-
An Empirical Study of Dotfiles Repositories Containing User-Specific Configuration Files
Authors:
Wenhan Zhu,
Michael W. Godfrey
Abstract:
Storing user-specific configuration files in a "dotfiles" repository is a common practice among software developers, with hundreds of thousands choosing to publicly host their repositories on GitHub. This practice not only provides developers with a simple backup mechanism for their essential configuration files, but also facilitates sharing ideas and learning from others on how best to configure…
▽ More
Storing user-specific configuration files in a "dotfiles" repository is a common practice among software developers, with hundreds of thousands choosing to publicly host their repositories on GitHub. This practice not only provides developers with a simple backup mechanism for their essential configuration files, but also facilitates sharing ideas and learning from others on how best to configure applications that are key to their daily workflows. However, our current understanding of these repository sharing practices is limited and mostly anecdotal. To address this gap, we conducted a study to delve deeper into this phenomenon. Beginning with collecting and analyzing publicly-hosted dotfiles repositories on GitHub, we discovered that maintaining dotfiles is widespread among developers. Notably, we found that 25.8% of the top 500 most-starred GitHub users maintain some form of publicly accessible dotfiles repository. Among these, configurations for text editors like Vim and shells such as bash and zsh are the most commonly tracked. Our analysis reveals that updating dotfiles is primarily driven by the need to adjust configurations (63.3%) and project meta-management (25.4%). Surprisingly, we found no significant difference in the types of dotfiles observed across code churn history patterns, suggesting that the frequency of dotfile modifications depends more on the developer than the properties of the specific dotfile and its associated application. Finally, we discuss the challenges associated with managing dotfiles, including the necessity for a reliable and effective deployment mechanism, and how the insights gleaned from dotfiles can inform tool designers by offering real-world usage information.
△ Less
Submitted 30 January, 2025;
originally announced January 2025.
-
Leveraging Reviewer Experience in Code Review Comment Generation
Authors:
Hong Yi Lin,
Patanamon Thongtanunam,
Christoph Treude,
Michael W. Godfrey,
Chunhua Liu,
Wachiraphan Charoenwet
Abstract:
Modern code review is a ubiquitous software quality assurance process aimed at identifying potential issues within newly written code. Despite its effectiveness, the process demands large amounts of effort from the human reviewers involved. To help alleviate this workload, researchers have trained deep learning models to imitate human reviewers in providing natural language code reviews. Formally,…
▽ More
Modern code review is a ubiquitous software quality assurance process aimed at identifying potential issues within newly written code. Despite its effectiveness, the process demands large amounts of effort from the human reviewers involved. To help alleviate this workload, researchers have trained deep learning models to imitate human reviewers in providing natural language code reviews. Formally, this task is known as code review comment generation. Prior work has demonstrated improvements in this task by leveraging machine learning techniques and neural models, such as transfer learning and the transformer architecture. However, the quality of the model generated reviews remain sub-optimal due to the quality of the open-source code review data used in model training. This is in part due to the data obtained from open-source projects where code reviews are conducted in a public forum, and reviewers possess varying levels of software development experience, potentially affecting the quality of their feedback. To accommodate for this variation, we propose a suite of experience-aware training methods that utilise the reviewers' past authoring and reviewing experiences as signals for review quality. Specifically, we propose experience-aware loss functions (ELF), which use the reviewers' authoring and reviewing ownership of a project as weights in the model's loss function. Through this method, experienced reviewers' code reviews yield larger influence over the model's behaviour. Compared to the SOTA model, ELF was able to generate higher quality reviews in terms of accuracy, informativeness, and comment types generated. The key contribution of this work is the demonstration of how traditional software engineering concepts such as reviewer experience can be integrated into the design of AI-based automated code review models.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
