Skip to main content

Showing 1–50 of 58 results for author: Paterson, M

.
  1. arXiv:2504.20953  [pdf, other

    quant-ph

    Optimal Local Simulations of a Quantum Singlet

    Authors: David Llamas, Dmitry Chistikov, Adrian Kent, Mike Paterson, Olga Goulko

    Abstract: Bell's seminal work showed that no local hidden variable (LHV) model can fully reproduce the quantum correlations of a two-qubit singlet state. His argument and later developments by Clauser et al. effectively rely on gaps between the anticorrelations achievable by classical models and quantum theory for projective measurements along randomly chosen axes separated by a fixed angle. However, the si… ▽ More

    Submitted 29 April, 2025; originally announced April 2025.

  2. arXiv:2412.16267  [pdf, other

    cs.SD cs.LG eess.AS q-bio.QM

    A Classification Benchmark for Artificial Intelligence Detection of Laryngeal Cancer from Patient Voice

    Authors: Mary Paterson, James Moor, Luisa Cutillo

    Abstract: Cases of laryngeal cancer are predicted to rise significantly in the coming years. Current diagnostic pathways are inefficient, putting undue stress on both patients and the medical system. Artificial intelligence offers a promising solution by enabling non-invasive detection of laryngeal cancer from patient voice, which could help prioritise referrals more effectively. A major barrier in this fie… ▽ More

    Submitted 13 May, 2025; v1 submitted 20 December, 2024; originally announced December 2024.

    Comments: 16 pages, 6 figures, 10 tables

  3. arXiv:2411.15884  [pdf, ps, other

    math.GR math.CO

    Near-factorizations of dihedral groups

    Authors: Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson

    Abstract: We investigate near-factorizations of nonabelian groups, concentrating on dihedral groups. We show that some known constructions of near-factorizations in dihedral groups yield equivalent near-factorizations. In fact, there are very few known examples of nonequivalent near-factorizations in dihedral or other nonabelian groups; we provide some new examples with the aid of the computer. We also anal… ▽ More

    Submitted 28 January, 2025; v1 submitted 24 November, 2024; originally announced November 2024.

    MSC Class: 05B10

  4. arXiv:2409.08094  [pdf, ps, other

    math.CO

    Daniel Litt's Probability Puzzle

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: In this expository note, we discuss a ``balls-and-urns'' probability puzzle posed by Daniel Litt.

    Submitted 12 September, 2024; originally announced September 2024.

    MSC Class: 05-01

  5. arXiv:2406.16805  [pdf, ps, other

    math.NT math.CO

    Beyond uniform cyclotomy

    Authors: Sophie Huczynska, Laura Johnson, Maura B. Paterson

    Abstract: Cyclotomy, the study of cyclotomic classes and cyclotomic numbers, is an area of number theory first studied by Gauss. It has natural applications in discrete mathematics and information theory. Despite this long history, there are significant limitations to what is known explicitly about cyclotomic numbers, which limits the use of cyclotomy in applications. The main explicit tool available is tha… ▽ More

    Submitted 24 February, 2025; v1 submitted 24 June, 2024; originally announced June 2024.

    MSC Class: 11T22; 05B10; 05B25

  6. arXiv:2406.09075  [pdf, ps, other

    math.CO

    Strong External Difference Families and Classification of $α$-valuations

    Authors: Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson

    Abstract: One method of constructing $(a^2+1, 2,a, 1)$-SEDFs (i.e., strong external difference families) in $\mathbb{Z}_{a^2+1}$ makes use of $α$-valuations of complete bipartite graphs $K_{a,a}$. We explore this approach and we provide a classification theorem which shows that all such $α$-valuations can be constructed recursively via a sequence of ``blow-up'' operations. We also enumerate all… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    MSC Class: 05B10; 05C78

  7. arXiv:2402.10195  [pdf, other

    physics.chem-ph

    Using a multistate Mapping Approach to Surface Hopping to predict the Ultrafast Electron Diffraction signal of gas-phase cyclobutanone

    Authors: Lewis Hutton, Andres Moreno Carrascosa, Andrew W. Prentice, Mats Simmermacher, Johan E. Runeson, Martin J. Paterson, Adam Kirrander

    Abstract: Using the recently developed multistate mapping approach to surface hopping (multistate MASH) method combined with SA(3)-CASSCF(12,12)/aug-cc-pVDZ electronic structure calculations, the gas-phase isotropic ultrafast electron diffraction (UED) of cyclobutanone is predicted and analyzed. After excitation into the n-3s Rydberg state (S$_2$), cyclobutanone can relax through two S$_2$/S$_1$ conical int… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

