Skip to main content

Showing 1–31 of 31 results for author: Rosenberg, I

.
  1. arXiv:2010.16323  [pdf, other

    cs.CR cs.LG

    Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

    Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici

    Abstract: The performance of a machine learning-based malware classifier depends on the large and updated training set used to induce its model. In order to maintain an up-to-date training set, there is a need to continuously collect benign and malicious files from a wide range of sources, providing an exploitable target to attackers. In this study, we show how an attacker can launch a sophisticated and eff… ▽ More

    Submitted 30 October, 2020; originally announced October 2020.

  2. arXiv:2009.13243  [pdf, other

    cs.CR

    Generating End-to-End Adversarial Examples for Malware Classifiers Using Explainability

    Authors: Ishai Rosenberg, Shai Meir, Jonathan Berrebi, Ilay Gordon, Guillaume Sicard, Eli David

    Abstract: In recent years, the topic of explainable machine learning (ML) has been extensively researched. Up until now, this research focused on regular ML users use-cases such as debugging a ML model. This paper takes a different posture and show that adversaries can leverage explainable ML to bypass multi-feature types malware classifiers. Previous adversarial attacks against such classifiers only add ne… ▽ More

    Submitted 1 June, 2022; v1 submitted 28 September, 2020; originally announced September 2020.

    Comments: Accepted as a conference paper at IJCNN 2020

  3. arXiv:2008.06856  [pdf, other

    cs.LG stat.ML

    FOOD: Fast Out-Of-Distribution Detector

    Authors: Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici

    Abstract: Deep neural networks (DNNs) perform well at classifying inputs associated with the classes they have been trained on, which are known as in distribution inputs. However, out-of-distribution (OOD) inputs pose a great challenge to DNNs and consequently represent a major risk when DNNs are implemented in safety-critical systems. Extensive research has been performed in the domain of OOD detection. Ho… ▽ More

    Submitted 23 February, 2021; v1 submitted 16 August, 2020; originally announced August 2020.

    Comments: Guy Amit and Moshe Levy contributed equally to this paper Updated version

  4. arXiv:2007.02407  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain

    Authors: Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

    Abstract: In recent years machine learning algorithms, and more specifically deep learning algorithms, have been widely used in many fields, including cyber security. However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security domain, where actual adversaries (… ▽ More

    Submitted 13 March, 2021; v1 submitted 5 July, 2020; originally announced July 2020.

    Comments: Accepted as a long survey paper at ACM CSUR 2021

  5. arXiv:2002.02176  [pdf, other

    cs.LG stat.ML

    GIM: Gaussian Isolation Machines

    Authors: Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

    Abstract: In many cases, neural network classifiers are likely to be exposed to input data that is outside of their training distribution data. Samples from outside the distribution may be classified as an existing class with high probability by softmax-based classifiers; such incorrect classifications affect the performance of the classifiers and the applications/systems that depend on them. Previous resea… ▽ More

    Submitted 21 March, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

    Comments: Submitted to IJCNN2020 conference

  6. arXiv:1912.01493  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware

    Authors: Ishai Rosenberg, Guillaume Sicard, Eli David

    Abstract: Malware allegedly developed by nation-states, also known as advanced persistent threats (APT), are becoming more common. The task of attributing an APT to a specific nation-state or classifying it to the correct APT family is challenging for several reasons. First, each nation-state has more than a single cyber unit that develops such malware, rendering traditional authorship attribution algorithm… ▽ More

    Submitted 29 November, 2019; originally announced December 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1711.09666

    Journal ref: Entropy, Vol. 20, No. 5, pp. 390-401, May 2018

  7. arXiv:1901.09963  [pdf, other

    cs.CR

    Defense Methods Against Adversarial Examples for Recurrent Neural Networks

    Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

    Abstract: Adversarial examples are known to mislead deep learning models to incorrectly classify them, even in domains where such models achieve state-of-the-art performance. Until recently, research on both attack and defense methods focused on image recognition, primarily using convolutional neural networks (CNNs). In recent years, adversarial example generation methods for recurrent neural networks (RNNs… ▽ More