Prospective Prediction of Body Mass Index Trajectories using Multi-task Gaussian Processes
Authors:
Arthur Leroy,
Varsha Gupta,
Mya Thway Tint,
Delicia Ooi Shu Qin,
Keith M. Godfrey,
Fabian Yap,
Leck Ngee,
Yung Seng Lee,
Johan G. Eriksson,
Navin Michael,
Mauricio A. Alvarez,
Dennis Wang
Abstract:
Clinicians often investigate the body mass index (BMI) trajectories of children to assess their growth with respect to their peers, as well as to anticipate future growth and disease risk. While retrospective modelling of BMI trajectories has been an active area of research, prospective prediction of continuous BMI trajectories from historical growth data has not been well investigated. Using weig…
▽ More
Clinicians often investigate the body mass index (BMI) trajectories of children to assess their growth with respect to their peers, as well as to anticipate future growth and disease risk. While retrospective modelling of BMI trajectories has been an active area of research, prospective prediction of continuous BMI trajectories from historical growth data has not been well investigated. Using weight and height measurements from birth to age 10 years from a longitudinal mother-offspring cohort, we leveraged a multi-task Gaussian processes model, called MagmaClust, to derive probabilistic predictions for BMI trajectories over various forecasting periods. Experiments were conducted to evaluate the accuracy, sensitivity to missing values, and number of clusters. The results were compared with cubic B-spline regression and a parametric Jenss-Bayley mixed effects model. A downstream tool computing individual overweight probabilities was also proposed and evaluated. In all experiments, MagmaClust outperformed conventional models in prediction accuracy while correctly calibrating uncertainty regardless of the missing data amount (up to 90\% missing) or the forecasting period (from 2 to 8 years in the future). Moreover, the overweight probabilities computed from MagmaClust's uncertainty quantification exhibited high specificity ($0.94$ to $0.96$) and accuracy ($0.86$ to $0.94$) in predicting the 10-year overweight status even from age 2 years. MagmaClust provides a probabilistic non-parametric framework to prospectively predict BMI trajectories, which is robust to missing values and outperforms conventional BMI trajectory modelling approaches. It also clusters individuals to identify typical BMI patterns (early peak, adiposity rebounds) during childhood. Overall, we demonstrated its potential to anticipate BMI evolution throughout childhood, allowing clinicians to implement prevention strategies.
△ Less
Submitted 4 February, 2024;
originally announced February 2024.
-
What Is an App Store? The Software Engineering Perspective
Authors:
Wenhan Zhu,
Sebastian Proksch,
Daniel M. German,
Michael W. Godfrey,
Li Li,
Shane McIntosh
Abstract:
"App stores" are online software stores where end users may browse, purchase, download, and install software applications. By far, the best known app stores are associated with mobile platforms, such as Google Play for Android and Apple's App Store for iOS. The ubiquity of smartphones has led to mobile app stores becoming a touchstone experience of modern living. However, most of app store researc…
▽ More
"App stores" are online software stores where end users may browse, purchase, download, and install software applications. By far, the best known app stores are associated with mobile platforms, such as Google Play for Android and Apple's App Store for iOS. The ubiquity of smartphones has led to mobile app stores becoming a touchstone experience of modern living. However, most of app store research has concentrated on properties of the apps rather than the stores themselves. Today, there is a rich diversity of app stores and these stores have largely been overlooked by researchers: app stores exist on many distinctive platforms, are aimed at different classes of users, and have different end-goals beyond simply selling a standalone app to a smartphone user.
