, the telescope will be able to carry out unbiased fast radio burst surveys over a $\sim 350$~deg$^2$ instantaneous field of view up to $z \sim 5$, with a (nearly constant) $\sim 760 \, (τ/{\rm ms})^{-0.5}$~mJy rms sensitivity.
△ Less
Submitted 27 March, 2020; v1 submitted 9 March, 2020;
originally announced March 2020.
-
Is It Safe Living in the Vicinity of Cellular Towers? Analysis of Long-Term Human EMF Exposure at Population Scale
Authors:
Luca Chiaraviglio,
Cristian Di Paolo,
Giuseppe Bianchi,
Nicola Blefari-Melazzi
Abstract:
We focus on the ElectroMagnetic Field (EMF) exposure safety for people living in the vicinity of cellular towers. To this aim, we analyze a large dataset of long-term EMF measurements collected over almost 20 years in more than 2000 measurement points spread over an Italian region. We evaluate the relationship between EMF exposure and the following factors: (i) distance from the closest installati…
▽ More
We focus on the ElectroMagnetic Field (EMF) exposure safety for people living in the vicinity of cellular towers. To this aim, we analyze a large dataset of long-term EMF measurements collected over almost 20 years in more than 2000 measurement points spread over an Italian region. We evaluate the relationship between EMF exposure and the following factors: (i) distance from the closest installation(s), (ii) type of EMF sources in the vicinity, (iii) Base Station (BS) technology, and (iv) EMF regulation updates. Overall, the exposure levels from BSs in the vicinity are below the Italian EMF limits, thus ensuring safety for the population. Moreover, BSs represent the lowest exposure compared to Radio/TV repeaters and other EMF sources. However, the BS EMF exposure in proximity to users exhibits an increasing trend over the last years, which is likely due to the pervasive deployment of multiple technologies and to the EMF regulation updates. As a side consideration, if the EMF levels continue to increase with the current trends, the EMF exposure in proximity to BSs will saturate to the maximum EMF limit by the next 20 years at a distance of 30 meters from the closest BS.
△ Less
Submitted 3 March, 2020; v1 submitted 3 February, 2020;
originally announced February 2020.
-
LOcAl DEcisions on Replicated States (LOADER) in programmable data planes: programming abstraction and experimental evaluation
Authors:
German Sviridov,
Marco Bonola,
Angelo Tulumello,
Paolo Giaccone,
Andrea Bianco,
Giuseppe Bianchi
Abstract:
Programmable data planes recently emerged as a prominent innovation in Software Defined Networking (SDN), by permitting support of stateful flow processing functions over hardware network switches specifically designed for network processing. Unlike early SDN solutions such as OpenFlow, modern stateful data planes permit to keep (and dynamically update) local per-flow states inside network switche…
▽ More
Programmable data planes recently emerged as a prominent innovation in Software Defined Networking (SDN), by permitting support of stateful flow processing functions over hardware network switches specifically designed for network processing. Unlike early SDN solutions such as OpenFlow, modern stateful data planes permit to keep (and dynamically update) local per-flow states inside network switches, thus dramatically improving reactiveness of network applications to state changes. Still, also in stateful data planes, the control and update of non-local states is assumed to be completely delegated to a centralized controller and thus accessed only at the price of extra delay.
Our LOADER proposal aims at contrasting the apparent dichotomy between local states and global states. We do so by introducing a new possibility: permit to take localized (in-switch) decisions not only on local states but also on replicated global states, thus providing support for network-wide applications without incurring the drawbacks of classical approaches. To this purpose, i) we provide high-level programming abstractions devised to define the states and the update logic of a generic network-wide application, and ii) we detail the underlying low level state management and replication mechanisms. We then show LOADER's independence of the stateful data plane technology employed, by implementing it over two distinct stateful data planes (P4 switches and OPP - Open Packet Processor - switches), and by experimentally validating both implementations in an emulated testbed using a simple distributed Deny-of-Service (DoS) detection application.