    Submitted 20 November, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

    Comments: Submitted as a conference paper to Euro S&P 2020

  8. DeepOrigin: End-to-End Deep Learning for Detection of New Malware Families

    Authors: Ilay Cordonsky, Ishai Rosenberg, Guillaume Sicard, Eli David

    Abstract: In this paper, we present a novel method of differentiating known from previously unseen malware families. We utilize transfer learning by learning compact file representations that are used for a new classification task between previously seen malware families and novel ones. The learned file representations are composed of static and dynamic features of malware and are invariant to small modific… ▽ More

    Submitted 23 November, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

    Journal ref: International Joint Conference on Neural Networks (IJCNN), pages 1-7, Rio de Janeiro, Brazil, July 2018

  9. arXiv:1809.02931  [pdf, other

    cs.GT

    From Recommendation Systems to Facility Location Games

    Authors: Omer Ben-Porat, Gregory Goren, Itay Rosenberg, Moshe Tennenholtz

    Abstract: Recommendation systems are extremely popular tools for matching users and contents. However, when content providers are strategic, the basic principle of matching users to the closest content, where both users and contents are modeled as points in some semantic space, may yield low social welfare. This is due to the fact that content providers are strategic and optimize their offered content to be… ▽ More

    Submitted 9 September, 2018; originally announced September 2018.

  10. Fully guided electrically-controlled exciton polaritons

    Authors: Dror Liran, Itamar Rosenberg, Kenneth West, Loren Pfeiffer, Ronen Rapaport

    Abstract: We demonstrate two types of waveguide structures which optically confine exciton- polaritons in two dimensions and act as polaritonic channels. We show a strong optical confinement in an etched rectangular waveguide, that significantly increases the propa- gation distance of the polaritons and allow to direct them in curved trajectories. Also, we show low-loss optical guiding over a record-high of… ▽ More

    Submitted 4 August, 2018; originally announced August 2018.

    Comments: 12 pages 3 Figuers

    Journal ref: ACS Photonics 2018, 5, 11, 4249-4252

  11. arXiv:1806.05359  [pdf, ps, other

    cs.GT cs.IR

    Convergence of Learning Dynamics in Information Retrieval Games

    Authors: Omer Ben-Porat, Itay Rosenberg, Moshe Tennenholtz

    Abstract: We consider a game-theoretic model of information retrieval with strategic authors. We examine two different utility schemes: authors who aim at maximizing exposure and authors who want to maximize active selection of their content (i.e. the number of clicks). We introduce the study of author learning dynamics in such contexts. We prove that under the probability ranking principle (PRP), which for… ▽ More

    Submitted 20 February, 2019; v1 submitted 14 June, 2018; originally announced June 2018.

  12. arXiv:1804.08778  [pdf, other

    cs.CR cs.LG

    Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

    Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach

    Abstract: In this paper, we present a generic, query-efficient black-box attack against API call-based machine learning malware classifiers. We generate adversarial examples by modifying the malware's API call sequences and non-sequential features (printable strings), and these adversarial examples will be misclassified by the target malware classifier without affecting the malware's functionality. In contr… ▽ More

    Submitted 3 October, 2020; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: Accepted as a conference paper at ACSAC 2020

  13. arXiv:1802.01123  [pdf, other

    cond-mat.mes-hall

    Strongly interacting dipolar-polaritons

    Authors: Itamar Rosenberg, Dror Liran, Yotam Mazuz-Harpaz, Kenneth West, Loren Pfeiffer, Ronen Rapaport

    Abstract: Exciton-polaritons are mutually interacting quantum hybridizations of confined photons and electronic excitations. Here we demonstrate a system of optically guided, electrically polarized exciton-polaritons ('dipolaritons') that displays up to 200-fold enhancement of the polariton-polariton interaction strength compared to unpolarized polaritons. The magnitude of the dipolar interaction enhancemen… ▽ More

    Submitted 16 April, 2018; v1 submitted 4 February, 2018; originally announced February 2018.