    Comments: Cyclobutanone prediction challenge in Journal of Chemical Physics

    Journal ref: J. Chem. Phys. 160, 204307 (2024)

  8. arXiv:2310.02810  [pdf, ps, other

    math.CO cs.CR

    Circular external difference families, graceful labellings and cyclotomy

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: (Strong) circular external difference families (which we denote as CEDFs and SCEDFs) can be used to construct nonmalleable threshold schemes. They are a variation of (strong) external difference families, which have been extensively studied in recent years. We provide a variety of constructions for CEDFs based on graceful labellings ($α$-valuations) of lexicographic products… ▽ More

    Submitted 27 October, 2023; v1 submitted 4 October, 2023; originally announced October 2023.

    MSC Class: 05B10; 94A60; 05C78; 11T22

  9. arXiv:2307.09230  [pdf, other

    cs.LG cs.SD eess.AS

    Detecting Throat Cancer from Speech Signals using Machine Learning: A Scoping Literature Review

    Authors: Mary Paterson, James Moor, Luisa Cutillo

    Abstract: Introduction: Cases of throat cancer are rising worldwide. With survival decreasing significantly at later stages, early detection is vital. Artificial intelligence (AI) and machine learning (ML) have the potential to detect throat cancer from patient speech, facilitating earlier diagnosis and reducing the burden on overstretched healthcare systems. However, no comprehensive review has explored th… ▽ More

    Submitted 20 December, 2024; v1 submitted 18 July, 2023; originally announced July 2023.

    Comments: 18 pages, 12 figures, 5 tables

  10. arXiv:2104.11076  [pdf, ps, other

    cs.CR math.CO

    Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a group generated splitting authenticati… ▽ More

    Submitted 24 August, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

    MSC Class: 94A62; 05B05; 05B10

  11. arXiv:2102.03528  [pdf, ps, other

    math.CO

    More about Exact Slow $k$-Nim

    Authors: Nikolay Chikin, Vladimir Gurvich, Konstantin Knop, Mike Paterson, Michael Vyalyi

    Abstract: Given $n$ piles of tokens and a positive integer $k \leq n$, the game Nim$^1_{n, =k}$ of exact slow $k$-Nim is played as follows. Two players move alternately. In each move, a player chooses exactly $k$ non-empty piles and removes one token from each of them. A player whose turn it is to move but has no move loses (if the normal version of the game is played, and wins if it is the misére version).… ▽ More

    Submitted 6 February, 2021; originally announced February 2021.

    Comments: 17 pages

    MSC Class: 91A46; 91A05

  12. arXiv:2008.11448  [pdf, other

    math.CO cs.DS

    Haystack Hunting Hints and Locker Room Communication

    Authors: Artur Czumaj, George Kontogeorgiou, Mike Paterson

    Abstract: We want to efficiently find a specific object in a large unstructured set, which we model by a random $n$-permutation, and we have to do it by revealing just a single element. Clearly, without any help this task is hopeless and the best one can do is select the element at random, and achieve the success probability $\frac{1}{n}$. Can we do better with some small amount of advice about the permutat… ▽ More

    Submitted 3 June, 2021; v1 submitted 26 August, 2020; originally announced August 2020.

    Comments: 27 pages, 1 figure

  13. arXiv:2001.06442  [pdf, other

    quant-ph cs.DM math-ph math.CA

    Globe-hopping

    Authors: Dmitry Chistikov, Olga Goulko, Adrian Kent, Mike Paterson

    Abstract: We consider versions of the grasshopper problem (Goulko and Kent, 2017) on the circle and the sphere, which are relevant to Bell inequalities. For a circle of circumference $2π$, we show that for unconstrained lawns of any length and arbitrary jump lengths, the supremum of the probability for the grasshopper's jump to stay on the lawn is one. For antipodal lawns, which by definition contain precis… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

    Journal ref: Proc. R. Soc. A 476: 20200038 (2020)

  14. arXiv:1912.09864  [pdf, ps, other

    cs.MA

    Convergence of Opinion Diffusion is PSPACE-complete

    Authors: Dmitry Chistikov, Grzegorz Lisowski, Mike Paterson, Paolo Turrini

    Abstract: We analyse opinion diffusion in social networks, where a finite set of individuals is connected in a directed graph and each simultaneously changes their opinion to that of the majority of their influencers. We study the algorithmic properties of the fixed-point behaviour of such networks, showing that the problem of establishing whether individuals converge to stable opinions is PSPACE-complete.