△ Less
Submitted 11 November, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
Rearrangement and polarization
Authors:
Gabriele Bianchi,
Richard J. Gardner,
Paolo Gronchi,
Markus Kiderlen
Abstract:
The paper has two main goals. The first is to take a new approach to rearrangements on certain classes of measurable real-valued functions on $\mathbb{R}^n$. Rearrangements are maps that are monotonic (up to sets of measure zero) and equimeasurable, i.e., they preserve the measure of super-level sets of functions. All the principal known symmetrization processes for functions, such as Steiner and…
▽ More
The paper has two main goals. The first is to take a new approach to rearrangements on certain classes of measurable real-valued functions on $\mathbb{R}^n$. Rearrangements are maps that are monotonic (up to sets of measure zero) and equimeasurable, i.e., they preserve the measure of super-level sets of functions. All the principal known symmetrization processes for functions, such as Steiner and Schwarz symmetrization, are rearrangements, and these have a multitude of applications in diverse areas of the mathematical sciences. The second goal is to understand which properties of rearrangements characterize polarization, a special rearrangement that has proved particularly useful in a number of contexts. In order to achieve this, new results are obtained on the structure of measure-preserving maps on convex bodies and of rearrangements generally.
△ Less
Submitted 1 September, 2020; v1 submitted 16 December, 2019;
originally announced December 2019.
-
Will the Proliferation of 5G Base Stations Increase the Radio-Frequency "Pollution"?
Authors:
Luca Chiaraviglio,
Giuseppe Bianchi,
Nicola Blefari-Melazzi,
Marco Fiore
Abstract:
A common concern among the population is that installing new 5G Base Stations (BSs) over a given geographic region may result in an uncontrollable increase of Radio-Frequency "Pollution" (RFP). To face this dispute in a way that can be understood by the layman, we develop a very simple model, which evaluates the RFP at selected distances between the user and the 5G BS locations. We then obtain clo…
▽ More
A common concern among the population is that installing new 5G Base Stations (BSs) over a given geographic region may result in an uncontrollable increase of Radio-Frequency "Pollution" (RFP). To face this dispute in a way that can be understood by the layman, we develop a very simple model, which evaluates the RFP at selected distances between the user and the 5G BS locations. We then obtain closed-form expressions to quantify the RFP increase/decrease when comparing a pair of alternative 5G deployments. Results show that a dense 5G deployment is beneficial to the users living in proximity to the 5G BSs, with an abrupt decrease of RFP (up to three orders of magnitude) compared to a sparse deployment. We also analyze scenarios where the user equipment minimum detectable signal threshold is increased, showing that in such cases a (slight) increase of RFP may be experienced.
△ Less
Submitted 3 March, 2020; v1 submitted 2 December, 2019;
originally announced December 2019.
-
Convergence of symmetrization processes
Authors:
Gabriele Bianchi,
Richard J. Gardner,
Paolo Gronchi
Abstract:
Steiner and Schwarz symmetrizations, and their most important relatives, the Minkowski, Minkowski-Blaschke, fiber, inner rotational, and outer rotational symmetrizations, are investigated. The focus is on the convergence of successive symmetrals with respect to a sequence of $i$-dimensional subspaces of $\mathbb{R}^n$. Such a sequence is called universal for a family of sets if the successive symm…
▽ More
Steiner and Schwarz symmetrizations, and their most important relatives, the Minkowski, Minkowski-Blaschke, fiber, inner rotational, and outer rotational symmetrizations, are investigated. The focus is on the convergence of successive symmetrals with respect to a sequence of $i$-dimensional subspaces of $\mathbb{R}^n$. Such a sequence is called universal for a family of sets if the successive symmetrals of any set in the family converge to a ball with center at the origin. New universal sequences for the main symmetrizations, for all valid dimensions $i$ of the subspaces, are found, by combining two groups of results. The first, published separately, provides finite sets ${\mathcal{F}}$ of subspaces such that reflection symmetry (or rotational symmetry) with respect to each subspace in ${\mathcal{F}}$ implies full rotational symmetry. In the second, proved here, a theorem of Klain for Steiner symmetrization is extended to Schwarz, Minkowski, Minkowski-Blaschke, and fiber symmetrizations, showing that if a sequence of subspaces is drawn from a finite set ${\mathcal{F}}$ of subspaces, the successive symmetrals of any compact convex set converge to a compact convex set that is symmetric with respect to any subspace in ${\mathcal{F}}$ appearing infinitely often in the sequence. It is also proved that for Steiner, Schwarz, and Minkowski symmetrizations, a sequence of $i$-dimensional subspaces is universal for the class of compact sets if and only if it is universal for the class of compact convex sets, and Klain's theorem is shown to hold for Schwarz symmetrization of compact sets.