We survey and characterize the broader dimensionality of app stores, and explore how and why they influence software development practices, such as system design and release management. We begin by collecting a set of app store examples from web search queries. By analyzing and curating the results, we derive a set of features common to app stores. We then build a dimensional model of app stores based on these features, and we fit each app store from our web search result set into this model. Next, we performed unsupervised clustering to the app stores to find their natural groupings. Our results suggest that app stores have become an essential stakeholder in modern software development. They control the distribution channel to end users and ensure that the applications are of suitable quality; in turn, this leads to developers adhering to various store guidelines when creating their applications. However, we found the app stores operational model could vary widely between stores, and this variability could in turn affect the generalizability of existing understanding of app stores.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
An empirical study of question discussions on Stack Overflow
Authors:
Wenhan Zhu,
Haoxiang Zhang,
Ahmed E. Hassan,
Michael W. Godfrey
Abstract:
Stack Overflow provides a means for developers to exchange knowledge. While much previous research on Stack Overflow has focused on questions and answers (Q&A), recent work has shown that discussions in comments also contain rich information. On Stack Overflow, discussions through comments and chat rooms can be tied to questions or answers. In this paper, we conduct an empirical study that focuses…
▽ More
Stack Overflow provides a means for developers to exchange knowledge. While much previous research on Stack Overflow has focused on questions and answers (Q&A), recent work has shown that discussions in comments also contain rich information. On Stack Overflow, discussions through comments and chat rooms can be tied to questions or answers. In this paper, we conduct an empirical study that focuses on the nature of question discussions. We observe that: (1) Question discussions occur at all phases of the Q&A process, with most beginning before the first answer is received. (2) Both askers and answerers actively participate in question discussions; the likelihood of their participation increases as the number of comments increases. (3) There is a strong correlation between the number of question comments and the question answering time (i.e., more discussed questions receive answers more slowly); also, questions with a small number of comments are likely to be answered more quickly than questions with no discussion. Our findings suggest that question discussions contain a rich trove of data that is integral to the Q&A processes on Stack Overflow. We further suggest how future research can leverage the information in question discussions, along with the commonly studied Q&A information.
△ Less
Submitted 19 July, 2022; v1 submitted 27 September, 2021;
originally announced September 2021.
-
DocTer: Documentation Guided Fuzzing for Testing Deep Learning API Functions
Authors:
Danning Xie,
Yitong Li,
Mijung Kim,
Hung Viet Pham,
Lin Tan,
Xiangyu Zhang,
Michael W. Godfrey
Abstract:
Input constraints are useful for many software development tasks. For example, input constraints of a function enable the generation of valid inputs, i.e., inputs that follow these constraints, to test the function deeper. API functions of deep learning (DL) libraries have DL specific input constraints, which are described informally in the free form API documentation. Existing constraint extracti…
▽ More
Input constraints are useful for many software development tasks. For example, input constraints of a function enable the generation of valid inputs, i.e., inputs that follow these constraints, to test the function deeper. API functions of deep learning (DL) libraries have DL specific input constraints, which are described informally in the free form API documentation. Existing constraint extraction techniques are ineffective for extracting DL specific input constraints.
To fill this gap, we design and implement a new technique, DocTer, to analyze API documentation to extract DL specific input constraints for DL API functions. DocTer features a novel algorithm that automatically constructs rules to extract API parameter constraints from syntactic patterns in the form of dependency parse trees of API descriptions. These rules are then applied to a large volume of API documents in popular DL libraries to extract their input parameter constraints. To demonstrate the effectiveness of the extracted constraints, DocTer uses the constraints to enable the automatic generation of valid and invalid inputs to test DL API functions.
Our evaluation on three popular DL libraries (TensorFlow, PyTorch, and MXNet) shows that the precision of DocTer in extracting input constraints is 85.4%. DocTer detects 94 bugs from 174 API functions, including one previously unknown security vulnerability that is now documented in the CVE database, while a baseline technique without input constraints detects only 59 bugs. Most (63) of the 94 bugs are previously unknown, 54 of which have been fixed or confirmed by developers after we report them. In addition, DocTer detects 43 inconsistencies in documents, 39 of which are fixed or confirmed.
△ Less
Submitted 5 March, 2024; v1 submitted 2 September, 2021;
originally announced September 2021.