    Submitted 30 March, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

  15. arXiv:1910.05572  [pdf, ps, other

    cs.CR math.CO

    On the equivalence of authentication codes and robust (2,2)-threshold schemes

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: In this paper, we show a "direct" equivalence between certain authentication codes and robust secret sharing schemes. It was previously known that authentication codes and robust secret sharing schemes are closely related to similar types of designs, but direct equivalences had not been considered in the literature. Our new equivalences motivate the consideration of a certain "key-substitution att… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    MSC Class: 94A62; 05B05; 05B10

  16. Deploying the NASA Valkyrie Humanoid for IED Response: An Initial Approach and Evaluation Summary

    Authors: Steven Jens Jorgensen, Michael W. Lanighan, Sylvain S. Bertrand, Andrew Watson, Joseph S. Altemus, R. Scott Askew, Lyndon Bridgwater, Beau Domingue, Charlie Kendrick, Jason Lee, Mark Paterson, Jairo Sanchez, Patrick Beeson, Seth Gee, Stephen Hart, Ana Huaman Quispe, Robert Griffin, Inho Lee, Stephen McCrory, Luis Sentis, Jerry Pratt, Joshua S. Mehling

    Abstract: As part of a feasibility study, this paper shows the NASA Valkyrie humanoid robot performing an end-to-end improvised explosive device (IED) response task. To demonstrate and evaluate robot capabilities, sub-tasks highlight different locomotion, manipulation, and perception requirements: traversing uneven terrain, passing through a narrow passageway, opening a car door, retrieving a suspected IED,… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Comments: 2019 IEEE-RAS International Conference on Humanoid Robots

  17. arXiv:1903.11620  [pdf, ps, other

    math.CO

    Characterising bimodal collections of sets in finite groups

    Authors: Sophie Huczynska, Maura B. Paterson

    Abstract: A collection of disjoint subsets ${\cal A}=\{A_1,A_2,\dotsc,A_m\}$ of a finite abelian group is said to have the \emph{bimodal} property if, for any non-zero group element $δ$, either $δ$ never occurs as a difference between an element of $A_i$ and an element of some other set $A_j$, or else for every element $a_i$ in $A_i$ there is an element $a_j\in A_j$ for some $j\neq i$ such that $a_i-a_j=δ$.… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

  18. Federating distributed storage for clouds in ATLAS

    Authors: Frank Berghaus, Kevin Casteels, Alessandro Di Girolamo, Colson Driemel, Marcus Ebert, Fabrizio Furano, Fernado Galindo, Mario Lassnig, Colin Leavett-Brown, Michael Paterson, Cedric Serfon, Rolf Seuster, Randall Sobie, Reda Tafirout, Ryan Paul Taylor

    Abstract: Input data for applications that run in cloud computing centres can be stored at distant repositories, often with multiple copies of the popular data stored at many sites. Locating and retrieving the remote data can be challenging, and we believe that federating the storage can address this problem. A federation would locate the closest copy of the data on the basis of GeoIP information. Currently… ▽ More

    Submitted 26 October, 2018; originally announced October 2018.

    Comments: 5 pages, 2 figures, 1 table, ACAT2017 proceedings

    Journal ref: J.Phys.Conf.Ser. 1085 (2018) no.3, 032027

  19. arXiv:1809.08138  [pdf, ps, other

    cs.DM

    Functional repair codes: a view from projective geometry

    Authors: Siaw-Lynn Ng, Maura B. Paterson

    Abstract: Storage codes are used to ensure reliable storage of data in distributed systems. Here we consider functional repair codes, where individual storage nodes that fail may be repaired efficiently and the ability to recover original data and to further repair failed nodes is preserved. There are two predominant approaches to repair codes: a coding theoretic approach and a vector space approach. We exp… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  20. arXiv:1807.10195  [pdf

    physics.acc-ph hep-ex

    An Advanced NCRF Linac Concept for a High Energy e$^+$e$^-$ Linear Collider

    Authors: Karl L. Bane, Timothy L. Barklow, Martin Breidenbach, Craig P. Burkhart, Eric A. Fauve, Alysson R. Gold, Vincent Heloin, Zenghai Li, Emilio A. Nanni, Mamdouh Nasr, Marco Oriunno, James McEwan Paterson, Michael E. Peskin, Tor O. Raubenheimer, Sami G. Tantawi

    Abstract: We have explored a concept for an advanced Normal-Conducting Radio-Frequency (NCRF) C-band linear accelerator (linac) structure to achieve a high gradient, high power e$^+$e$^-$ linear collider in the TeV class. This design study represents the first comprehensive investigation for an emerging class of distributed coupling accelerator topology exploring nominal cavity geometries, frequency and tem… ▽ More

    Submitted 7 April, 2019; v1 submitted 26 July, 2018; originally announced July 2018.