△ Less
Submitted 8 February, 2022; v1 submitted 8 August, 2019;
originally announced August 2019.
-
Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate
Authors:
Giuseppe Bianchi,
Francesca Cuomo,
Domenico Garlisi,
Ilenia Tinnirello
Abstract:
LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spread…
▽ More
LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the channel capture, which our experimental results show to be very substantial in LoRa. While retaining an extremely simple and scalable implementation, this strategy yields a significant improvement (up to 38%) in the network capacity over the legacy Adaptive Data Rate (ADR), and appears to be extremely robust to different operating/load conditions and network topology configurations.
△ Less
Submitted 14 November, 2019; v1 submitted 15 July, 2019;
originally announced July 2019.
-
Adaptive mitigation of the Air-Time pressure in LoRa multi-gateway architectures
Authors:
Francesca Cuomo,
Manuel Campo,
Enrico Bassetti,
Lorenzo Cartella,
Federica Sole,
Giuseppe Bianchi
Abstract:
LoRa is a promising technology in the current Internet of Things market, which operates in un-licensed bands achieving long-range communications and with ultra power devices. In this work we capitalize on the idea introduced in [1], i.e. balance the Air-Time of the different modulation spreading factors (SF), and adapt it to operate in a typical metropolitan scenario comprising multiple gateways (…
▽ More
LoRa is a promising technology in the current Internet of Things market, which operates in un-licensed bands achieving long-range communications and with ultra power devices. In this work we capitalize on the idea introduced in [1], i.e. balance the Air-Time of the different modulation spreading factors (SF), and adapt it to operate in a typical metropolitan scenario comprising multiple gateways (GWs) interconnected to a same network server. Our proposed approach, named ADaptive Mitigation of the AIr-time pressure in lORa (AD MAIORA), relies on a suitable measure of the per-spreading-factor load at each GW - quantified by means of a so-called pressure table -, and on a relevant heuristic algorithm which attempts to balance such a per-SF-pressure. Especially in cases of very loaded scenarios, where a high number of nodes insist on the same GWs, the use of AD MAIORA shows significant performance gains, up to a factor of 5 improvements with respect to the legacy LoRaWAN's Adaptive Data Rate.
△ Less
Submitted 28 July, 2023; v1 submitted 16 June, 2019;
originally announced June 2019.
-
Model risk in mean-variance portfolio selection: an analytic solution to the worst-case approach
Authors:
Roberto Baviera,
Giulia Bianchi
Abstract:
In this paper we consider the worst-case model risk approach described in Glasserman and Xu (2014). Portfolio selection with model risk can be a challenging operational research problem. In particular, it presents an additional optimisation compared to the classical one. We find the analytical solution for the optimal mean-variance portfolio selection in the worst-case scenario approach. In the mi…
▽ More
In this paper we consider the worst-case model risk approach described in Glasserman and Xu (2014). Portfolio selection with model risk can be a challenging operational research problem. In particular, it presents an additional optimisation compared to the classical one. We find the analytical solution for the optimal mean-variance portfolio selection in the worst-case scenario approach. In the minimum-variance case, we prove that the analytical solution is significantly different from the one found numerically by Glasserman and Xu (2014) and that model risk reduces to an estimation risk. A detailed numerical example is provided.
△ Less
Submitted 1 December, 2019; v1 submitted 18 February, 2019;
originally announced February 2019.
-
The Orlicz version of the $L_p$ Minkowski problem on $S^{n-1}$ for $-n<p<0$
Authors:
Gabriele Bianchi,
Károly J. Böröczky,
Andrea Colesanti
Abstract:
An Orlicz version of the $L_p$-Minkowski problem on $S^{n-1}$ is discussed corresponding to the case $-n<p<0$.
An Orlicz version of the $L_p$-Minkowski problem on $S^{n-1}$ is discussed corresponding to the case $-n<p<0$.
△ Less
Submitted 2 September, 2020; v1 submitted 12 December, 2018;
originally announced December 2018.