-
Mea culpa: How developers fix their own simple bugs differently from other developers
Authors:
Wenhan Zhu,
Michael W. Godfrey
Abstract:
In this work, we study how the authorship of code affects bug-fixing commits using the SStuBs dataset, a collection of single-statement bug fix changes in popular Java Maven projects. More specifically, we study the differences in characteristics between simple bug fixes by the original author -- that is, the developer who submitted the bug-inducing commit -- and by different developers (i.e., non…
▽ More
In this work, we study how the authorship of code affects bug-fixing commits using the SStuBs dataset, a collection of single-statement bug fix changes in popular Java Maven projects. More specifically, we study the differences in characteristics between simple bug fixes by the original author -- that is, the developer who submitted the bug-inducing commit -- and by different developers (i.e., non-authors). Our study shows that nearly half (i.e., 44.3%) of simple bugs are fixed by a different developer. We found that bug fixes by the original author and by different developers differed qualitatively and quantitatively. We observed that bug-fixing time by authors is much shorter than that of other developers. We also found that bug-fixing commits by authors tended to be larger in size and scope, and address multiple issues, whereas bug-fixing commits by other developers tended to be smaller and more focused on the bug itself. Future research can further study the different patterns in bug-fixing and create more tailored tools based on the developer's needs.
△ Less
Submitted 22 March, 2021;
originally announced March 2021.
-
Marginally jammed states of hard disks in a one-dimensional channel
Authors:
Yuxiao Zhang,
M. J. Godfrey,
M. A. Moore
Abstract:
We have studied a class of marginally jammed states in a system of hard disks confined in a narrow channel---a quasi-one-dimensional system---whose exponents are not those predicted by theories valid in the infinite dimensional limit. The exponent $γ$ which describes the distribution of small gaps takes the value $1$ rather than the infinite dimensional value $0.41269\dots$. Our work shows that th…
▽ More
We have studied a class of marginally jammed states in a system of hard disks confined in a narrow channel---a quasi-one-dimensional system---whose exponents are not those predicted by theories valid in the infinite dimensional limit. The exponent $γ$ which describes the distribution of small gaps takes the value $1$ rather than the infinite dimensional value $0.41269\dots$. Our work shows that there exist jammed states not found within the tiling approach of Ashwin and Bowles. The most dense of these marginal states is an unusual state of matter that is asymptotically crystalline.
△ Less
Submitted 22 October, 2020; v1 submitted 6 May, 2020;
originally announced May 2020.
-
The Gardner correlation length scale in glasses
Authors:
M. J. Godfrey,
M. A. Moore
Abstract:
The Gardner length scale $ξ$ is the correlation length in the vicinity of the Gardner transition, which is an avoided transition in glasses where the phase space of the glassy phase fractures into smaller sub-basins on experimental time scales. We argue that $ξ$ grows like $ \sim \sqrt{B_{\infty}/G_{\infty}}$, where $B_{\infty}$ is the bulk modulus and $G_{\infty}$ is the shear modulus, both measu…
▽ More
The Gardner length scale $ξ$ is the correlation length in the vicinity of the Gardner transition, which is an avoided transition in glasses where the phase space of the glassy phase fractures into smaller sub-basins on experimental time scales. We argue that $ξ$ grows like $ \sim \sqrt{B_{\infty}/G_{\infty}}$, where $B_{\infty}$ is the bulk modulus and $G_{\infty}$ is the shear modulus, both measured in the high-frequency limit of the glassy state. We suggest that $ξ$ might be inferred from stress-stress correlation functions, which is more practical for experimental investigation than studying two copies of the system, which can only be done in numerical simulations. Our arguments are illustrated by explicit calculations for a system of disks moving in a narrow channel, which is solved exactly by transfer matrix techniques.
△ Less
Submitted 16 August, 2020; v1 submitted 27 January, 2020;
originally announced January 2020.