  21. arXiv:1805.01330  [pdf, ps, other

    math.CO

    Weighted external difference families and R-optimal AMD codes

    Authors: Sophie Huczynska, Maura B. Paterson

    Abstract: In this paper, we provide a mathematical framework for characterizing AMD codes that are R-optimal. We introduce a new combinatorial object, the reciprocally-weighted external difference family (RWEDF), which corresponds precisely to an R-optimal weak AMD code. This definition subsumes known examples of existing optimal codes, and also encompasses combinatorial objects not covered by previous defi… ▽ More

    Submitted 3 May, 2018; originally announced May 2018.

  22. arXiv:1708.03523   

    cs.CC

    Lower bound for monotone Boolean convolution

    Authors: Mike S. Paterson

    Abstract: Any monotone Boolean circuit computing the $n$-dimensional Boolean convolution requires at least $n^2$ and-gates. This precisely matches the obvious upper bound.

    Submitted 20 January, 2020; v1 submitted 11 August, 2017; originally announced August 2017.

    Comments: Lemma 5 fails and this seems vital to the current approach

    ACM Class: F.2.2

  23. arXiv:1703.08658  [pdf, other

    cs.DS

    Maximizing the area of intersection of rectangles

    Authors: David B. A. Epstein, Mike Paterson

    Abstract: This paper attacks the following problem. We are given a large number $N$ of rectangles in the plane, each with horizontal and vertical sides, and also a number $r<N$. The given list of $N$ rectangles may contain duplicates. The problem is to find $r$ of these rectangles, such that, if they are discarded, then the intersection of the remaining $(N-r)$ rectangles has an intersection with as large a… ▽ More

    Submitted 25 March, 2017; originally announced March 2017.

    Comments: 16 pages, 1 figure

    ACM Class: F.2.2

  24. arXiv:1611.05652  [pdf, other

    math.CO

    Existence and Non-Existence Results for Strong External Difference Families

    Authors: Sophie Huczynska, Maura B. Paterson

    Abstract: We consider strong external difference families (SEDFs); these are external difference families satisfying additional conditions on the patterns of external diferences that occur, and were first defined in the context of classifying optimal strong algebraic manipulation detection codes. We establish new necessary conditions for the existence of (n; m; k; lambda)-SEDFs; in particular giving a near-… ▽ More

    Submitted 17 November, 2016; originally announced November 2016.

  25. arXiv:1609.07027  [pdf, ps, other

    cs.IT cs.CR

    PIR schemes with small download complexity and low storage requirements

    Authors: Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson

    Abstract: In the classical model for (information theoretically secure) Private Information Retrieval (PIR), a user wishes to retrieve one bit of a database that is stored on a set of $n$ servers, in such a way that no individual server gains information about which bit the user is interested in. The aim is to design schemes that minimise communication between the user and the servers. More recently, there… ▽ More

    Submitted 4 December, 2018; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: 30 pages. Minor updates and corrections throughout, with updated bibliography

    MSC Class: 94A60

  26. arXiv:1603.02671  [pdf, other

    cs.CR

    Multi-prover Proof-of-Retrievability

    Authors: Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay

    Abstract: There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w… ▽ More

    Submitted 8 March, 2016; originally announced March 2016.

    Comments: 22 pages

  27. arXiv:1509.05255  [pdf, ps, other

    cs.DM math.CO

    Disjoint difference families and their applications

    Authors: S. -L. Ng, M. B. Paterson

    Abstract: Difference sets and their generalisations to difference families arise from the study of designs and many other applications. Here we give a brief survey of some of these applications, noting in particular the diverse definitions of difference families and the variations in priorities in constructions. We propose a definition of disjoint difference families that encompasses these variations and al… ▽ More

    Submitted 22 October, 2015; v1 submitted 17 September, 2015; originally announced September 2015.

  28. arXiv:1506.02711  [pdf, ps, other

    math.CO cs.CR

    Combinatorial Characterizations of Algebraic Manipulation Detection Codes Involving Generalized Difference Families

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes. We prove several lower bounds on the success probability of an adversary and we then give some combinatorial characterizations of AMD codes that meet the bounds with equality. These characterizations involve various types of generalized difference families. Constructing these difference families is… ▽ More

    Submitted 8 June, 2015; originally announced June 2015.