-
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication
Authors:
Kostantinos Papadamou,
Savvas Zannettou,
Bogdan Chifor,
Sorin Teican,
George Gugulea,
Annamaria Recupero,
Alberto Caponi,
Claudio Pisa,
Giuseppe Bianchi,
Steven Gevers,
Christos Xenakis,
Michael Sirivianos
Abstract:
Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not allow anonymity-preserving access to services. Third, users have multiple online accounts that often reflect distinct identity aspects. This makes pro…
▽ More
Current authentication methods on the Web have serious weaknesses. First, services heavily rely on the traditional password paradigm, which diminishes the end-users' security and usability. Second, the lack of attribute-based authentication does not allow anonymity-preserving access to services. Third, users have multiple online accounts that often reflect distinct identity aspects. This makes proving combinations of identity attributes hard on the users.
In this paper, we address these weaknesses by proposing a privacy-preserving architecture for device-centric and attribute-based authentication based on: 1) the seamless integration between usable/strong device-centric authentication methods and federated login solutions; 2) the separation of the concerns for Authorization, Authentication, Behavioral Authentication and Identification to facilitate incremental deployability, wide adoption and compliance with NIST assurance levels; and 3) a novel centralized component that allows end-users to perform identity profile and consent management, to prove combinations of fragmented identity aspects, and to perform account recovery in case of device loss. To the best of our knowledge, this is the first effort towards fusing the aforementioned techniques under an integrated architecture. This architecture effectively deems the password paradigm obsolete with minimal modification on the service provider's software stack.
△ Less
Submitted 16 January, 2020; v1 submitted 20 November, 2018;
originally announced November 2018.
-
Quantum Internet: Networking Challenges in Distributed Quantum Computing
Authors:
Angela Sara Cacciapuoti,
Marcello Caleffi,
Francesco Tafuri,
Francesco Saverio Cataliotti,
Stefano Gherardini,
Giuseppe Bianchi
Abstract:
The Quantum Internet is envisioned as the final stage of the quantum revolution, opening fundamentally new communications and computing capabilities, including the distributed quantum computing. But the Quantum Internet is governed by the laws of quantum mechanics. Phenomena with no counterpart in classical networks, such as no-cloning, quantum measurement, entanglement and teleporting, impose ver…
▽ More
The Quantum Internet is envisioned as the final stage of the quantum revolution, opening fundamentally new communications and computing capabilities, including the distributed quantum computing. But the Quantum Internet is governed by the laws of quantum mechanics. Phenomena with no counterpart in classical networks, such as no-cloning, quantum measurement, entanglement and teleporting, impose very challenging constraints for the network design. Specifically, classical network functionalities, ranging from error-control mechanisms to overhead-control strategies, are based on the assumption that classical information can be safely read and copied. But this assumption does not hold in the Quantum Internet. As a consequence, the design of the Quantum Internet requires a major network-paradigm shift to harness the quantum mechanics specificities. The goal of this work is to shed light on the challenges and the open problems of the Quantum Internet design. To this aim, we first introduce some basic knowledge of quantum mechanics, needed to understand the differences between a classical and a quantum network. Then, we introduce quantum teleportation as the key strategy for transmitting quantum information without physically transferring the particle that stores the quantum information or violating the principles of the quantum mechanics. Finally, the key research challenges to design quantum communication networks are described.
△ Less
Submitted 13 February, 2019; v1 submitted 19 October, 2018;
originally announced October 2018.
-
Quantum Internet: from Communication to Distributed Computing!
Authors:
Marcello Caleffi,
Angela Sara Cacciapuoti,
Giuseppe Bianchi
Abstract:
In this invited paper, the authors discuss the exponential computing speed-up achievable by interconnecting quantum computers through a quantum internet. They also identify key future research challenges and open problems for quantum internet design and deployment.
In this invited paper, the authors discuss the exponential computing speed-up achievable by interconnecting quantum computers through a quantum internet. They also identify key future research challenges and open problems for quantum internet design and deployment.
△ Less
Submitted 11 May, 2018;
originally announced May 2018.