-
Absence of hyperuniformity in amorphous hard-sphere packings of nonvanishing complexity
Authors:
M. J. Godfrey,
M. A. Moore
Abstract:
We relate the structure factor $S(\mathbf{k} \to \mathbf{0})$ in a system of jammed hard spheres of number density $ρ$ to its complexity per particle $Σ(ρ)$ by the formula $S(\mathbf{k} \to \mathbf{0})=-1/ [ρ^2Σ''(ρ)+2ρΣ'(ρ)]$. We have verified this formula for the case of jammed disks in a narrow channel, for which it is possible to find $Σ(ρ)$ and $S(\mathbf{k})$ analytically. Hyperuniformity, w…
▽ More
We relate the structure factor $S(\mathbf{k} \to \mathbf{0})$ in a system of jammed hard spheres of number density $ρ$ to its complexity per particle $Σ(ρ)$ by the formula $S(\mathbf{k} \to \mathbf{0})=-1/ [ρ^2Σ''(ρ)+2ρΣ'(ρ)]$. We have verified this formula for the case of jammed disks in a narrow channel, for which it is possible to find $Σ(ρ)$ and $S(\mathbf{k})$ analytically. Hyperuniformity, which is the vanishing of $S(\mathbf{k} \to \mathbf{0})$, will therefore not occur if the complexity is nonzero. An example is given of a jammed state of hard disks in a narrow channel which is hyperuniform when generated by dynamical rules that produce a non-extensive complexity.
△ Less
Submitted 20 August, 2018; v1 submitted 13 April, 2018;
originally announced April 2018.
-
The Gardner transition in physical dimensions
Authors:
C. L. Hicks,
M. J. Wheatley,
M. J. Godfrey,
M. A. Moore
Abstract:
The Gardner transition is the transition that at mean-field level separates a stable glass phase from a marginally stable phase. This transition has similarities with the de Almeida-Thouless transition of spin glasses. We have studied a well-understood problem, that of disks moving in a narrow channel, which shows many features usually associated with the Gardner transition. However, we can show t…
▽ More
The Gardner transition is the transition that at mean-field level separates a stable glass phase from a marginally stable phase. This transition has similarities with the de Almeida-Thouless transition of spin glasses. We have studied a well-understood problem, that of disks moving in a narrow channel, which shows many features usually associated with the Gardner transition. However, we can show that some of these features are artifacts that arise when a disk escapes its local cage during the quench to higher densities. There is evidence that the Gardner transition becomes an avoided transition, in that the correlation length becomes quite large, of order 15 particle diameters, even in our quasi-one-dimensional system.
△ Less
Submitted 14 June, 2018; v1 submitted 18 August, 2017;
originally announced August 2017.
-
Chip-based Quantum Key Distribution
Authors:
Philip Sibson,
Chris Erven,
Mark Godfrey,
Shigehito Miki,
Taro Yamashita,
Mikio Fujiwara,
Masahide Sasaki,
Hirotaka Terai,
Michael G. Tanner,
Chandra M. Natarajan,
Robert H. Hadfield,
Jeremy L. O'Brien,
Mark G. Thompson
Abstract:
Improvement in secure transmission of information is an urgent practical need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and even deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and practical large-scale de…
▽ More
Improvement in secure transmission of information is an urgent practical need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and even deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and practical large-scale deployment will likely require integrated chip-based devices for improved performance, miniaturisation and enhanced functionality, fully integrated into classical communication networks. Here we report low error rate, GHz clocked QKD operation of an InP transmitter chip and a SiO$_x$N$_y$ receiver chip --- monolithically integrated devices that use state-of-the-art components and manufacturing processes from the telecom industry. We use the reconfigurability of these devices to demonstrate three important QKD protocols --- BB84, Coherent One Way (COW) and Differential Phase Shift (DPS) --- with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, satisfy the requirements at each of the levels of future QKD networks --- from point-of-use through to backbone --- and open the way to operation in existing and emerging classical communication networks.
△ Less
Submitted 2 September, 2015;
originally announced September 2015.