  29. Multireference X-Ray Emission and Absorption Spectroscopy calculations from Monte Carlo Configuration Interaction

    Authors: J. P. Coe, M. J. Paterson

    Abstract: We adapt the method of Monte Carlo configuration interaction to calculate core-hole states and use this for the computation of X-ray emission and absorption values. We consider CO, CH$_{4}$, NH$_{3}$, H$_{2}$O, HF, HCN, CH$_{3}$OH, CH$_{3}$F, HCl and NO using a 6-311G** basis. We also look at carbon monoxide with a stretched geometry and discuss the dependence of its results on the cutoff used. Th… ▽ More

    Submitted 6 May, 2015; originally announced May 2015.

    Comments: 13 pages, 2 figures

    Journal ref: Theor. Chem. Acc. 134, 58 (2015)

  30. arXiv:1409.7276  [pdf, ps, other

    physics.chem-ph physics.comp-ph

    Approaching exact hyperpolarizabilities via sum-over-states Monte Carlo configuration interaction

    Authors: J. P. Coe, M. J. Paterson

    Abstract: We propose using sum-over-states calculations with the compact wavefunctions of Monte Carlo configuration interaction to approach accurate values for higher-order dipole properties up to second hyperpolarizabilities in a controlled way. We apply the approach to small systems that can generally be compared with full configuration interaction (FCI) results. We consider hydrogen fluoride with a 6-31g… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: 11 pages, 14 figures

    Journal ref: J. Chem. Phys. 141, 124118 (2014)

  31. Applying Monte Carlo configuration interaction to transition metal dimers: exploring the balance between static and dynamic correlation

    Authors: J. P. Coe, P. Murphy, M. J. Paterson

    Abstract: We calculate potential curves for transition metal dimers using Monte Carlo configuration interaction (MCCI). These results, and their associated spectroscopic values, are compared with experimental and computational studies. The multireference nature of the MCCI wavefunction is quantified and we estimate the important orbitals. We initially consider the ground state of the chromium dimer. Next we… ▽ More

    Submitted 22 May, 2014; originally announced May 2014.

    Comments: 9 pages and 8 figures

    Journal ref: Chem. Phys. Lett. 604, 46 (2014)

  32. arXiv:1403.1468  [pdf, ps, other

    cs.CR math.CO

    Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: We study a method for key predistribution in a network of $n$ users where pairwise keys are computed by hashing users' IDs along with secret information that has been (pre)distributed to the network users by a trusted entity. A communication graph $G$ can be specified to indicate which pairs of users should be able to compute keys. We determine necessary and sufficient conditions for schemes of th… ▽ More

    Submitted 6 March, 2014; originally announced March 2014.

  33. arXiv:1402.7284  [pdf, ps, other

    physics.chem-ph physics.comp-ph

    Characterizing a configuration interaction excited state using natural transition geminals

    Authors: J. P. Coe, M. J. Paterson

    Abstract: We introduce natural transition geminals as a means to qualitatively understand a transition where double excitations are important. The first two $A_{1}$ singlet states of the CH cation are used as an initial example. We calculate these states with configuration interaction singles (CIS) and state-averaged Monte Carlo configuration interaction (SA-MCCI). For each method we compare the important n… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 15 pages, 2 figures. Mol. Phys. (2013)

    Journal ref: Mol. Phys. 112, 733 (2014)

  34. arXiv:1402.7281  [pdf, ps, other

    physics.chem-ph physics.comp-ph

    State-averaged Monte Carlo configuration interaction applied to electronically excited states

    Authors: J. P. Coe, M. J. Paterson

    Abstract: We introduce state-averaging into the method of Monte Carlo configuration interaction (SA-MCCI) to allow the stable and efficient calculation of excited states. We show that excited potential curves for H$_{3}$, including a crossing with the ground state, can be accurately reproduced using a small fraction of the FCI space. A recently introduced error measure for potential curves [J. P. Coe and M.… ▽ More

    Submitted 28 February, 2014; originally announced February 2014.