-
The $L_p$-Minkowski problem for $-n < p< 1$
Authors:
Gabriele Bianchi,
Károly J. Böröczky,
Andrea Colesanti,
Deane Yang
Abstract:
Chou and Wang's existence result for the $L_p$-Minkowski problem on ${\mathbb S}^{n-1}$ for $p\in(-n,1)$ and an absolutely continuous measure $μ$ is discussed and extended to more general measures. In particular, we provide an almost optimal sufficient condition for the case $p\in(0,1)$.
Chou and Wang's existence result for the $L_p$-Minkowski problem on ${\mathbb S}^{n-1}$ for $p\in(-n,1)$ and an absolutely continuous measure $μ$ is discussed and extended to more general measures. In particular, we provide an almost optimal sufficient condition for the case $p\in(0,1)$.
△ Less
Submitted 21 October, 2018; v1 submitted 12 October, 2017;
originally announced October 2017.
-
D-STREAMON: from middlebox to distributed NFV framework for network monitoring
Authors:
Pier Luigi Ventre,
Alberto Caponi,
Giuseppe Siracusano,
Davide Palmisano,
Stefano Salsano,
Marco Bonola,
Giuseppe Bianchi
Abstract:
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Consi…
▽ More
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Considering the current trend of the net- working and the requirements to counteract to the evolution of cyber-threats, it is expected that also network monitoring will move towards NFV based solutions. In this paper, we present D- StreaMon an NFV-capable distributed framework for network monitoring realized to face the above described challenges. It relies on the StreaMon platform, a solution for network monitoring originally designed for traditional middleboxes. An evolution path which migrates StreaMon from middleboxes to Virtual Network Functions (VNFs) has been realized.
△ Less
Submitted 22 June, 2017;
originally announced June 2017.
-
Smoothness in the $l_p$ Minkowski problem for $p<1$
Authors:
Gabriele Bianchi,
Károly J. Böröczky,
Andrea Colesanti
Abstract:
We discuss the smoothness and strict convexity of the solution of the $L_p$ Minkowski problem when $p<1$ and the given measure has a positive density function.
We discuss the smoothness and strict convexity of the solution of the $L_p$ Minkowski problem when $p<1$ and the given measure has a positive density function.
△ Less
Submitted 21 October, 2018; v1 submitted 20 June, 2017;
originally announced June 2017.
-
Geographical Load Balancing across Green Datacenters
Authors:
Giovanni Neglia,
Matteo Sereno,
Giuseppe Bianchi
Abstract:
"Geographic Load Balancing" is a strategy for reducing the energy cost of data centers spreading across different terrestrial locations. In this paper, we focus on load balancing among micro-datacenters powered by renewable energy sources. We model via a Markov Chain the problem of scheduling jobs by prioritizing datacenters where renewable energy is currently available. Not finding a convenient c…
▽ More
"Geographic Load Balancing" is a strategy for reducing the energy cost of data centers spreading across different terrestrial locations. In this paper, we focus on load balancing among micro-datacenters powered by renewable energy sources. We model via a Markov Chain the problem of scheduling jobs by prioritizing datacenters where renewable energy is currently available. Not finding a convenient closed form solution for the resulting chain, we use mean field techniques to derive an asymptotic approximate model which instead is shown to have an extremely simple and intuitive steady state solution. After proving, using both theoretical and discrete event simulation results, that the system performance converges to the asymptotic model for an increasing number of datacenters, we exploit the simple closed form model's solution to investigate relationships and trade-offs among the various system parameters.
△ Less
Submitted 12 December, 2016;
originally announced December 2016.
-
Towards a Stateful Forwarding Abstraction to Implement Scalable Network Functions in Software and Hardware
Authors:
Luca Petrucci,
Nicola Bonelli,
Marco Bonola,
Gregorio Procissi,
Carmelo Cascone,
Davide Sanvito,
Salvatore Pontarelli,
Giuseppe Bianchi,
Roberto Bifulco
Abstract:
An effective packet processing abstraction that leverages software or hardware acceleration techniques can simplify the implementation of high-performance virtual network functions. In this paper, we explore the suitability of SDN switches' stateful forwarding abstractions to model accelerated functions in both software and hardware accelerators, such as optimized software switches and FPGA-based…
▽ More
An effective packet processing abstraction that leverages software or hardware acceleration techniques can simplify the implementation of high-performance virtual network functions. In this paper, we explore the suitability of SDN switches' stateful forwarding abstractions to model accelerated functions in both software and hardware accelerators, such as optimized software switches and FPGA-based NICs. In particular, we select an Extended Finite State Machine abstraction and demonstrate its suitability by implementing the Linux's iptables interface. By doing so, we provide the acceleration of functions such as stateful firewalls, load balancers and dynamic NATs. We find that supporting a flow-level programming consistency model is an important feature of a programming abstraction in this context. Furthermore, we demonstrate that such a model simplifies the scaling of the system when implemented in software, enabling efficient multi-core processing without harming state consistency.