-
Glass-like behavior of a hard-disk fluid confined to a narrow channel
Authors:
J. F. Robinson,
M. J. Godfrey,
M. A. Moore
Abstract:
Disks moving in a narrow channel have many features in common with the glassy behavior of hard spheres in three dimensions. In this paper we study the caging behavior of the disks which sets in at characteristic packing fraction $φ_d$. Four-point overlap functions similar to those studied when investigating dynamical heterogeneities have been determined from event driven molecular dynamics simulat…
▽ More
Disks moving in a narrow channel have many features in common with the glassy behavior of hard spheres in three dimensions. In this paper we study the caging behavior of the disks which sets in at characteristic packing fraction $φ_d$. Four-point overlap functions similar to those studied when investigating dynamical heterogeneities have been determined from event driven molecular dynamics simulations and the time dependent dynamical length scale has been extracted from them. The dynamical length scale increases with time and, on the equilibration time scale, it is proportional to the static length scale associated with the zigzag ordering in the system, which grows rapidly above $φ_d$. The structural features responsible for the onset of caging and the glassy behavior are easy to identify as they show up in the structure factor, which we have determined exactly from the transfer matrix approach.
△ Less
Submitted 8 March, 2016; v1 submitted 15 January, 2015;
originally announced January 2015.
-
Understanding the ideal glass transition: Lessons from an equilibrium study of hard disks in a channel
Authors:
M. J. Godfrey,
M. A. Moore
Abstract:
We use an exact transfer-matrix approach to compute the equilibrium properties of a system of hard disks of diameter $σ$ confined to a two-dimensional channel of width $1.95\,σ$ at constant longitudinal applied force. At this channel width, which is sufficient for next-nearest-neighbor disks to interact, the system is known to have a great many jammed states. Our calculations show that the longitu…
▽ More
We use an exact transfer-matrix approach to compute the equilibrium properties of a system of hard disks of diameter $σ$ confined to a two-dimensional channel of width $1.95\,σ$ at constant longitudinal applied force. At this channel width, which is sufficient for next-nearest-neighbor disks to interact, the system is known to have a great many jammed states. Our calculations show that the longitudinal force (pressure) extrapolates to infinity at a well-defined packing fraction $φ_K$ that is less than the maximum possible $φ_{\rm max}$, the latter corresponding to a buckled crystal. In this quasi-one-dimensional problem there is no question of there being any \emph{real} divergence of the pressure at $φ_K$. We give arguments that this avoided phase transition is a structural feature -- the remnant in our narrow channel system of the hexatic to crystal transition -- but that it has the phenomenology of the (avoided) ideal glass transition. We identify a length scale $\tildeξ_3$ as our equivalent of the penetration length for amorphous order: In the channel system, it reaches a maximum value of around $15\,σ$ at $φ_K$, which is larger than the penetration lengths that have been reported for three dimensional systems. It is argued that the $α$-relaxation time would appear on extrapolation to diverge in a Vogel-Fulcher manner as the packing fraction approaches $φ_K$.
△ Less
Submitted 18 February, 2015; v1 submitted 18 November, 2014;
originally announced November 2014.
-
Static and dynamical properties of a hard-disk fluid confined to a narrow channel
Authors:
M. J. Godfrey,
M. A. Moore
Abstract:
The thermodynamic properties of disks moving in a channel sufficiently narrow that they can collide only with their nearest neighbors can be solved exactly by determining the eigenvalues and eigenfunctions of an integral equation. Using it we have determined the correlation length $ξ$ of this system. We have developed an approximate solution which becomes exact in the high density limit. It descri…
▽ More
The thermodynamic properties of disks moving in a channel sufficiently narrow that they can collide only with their nearest neighbors can be solved exactly by determining the eigenvalues and eigenfunctions of an integral equation. Using it we have determined the correlation length $ξ$ of this system. We have developed an approximate solution which becomes exact in the high density limit. It describes the system in terms of defects in the regular zigzag arrangement of disks found in the high-density limit. The correlation length is then effectively the spacing between the defects. The time scales for defect creation and annihilation are determined with the help of transition-state theory, as is the diffusion coefficient of the defects, and these results are found to be in good agreement with molecular dynamics simulations. On compressing the system with the Lubachevsky--Stillinger procedure, jammed states are obtained whose packing fractions $φ_J$ are a function of the compression rate $γ$. We find a quantitative explanation of this dependence by making use of the Kibble--Zurek hypothesis. We have also determined the point-to-set length scale $ξ_{PS}$ for this system. At a packing fraction $φ$ close to its largest value $φ_{\text{max}}$, $ξ_{PS}$ has a simple power law divergence, $ξ_{PS} \sim 1/(1-φ/φ_{\text{max}})$, while $ξ$ diverges much faster, $\ln(ξ) \sim 1/(1-φ/φ_{\text{max}})$.