    Comments: 12 pages, 9 figures

    Journal ref: J. Chem. Phys. 139, 154103 (2013)

  35. arXiv:1401.3869  [pdf

    cs.GT cs.MA

    False-Name Manipulations in Weighted Voting Games

    Authors: Haris Aziz, Yoram Bachrach, Edith Elkind, Mike Paterson

    Abstract: Weighted voting is a classic model of cooperation among agents in decision-making domains. In such games, each player has a weight, and a coalition of players wins the game if its total weight meets or exceeds a given quota. A players power in such games is usually not directly proportional to his weight, and is measured by a power index, the most prominent among which are the Shapley-Shubik index… ▽ More

    Submitted 16 January, 2014; originally announced January 2014.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 40, pages 57-93, 2011

  36. Dynamic web cache publishing for IaaS clouds using Shoal

    Authors: Ian Gable, Michael Chester, Patrick Armstrong, Frank Berghaus, Andre Charbonneau, Colin Leavett-Brown, Michael Paterson, Robert Prior, Randall Sobie, Ryan Taylor

    Abstract: We have developed a highly scalable application, called Shoal, for tracking and utilizing a distributed set of HTTP web caches. Squid servers advertise their existence to the Shoal server via AMQP messaging by running Shoal Agent. The Shoal server provides a simple REST interface that allows clients to determine their closest Squid cache. Our goal is to dynamically instantiate Squid caches on IaaS… ▽ More

    Submitted 31 October, 2013; originally announced November 2013.

    Comments: Conference paper at the 2013 Computing in HEP (CHEP) Conference, Amsterdam

  37. arXiv:1306.6353  [pdf

    physics.acc-ph

    The International Linear Collider Technical Design Report - Volume 3.I: Accelerator R&D in the Technical Design Phase

    Authors: Chris Adolphsen, Maura Barone, Barry Barish, Karsten Buesser, Philip Burrows, John Carwardine, Jeffrey Clark, Hélène Mainaud Durand, Gerry Dugan, Eckhard Elsen, Atsushi Enomoto, Brian Foster, Shigeki Fukuda, Wei Gai, Martin Gastal, Rongli Geng, Camille Ginsburg, Susanna Guiducci, Mike Harrison, Hitoshi Hayano, Keith Kershaw, Kiyoshi Kubo, Victor Kuchler, Benno List, Wanming Liu , et al. (19 additional authors not shown)

    Abstract: The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the… ▽ More

    Submitted 26 June, 2013; originally announced June 2013.

    Comments: See also http://www.linearcollider.org/ILC/TDR . The full list of signatories is inside the Report

    Report number: ILC-REPORT-2013-040; ANL-HEP-TR-13-20; BNL-100603-2013-IR; IRFU-13-59; CERN-ATS-2013-037; Cockcroft-13-10; CLNS 13/2085; DESY 13-062; FERMILAB TM-2554; IHEP-AC-ILC-2013-001; INFN-13-04/LNF; JAI-2013-001; JINR E9-2013-35; JLAB-R-2013-01; KEK Report 2013-1; KNU/CHEP-ILC-2013-1; LLNL-TR-635539; SLAC-R-1004; ILC-HiGrade-Report-2013-003

  38. arXiv:1306.6328  [pdf

    physics.acc-ph

    The International Linear Collider Technical Design Report - Volume 3.II: Accelerator Baseline Design

    Authors: Chris Adolphsen, Maura Barone, Barry Barish, Karsten Buesser, Philip Burrows, John Carwardine, Jeffrey Clark, Hélène Mainaud Durand, Gerry Dugan, Eckhard Elsen, Atsushi Enomoto, Brian Foster, Shigeki Fukuda, Wei Gai, Martin Gastal, Rongli Geng, Camille Ginsburg, Susanna Guiducci, Mike Harrison, Hitoshi Hayano, Keith Kershaw, Kiyoshi Kubo, Victor Kuchler, Benno List, Wanming Liu , et al. (19 additional authors not shown)

    Abstract: The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the… ▽ More

    Submitted 26 June, 2013; originally announced June 2013.

    Comments: See also http://www.linearcollider.org/ILC/TDR . The full list of signatories is inside the Report

    Report number: ILC-REPORT-2013-040; ANL-HEP-TR-13-20; BNL-100603-2013-IR; IRFU-13-59; CERN-ATS-2013-037; Cockcroft-13-10; CLNS 13/2085; DESY 13-062; FERMILAB TM-2554; IHEP-AC-ILC-2013-001; INFN-13-04/LNF; JAI-2013-001; JINR E9-2013-35; JLAB-R-2013-01; KEK Report 2013-1; KNU/CHEP-ILC-2013-1; LLNL-TR-635539; SLAC-R-1004; ILC-HiGrade-Report-2013-003

  39. arXiv:1306.6327  [pdf

    physics.acc-ph hep-ph physics.ins-det

    The International Linear Collider Technical Design Report - Volume 1: Executive Summary

    Authors: Ties Behnke, James E. Brau, Brian Foster, Juan Fuster, Mike Harrison, James McEwan Paterson, Michael Peskin, Marcel Stanitzki, Nicholas Walker, Hitoshi Yamamoto

    Abstract: The International Linear Collider Technical Design Report (TDR) describes in four volumes the physics case and the design of a 500 GeV centre-of-mass energy linear electron-positron collider based on superconducting radio-frequency technology using Niobium cavities as the accelerating structures. The accelerator can be extended to 1 TeV and also run as a Higgs factory at around 250 GeV and on the… ▽ More

    Submitted 26 June, 2013; originally announced June 2013.