△ Less
Submitted 9 November, 2016;
originally announced November 2016.
-
D-STREAMON - a NFV-capable distributed framework for network monitoring
Authors:
Pier Luigi Ventre,
Alberto Caponi,
Davide Palmisano,
Stefano Salsano,
Giuseppe Siracusano,
Marco Bonola,
Giuseppe Bianchi
Abstract:
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. At the same time, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Consid…
▽ More
Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. At the same time, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Considering the current trend of the networking and the requirements to counteract to the evolution of cyber-threats, it is expected that also network monitoring will move towards NFV based solutions. In this paper, we present Distributed StreaMon (D-StreaMon) an NFV-capable distributed framework for network monitoring. D-StreaMon has been designed to face the above described challenges. It relies on the StreaMon platform, a solution for network monitoring originally designed for traditional middleboxes. An evolution path which migrates StreaMon from middleboxes to Virtual Network Functions (VNFs) is described. The paper reports a performance evaluation of the realized NFV based solution and discusses potential benefits in monitoring tenants' VMs for Service Providers.
△ Less
Submitted 3 August, 2016;
originally announced August 2016.
-
Open Packet Processor: a programmable architecture for wire speed platform-independent stateful in-network processing
Authors:
Giuseppe Bianchi,
Marco Bonola,
Salvatore Pontarelli,
Davide Sanvito,
Antonio Capone,
Carmelo Cascone
Abstract:
This paper aims at contributing to the ongoing debate on how to bring programmability of stateful packet processing tasks inside the network switches, while retaining platform independency. Our proposed approach, named "Open Packet Processor" (OPP), shows the viability (via an hardware prototype relying on commodity HW technologies and operating in a strictly bounded number of clock cycles) of eXt…
▽ More
This paper aims at contributing to the ongoing debate on how to bring programmability of stateful packet processing tasks inside the network switches, while retaining platform independency. Our proposed approach, named "Open Packet Processor" (OPP), shows the viability (via an hardware prototype relying on commodity HW technologies and operating in a strictly bounded number of clock cycles) of eXtended Finite State Machines (XFSM) as low-level data plane programming abstraction. With the help of examples, including a token bucket and a C4.5 traffic classifier based on a binary tree, we show the ability of OPP to support stateful operation and flow-level feature tracking. Platform independence is accomplished by decoupling the implementation of hardware primitives (registries, conditions, update instructions, forwarding actions, matching facilities) from their usage by an application formally described via an abstract XFSM. We finally discuss limitations and extensions.
△ Less
Submitted 6 May, 2016;
originally announced May 2016.
-
Symmetrization in Geometry
Authors:
G. Bianchi,
R. J. Gardner,
P. Gronchi
Abstract:
The concept of an $i$-symmetrization is introduced, which provides a convenient framework for most of the familiar symmetrization processes on convex sets. Various properties of $i$-symmetrizations are introduced and the relations between them investigated. New expressions are provided for the Steiner and Minkowski symmetrals of a compact convex set which exhibit a dual relationship between them.…
▽ More
The concept of an $i$-symmetrization is introduced, which provides a convenient framework for most of the familiar symmetrization processes on convex sets. Various properties of $i$-symmetrizations are introduced and the relations between them investigated. New expressions are provided for the Steiner and Minkowski symmetrals of a compact convex set which exhibit a dual relationship between them. Characterizations of Steiner, Minkowski and central symmetrization, in terms of natural properties that they enjoy, are given and examples are provided to show that none of the assumptions made can be dropped or significantly weakened. Other familiar symmetrizations, such as Schwarz symmetrization, are discussed and several new ones introduced.