△ Less
Submitted 14 March, 2014; v1 submitted 20 December, 2013;
originally announced December 2013.
-
Transition state theory and the dynamics of hard disks
Authors:
M. Barnett-Jones,
P. A. Dickinson,
M. J. Godfrey,
T. Grundy,
M. A. Moore
Abstract:
The dynamics of two and five disk systems confined in a square has been studied using molecular dynamics simulations and compared with the predictions of transition state theory. We determine the partition functions Z and Z^\ddagger of transition state theory using a procedure first used by Salsburg and Wood for the pressure. Our simulations show this procedure and transition state theory are in e…
▽ More
The dynamics of two and five disk systems confined in a square has been studied using molecular dynamics simulations and compared with the predictions of transition state theory. We determine the partition functions Z and Z^\ddagger of transition state theory using a procedure first used by Salsburg and Wood for the pressure. Our simulations show this procedure and transition state theory are in excellent agreement with the simulations. A generalization of the transition state theory to the case of a large number of disks N is made and shown to be in full agreement with simulations of disks moving in a narrow channel. The same procedure for hard spheres in three dimensions leads to the Vogel-Fulcher-Tammann formula for their alpha relaxation time.
△ Less
Submitted 18 September, 2013; v1 submitted 8 November, 2012;
originally announced November 2012.
-
Carrier localization mechanisms in InGaN/GaN quantum wells
Authors:
D. Watson-Parris,
M. J. Godfrey,
P. Dawson,
R. A. Oliver,
M. J. Galtrey,
M. J. Kappers,
C. J. Humphreys
Abstract:
Localization lengths of the electrons and holes in InGaN/GaN quantum wells have been calculated using numerical solutions of the effective mass Schrödinger equation. We have treated the distribution of indium atoms as random and found that the resultant fluctuations in alloy concentration can localize the carriers. By using a locally varying indium concentration function we have calculated the con…
▽ More
Localization lengths of the electrons and holes in InGaN/GaN quantum wells have been calculated using numerical solutions of the effective mass Schrödinger equation. We have treated the distribution of indium atoms as random and found that the resultant fluctuations in alloy concentration can localize the carriers. By using a locally varying indium concentration function we have calculated the contribution to the potential energy of the carriers from band gap fluctuations, the deformation potential and the spontaneous and piezoelectric fields. We have considered the effect of well width fluctuations and found that these contribute to electron localization, but not to hole localization. We also simulate low temperature photoluminescence spectra and find good agreement with experiment.
△ Less
Submitted 7 June, 2010;
originally announced June 2010.
-
Aharonov-Bohm-Like Oscillations in Quantum Hall Corrals
Authors:
M. D. Godfrey,
P. Jiang,
W. Kang,
S. H. Simon,
K. W. Baldwin,
L. N. Pfeiffer,
K. W. West
Abstract:
Experimental study of quantum Hall corrals reveals Aharonov-Bohm-Like (ABL) oscillations. Unlike the Aharonov-Bohm effect which has a period of one flux quantum, $Φ_{0}$, the ABL oscillations possess a flux period of $Φ_{0}/f$, where $f$ is the integer number of fully filled Landau levels in the constrictions. Detection of the ABL oscillations is limited to the low magnetic field side of the…
▽ More
Experimental study of quantum Hall corrals reveals Aharonov-Bohm-Like (ABL) oscillations. Unlike the Aharonov-Bohm effect which has a period of one flux quantum, $Φ_{0}$, the ABL oscillations possess a flux period of $Φ_{0}/f$, where $f$ is the integer number of fully filled Landau levels in the constrictions. Detection of the ABL oscillations is limited to the low magnetic field side of the $ν_{c}$ = 1, 2, 4, 6... integer quantum Hall plateaus. These oscillations can be understood within the Coulomb blockade model of quantum Hall interferometers as forward tunneling and backscattering, respectively, through the center island of the corral from the bulk and the edge states. The evidence for quantum interference is weak and circumstantial.