    Comments: See also http://www.linearcollider.org/ILC/TDR . The full list of contributing institutes is inside the Report

    Report number: ILC-REPORT-2013-040; ANL-HEP-TR-13-20; BNL-100603-2013-IR; IRFU-13-59; CERN-ATS-2013-037; Cockcroft-13-10; CLNS 13/2085; DESY 13-062; FERMILAB TM-2554; IHEP-AC-ILC-2013-001; INFN-13-04/LNF; JAI-2013-001; JINR E9-2013-35; JLAB-R-2013-01; KEK Report 2013-1; KNU/CHEP-ILC-2013-1; LLNL-TR-635539; SLAC-R-1004; ILC-HiGrade-Report-2013-003

  40. arXiv:1304.3304  [pdf, ps, other

    physics.chem-ph physics.comp-ph

    Development of Monte Carlo configuration interaction: Natural orbitals and second-order perturbation theory

    Authors: J. P. Coe, M. J. Paterson

    Abstract: Approximate natural orbitals are investigated as a way to improve a Monte Carlo configuration interaction (MCCI) calculation. We introduce a way to approximate the natural orbitals in MCCI and test these and approximate natural orbitals from MP2 and QCISD in MCCI calculations of single-point energies. The efficiency and accuracy of approximate natural orbitals in MCCI potential curve calculations… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 11 pages, 11 figures

    Journal ref: J. Chem. Phys. 137, 204108 (2012)

  41. arXiv:1302.1939  [pdf, other

    cs.DC

    HTC Scientific Computing in a Distributed Cloud Environment

    Authors: R. Sobie, A. Agarwal, I. Gable, C. Leavett-Brown, M. Paterson, R. Taylor, A. Charbonneau, R. Impey, W. Podiama

    Abstract: This paper describes the use of a distributed cloud computing system for high-throughput computing (HTC) scientific applications. The distributed cloud computing system is composed of a number of separate Infrastructure-as-a-Service (IaaS) clouds that are utilized in a unified infrastructure. The distributed cloud has been in production-quality operation for two years with approximately 500,000 co… ▽ More

    Submitted 7 February, 2013; originally announced February 2013.

  42. arXiv:1301.4904  [pdf, ps, other

    physics.chem-ph physics.comp-ph

    Monte Carlo configuration interaction applied to multipole moments, ionisation energies and electron affinities

    Authors: J. P. Coe, D. J. Taylor, M. J. Paterson

    Abstract: The method of Monte Carlo configuration interaction (MCCI) [1,2] is applied to the calculation of multipole moments. We look at the ground and excited state dipole moments in carbon monoxide. We then consider the dipole of NO, the quadrupole of the nitrogen molecule and of BH. An octupole of methane is also calculated. We consider experimental geometries and also stretched bonds. We show that thes… ▽ More

    Submitted 21 January, 2013; originally announced January 2013.

    Comments: 12 pages, 20 figures

    Journal ref: J. Comput. Chem., 34, 1083 (2013)

  43. arXiv:1212.2526  [pdf, ps, other

    physics.chem-ph physics.comp-ph

    Calculations of Potential Energy Surfaces Using Monte Carlo Configuration Interaction

    Authors: J. P. Coe, D. J. Taylor, M. J. Paterson

    Abstract: We apply the method of Monte Carlo configuration interaction (MCCI) to calculate ground-state potential energy curves for a range of small molecules and compare the results with full configuration interaction. We show that the MCCI potential energy curve can be calculated to relatively good accuracy, as quantified using the non-parallelity error, using only a very small fraction of the FCI space.… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 14 pages, 22 figures

    Journal ref: J. Chem. Phys. 137, 194111 (2012)

  44. arXiv:1210.7756  [pdf, ps, other

    cs.CR math.CO

    A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

    Authors: Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay

    Abstract: There has been considerable recent interest in "cloud storage" wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which w… ▽ More

    Submitted 29 October, 2012; originally announced October 2012.