△ Less
Submitted 21 October, 2016; v1 submitted 2 March, 2016;
originally announced March 2016.
-
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning
Authors:
Alessandro Checco,
Giuseppe Bianchi,
Doug Leith
Abstract:
We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of "hiding in the crowd" privacy. We introduce a novel matrix factorization approach suited to making recommendations in a shared group (or nym) setting and the BLC algorithm for carrying out this matrix factorization in a privacy-enhanced m…
▽ More
We propose a privacy-enhanced matrix factorization recommender that exploits the fact that users can often be grouped together by interest. This allows a form of "hiding in the crowd" privacy. We introduce a novel matrix factorization approach suited to making recommendations in a shared group (or nym) setting and the BLC algorithm for carrying out this matrix factorization in a privacy-enhanced manner. We demonstrate that the increased privacy does not come at the cost of reduced recommendation accuracy.
△ Less
Submitted 27 February, 2017; v1 submitted 18 September, 2015;
originally announced September 2015.
-
Limitations of PLL simulation: hidden oscillations in MatLab and SPICE
Authors:
G. Bianchi,
N. V. Kuznetsov,
G. A. Leonov,
M. V. Yuldashev,
R. V. Yuldashev
Abstract:
Nonlinear analysis of the phase-locked loop (PLL) based circuits is a challenging task, thus in modern engineering literature simplified mathematical models and simulation are widely used for their study. In this work the limitations of numerical approach is discussed and it is shown that, e.g. hidden oscillations may not be found by simulation. Corresponding examples in SPICE and MatLab, which ma…
▽ More
Nonlinear analysis of the phase-locked loop (PLL) based circuits is a challenging task, thus in modern engineering literature simplified mathematical models and simulation are widely used for their study. In this work the limitations of numerical approach is discussed and it is shown that, e.g. hidden oscillations may not be found by simulation. Corresponding examples in SPICE and MatLab, which may lead to wrong conclusions concerning the operability of PLL-based circuits, are presented.
△ Less
Submitted 6 September, 2015; v1 submitted 5 June, 2015;
originally announced June 2015.
-
Trapping in irradiated p-on-n silicon sensors at fluences anticipated at the HL-LHC outer tracker
Authors:
W. Adam,
T. Bergauer,
M. Dragicevic,
M. Friedl,
R. Fruehwirth,
M. Hoch,
J. Hrubec,
M. Krammer,
W. Treberspurg,
W. Waltenberger,
S. Alderweireldt,
W. Beaumont,
X. Janssen,
S. Luyckx,
P. Van Mechelen,
N. Van Remortel,
A. Van Spilbeeck,
P. Barria,
C. Caillol,
B. Clerbaux,
G. De Lentdecker,
D. Dobur,
L. Favart,
A. Grebenyuk,
Th. Lenzi
, et al. (663 additional authors not shown)
Abstract:
The degradation of signal in silicon sensors is studied under conditions expected at the CERN High-Luminosity LHC. 200 $μ$m thick n-type silicon sensors are irradiated with protons of different energies to fluences of up to $3 \cdot 10^{15}$ neq/cm$^2$. Pulsed red laser light with a wavelength of 672 nm is used to generate electron-hole pairs in the sensors. The induced signals are used to determi…
▽ More
The degradation of signal in silicon sensors is studied under conditions expected at the CERN High-Luminosity LHC. 200 $μ$m thick n-type silicon sensors are irradiated with protons of different energies to fluences of up to $3 \cdot 10^{15}$ neq/cm$^2$. Pulsed red laser light with a wavelength of 672 nm is used to generate electron-hole pairs in the sensors. The induced signals are used to determine the charge collection efficiencies separately for electrons and holes drifting through the sensor. The effective trapping rates are extracted by comparing the results to simulation. The electric field is simulated using Synopsys device simulation assuming two effective defects. The generation and drift of charge carriers are simulated in an independent simulation based on PixelAV. The effective trapping rates are determined from the measured charge collection efficiencies and the simulated and measured time-resolved current pulses are compared. The effective trapping rates determined for both electrons and holes are about 50% smaller than those obtained using standard extrapolations of studies at low fluences and suggests an improved tracker performance over initial expectations.