△ Less
Submitted 17 August, 2007;
originally announced August 2007.
-
Using quantum key distribution for cryptographic purposes: a survey
Authors:
Romain Alléaume,
Cyril Branciard,
Jan Bouda,
Thierry Debuisschert,
Mehrdad Dianati,
Nicolas Gisin,
Mark Godfrey,
Philippe Grangier,
Thomas Langer,
Norbert Lutkenhaus,
Christian Monyk,
Philippe Painchault,
Momtchil Peev,
Andreas Poppe,
Thomas Pornin,
John Rarity,
Renato Renner,
Gregoire Ribordy,
Michel Riguidel,
Louis Salvail,
Andrew Shields,
Harald Weinfurter,
Anton Zeilinger
Abstract:
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the…
▽ More
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
△ Less
Submitted 4 December, 2014; v1 submitted 23 January, 2007;
originally announced January 2007.
-
Low Cost and Compact Quantum Cryptography
Authors:
J. L. Duligall,
M. S. Godfrey,
K. A. Harrison,
W. J. Munro,
J. G. Rarity
Abstract:
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is sho…
▽ More
We present the design of a novel free-space quantum cryptography system, complete with purpose-built software, that can operate in daylight conditions. The transmitter and receiver modules are built using inexpensive off-the-shelf components. Both modules are compact allowing the generation of renewed shared secrets on demand over a short range of a few metres. An analysis of the software is shown as well as results of error rates and therefore shared secret yields at varying background light levels. As the system is designed to eventually work in short-range consumer applications, we also present a use scenario where the consumer can regularly 'top up' a store of secrets for use in a variety of one-time-pad and authentication protocols.
△ Less
Submitted 3 October, 2006; v1 submitted 28 August, 2006;
originally announced August 2006.
-
Non-invasive detection of the evolution of the charge states of a double dot system
Authors:
A. W. Rushforth,
C. G. Smith,
M. D. Godfrey,
H. E. Beere,
D. A. Ritchie,
M. Pepper
Abstract:
Coupled quantum dots are potential candidates for qubit systems in quantum computing. We use a non-invasive voltage probe to study the evolution of a coupled dot system from a situation where the dots are coupled to the leads to a situation where they are isolated from the leads. Our measurements allow us to identify the movement of electrons between the dots and we can also identify the presenc…
▽ More
Coupled quantum dots are potential candidates for qubit systems in quantum computing. We use a non-invasive voltage probe to study the evolution of a coupled dot system from a situation where the dots are coupled to the leads to a situation where they are isolated from the leads. Our measurements allow us to identify the movement of electrons between the dots and we can also identify the presence of a charge trap in our system by detecting the movement of electrons between the dots and the charge trap. The data also reveals evidence of electrons moving between the dots via excited states of either the single dots or the double dot molecule.
△ Less
Submitted 2 February, 2004;
originally announced February 2004.
-
Carrier relaxation with LO phonon decay in semiconductor quantum dots
Authors:
S. A. Levetas,
M. J. Godfrey,
P. Dawson
Abstract:
Analysis of an exactly soluble model of phonons coupled to a carrier in a quantum dot provides a clear illustration of a phonon bottleneck to relaxation. The introduction of three-phonon interactions leads to a broad window for relaxation by the processes of LO phonon scattering and decay.
Analysis of an exactly soluble model of phonons coupled to a carrier in a quantum dot provides a clear illustration of a phonon bottleneck to relaxation. The introduction of three-phonon interactions leads to a broad window for relaxation by the processes of LO phonon scattering and decay.
△ Less
Submitted 20 October, 2000;
originally announced October 2000.