  45. arXiv:1101.0357  [pdf, other

    cs.DC

    Data Intensive High Energy Physics Analysis in a Distributed Cloud

    Authors: R. J. Sobie, A. Agarwal, M. Anderson, P. Armstrong, K. Fransham, I. Gable, D. Harris, C. Leavett-Brown, M. Paterson, D. Penfold-Brown, M. Vliet, A. Charbonneau, R. Impey, W. Podaima

    Abstract: We show that distributed Infrastructure-as-a-Service (IaaS) compute clouds can be effectively used for the analysis of high energy physics data. We have designed a distributed cloud system that works with any application using large input data sets requiring a high throughput computing environment. The system uses IaaS-enabled science and commercial clusters in Canada and the United States. We des… ▽ More

    Submitted 1 January, 2011; originally announced January 2011.

    Comments: 6 pages, 4 figures, conference paper

  46. arXiv:1007.0050  [pdf, other

    cs.DC

    Cloud Scheduler: a resource manager for distributed compute clouds

    Authors: P. Armstrong, A. Agarwal, A. Bishop, A. Charbonneau, R. Desmarais, K. Fransham, N. Hill, I. Gable, S. Gaudet, S. Goliath, R. Impey, C. Leavett-Brown, J. Ouellete, M. Paterson, C. Pritchet, D. Penfold-Brown, W. Podaima, D. Schade, R. J. Sobie

    Abstract: The availability of Infrastructure-as-a-Service (IaaS) computing clouds gives researchers access to a large set of new resources for running complex scientific applications. However, exploiting cloud resources for large numbers of jobs requires significant effort and expertise. In order to make it simple and transparent for researchers to deploy their applications, we have developed a virtual mach… ▽ More

    Submitted 30 June, 2010; originally announced July 2010.

    Comments: 10 pages, 1 figure

  47. arXiv:1001.3850  [pdf, ps, other

    math.CO

    Yet Another Hat Game

    Authors: Maura B. Paterson, Douglas R. Stinson

    Abstract: Several different "hat games" have recently received a fair amount of attention. Typically, in a hat game, one or more players are required to correctly guess their hat colour when given some information about other players' hat colours. Some versions of these games have been motivated by research in complexity theory and have ties to well-known research problems in coding theory, and some varia… ▽ More

    Submitted 21 January, 2010; originally announced January 2010.

    Comments: 13 pages

    MSC Class: 05B99

  48. arXiv:0911.2384  [pdf, other

    math.CO

    Honeycomb arrays

    Authors: Simon R. Blackburn, Anastasia Panoui, Maura B. Paterson, Douglas R. Stinson

    Abstract: A honeycomb array is an analogue of a Costas array in the hexagonal grid; they were first studied by Golomb and Taylor in 1984. A recent result of Blackburn, Etzion, Martin and Paterson has shown that (in contrast to the situation for Costas arrays) there are only finitely many examples of honeycomb arrays, though their bound on the maximal size of a honeycomb array is too large to permit an exh… ▽ More

    Submitted 12 November, 2009; originally announced November 2009.

    Comments: 12 pages, 11 figures

    MSC Class: 05B10; 94C30

  49. arXiv:0910.4325  [pdf, ps, other

    cs.DM

    Putting Dots in Triangles

    Authors: Simon R. Blackburn, Maura B. Paterson, Douglas R. Stinson

    Abstract: Given a right-angled triangle of squares in a grid whose horizontal and vertical sides are $n$ squares long, let N(n) denote the maximum number of dots that can be placed into the cells of the triangle such that each row, each column, and each diagonal parallel to the long side of the triangle contains at most one dot. It has been proven that $N(n) = \lfloor \frac{2n+1}{3} \rfloor$. In this no… ▽ More

    Submitted 18 May, 2010; v1 submitted 22 October, 2009; originally announced October 2009.

    Comments: 10 pages Minor rephrasing: final version to submit to journal.

  50. arXiv:0909.5293  [pdf, ps, other

    cs.GT cs.CC

    Wiretapping a hidden network

    Authors: Haris Aziz, Oded Lachish, Mike Paterson, Rahul Savani

    Abstract: We consider the problem of maximizing the probability of hitting a strategically chosen hidden virtual network by placing a wiretap on a single link of a communication network. This can be seen as a two-player win-lose (zero-sum) game that we call the wiretap game. The value of this game is the greatest probability that the wiretapper can secure for hitting the virtual network. The value is show… ▽ More

    Submitted 4 October, 2009; v1 submitted 29 September, 2009; originally announced September 2009.