△ Less
Submitted 7 May, 2015;
originally announced May 2015.
-
Towards Wire-speed Platform-agnostic Control of OpenFlow Switches
Authors:
Giuseppe Bianchi,
Marco Bonola,
Antonio Capone,
Carmelo Cascone,
Salvatore Pontarelli
Abstract:
The possibility to offload, via a platform-agnostic specification, the execution of (some/part of the) control functions down to the switch and operate them at wire speed based on packet level events, would yield significant benefits in terms of control latency and reaction times, meanwhile retaining the SDN-type ability to program and instantiate a desired network operation from a central control…
▽ More
The possibility to offload, via a platform-agnostic specification, the execution of (some/part of the) control functions down to the switch and operate them at wire speed based on packet level events, would yield significant benefits in terms of control latency and reaction times, meanwhile retaining the SDN-type ability to program and instantiate a desired network operation from a central controller. While programmability inside the switches, at wire speed and using platform-independent abstractions, of "any possible'" control function seems well beyond the OpenFlow capabilities, in this paper we argue that a non trivial sub-class of stateful control functions, namely those that can be abstracted in terms of Mealy (Finite State) Machines, is already compatible with off-the-shelf OpenFlow version 1.1+ Hardware with marginal architectural modifications. With minimal additional hardware circuitry, the above sub-class can be extended to include support for bidirectional/cross-flow state handling. We demonstrate the viability of our proposed approach via two proof-of-concept implementations (hardware and software), and we show how some stateful control functionalities frequently exploited in network protocols are readily deployed using our application programming interface.
△ Less
Submitted 31 August, 2014;
originally announced September 2014.
-
The covariogram and Fourier-Laplace transform in $\mathbb{C}^n$
Authors:
Gabriele Bianchi
Abstract:
The covariogram $g_{K}$ of a convex body $K$ in $\mathbb{R}^n$ is the function which associates to each $x\in\mathbb{R}^n$ the volume of the intersection of $K$ with $K+x$. Determining $K$ from the knowledge of $g_K$ is known as the Covariogram Problem. It is equivalent to determining the characteristic function $1_K$ of $K$ from the modulus of its Fourier transform $\hat{1_K}$ in $\mathbb{R}^n$,…
▽ More
The covariogram $g_{K}$ of a convex body $K$ in $\mathbb{R}^n$ is the function which associates to each $x\in\mathbb{R}^n$ the volume of the intersection of $K$ with $K+x$. Determining $K$ from the knowledge of $g_K$ is known as the Covariogram Problem. It is equivalent to determining the characteristic function $1_K$ of $K$ from the modulus of its Fourier transform $\hat{1_K}$ in $\mathbb{R}^n$, a particular instance of the Phase Retrieval Problem.
We connect the Covariogram Problem to two aspects of the Fourier transform $\hat{1_K}$ seen as a function in $\mathbb{C}^n$. The first connection is with the problem of determining $K$ from the knowledge of the zero set of $\hat{1_K}$ in $\mathbb{C}^n$. To attack this problem T. Kobayashi studied the asymptotic behavior at infinity of this zero set. We obtain this asymptotic behavior assuming less regularity on $K$ and we use this result as an essential ingredient for proving that when $K$ is sufficiently smooth and in any dimension $n$, $K$ is determined by $g_K$ in the class of sufficiently smooth bodies.
The second connection is with the irreducibility of the entire function $\hat{1_K}$. This connection also shows a link between the Covariogram Problem and the Pompeiu Problem in integral geometry.
△ Less
Submitted 29 April, 2016; v1 submitted 30 December, 2013;
originally announced December 2013.
-
The Blaschke-Santalo Inequality
Authors:
Gabriele Bianchi,
Michael Kelly
Abstract:
The Blaschke-Santaló Inequality is the assertion that the volume product of a centrally symmetric convex body in Euclidean space is maximized by (and only by) ellipsoids. In this paper we give a Fourier analytic proof of this fact.
The Blaschke-Santaló Inequality is the assertion that the volume product of a centrally symmetric convex body in Euclidean space is maximized by (and only by) ellipsoids. In this paper we give a Fourier analytic proof of this fact.
△ Less
Submitted 4 August, 2014; v1 submitted 1 December, 2013;
originally announced December 2013.