  14. arXiv:1711.09666  [pdf, ps, other

    cs.CR cs.LG cs.NE stat.ML

    DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks

    Authors: Ishai Rosenberg, Guillaume Sicard, Eli David

    Abstract: In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons. Each nation-state has usually more than a single cyber unit that develops such advanced malware, rendering traditional authorship attribution algorithms useless. Furthermore… ▽ More

    Submitted 27 November, 2017; originally announced November 2017.

    Journal ref: International Conference on Artificial Neural Networks (ICANN), Springer LNCS, Vol. 10614, pp. 91-99, Alghero, Italy, September, 2017

  15. arXiv:1707.05970  [pdf, other

    cs.CR cs.LG cs.NE

    Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    Authors: Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici

    Abstract: In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability pri… ▽ More

    Submitted 24 June, 2018; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: Accepted as a conference paper at RAID 2018

  16. arXiv:1705.09750  [pdf, other

    math.CO

    Free monoids and generalized metric spaces

    Authors: Mustapha Kabil, Maurice Pouzet, Ivo Rosenberg

    Abstract: Let $A$ be an ordered alphabet, $A^{\ast}$ be the free monoid over $A$ ordered by the Higman ordering, and let $F(A^{\ast})$ be the set of final segments of $A^{\ast}$. With the operation of concatenation, this set is a monoid. We show that the submonoid $F^{\circ}(A^{\ast}):= F(A^{\ast})\setminus \{\emptyset\}$ is free. The MacNeille completion $N(A^{\ast})$ of $A^{\ast}$ is a submonoid of… ▽ More

    Submitted 26 May, 2017; originally announced May 2017.

    Comments: Submitted to the proceedings in the memory of Michel Deza

    MSC Class: 06A15; 06D20; 46B85

  17. arXiv:1604.05952  [pdf, other

    cond-mat.quant-gas cond-mat.mes-hall

    Electrically controlled mutual interactions of flying waveguide dipolaritons

    Authors: Itamar Rosenberg, Yotam Harpaz, Kenneth West, Loren Pffeifer, Ronen Rapaport

    Abstract: We show that with a system of electrically-gated wide quantum wells embedded inside a simple dielectric waveguide structure, it is possible to excite, control, and observe waveguided exciton polaritons that carry an electric dipole moment. We demonstrate that the energy of the propagating dipolariton can be easily tuned using local electrical gates, that their excitation and extraction can be easi… ▽ More

    Submitted 14 June, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Journal ref: Phys. Rev. B 93, 195151 (2016)

  18. arXiv:1508.01103  [pdf, ps, other

    math.CO

    Partial clones containing all Boolean monotone self-dual partial functions

    Authors: Miguel Couceiro, Lucien Haddad, Ivo G. Rosenberg

    Abstract: The study of partial clones on $\mathbf{2}:=\{0,1\}$ was initiated by R. V. Freivald. In his fundamental paper published in 1966, Freivald showed, among other things, that the set of all monotone partial functions and the set of all self-dual partial functions are both maximal partial clones on $\mathbf{2}$. Several papers dealing with intersections of maximal partial clones on $\mathbf{2}$ have a… ▽ More

    Submitted 5 August, 2015; originally announced August 2015.

    Comments: To appear in Journal of Multiple-Valued Logic and Soft Computing, 10 pages

  19. arXiv:1505.02955  [pdf, other

    math.CO

    Semirigid systems of three equivalence relations

    Authors: Christian Delhommé, Masahiro Miyakawa, Maurice Pouzet, Ivo G. Rosenberg, Hisayuki Tatsumi

    Abstract: A system $\mathcal M$ of equivalence relations on a set $E$ is \emph{semirigid} if only the identity and constant functions preserve all members of $\mathcal M$. We construct semirigid systems of three equivalence relations. Our construction leads to the examples given by Zádori in 1983 and to many others and also extends to some infinite cardinalities. As a consequence, we show that on every set… ▽ More

    Submitted 12 May, 2015; originally announced May 2015.

    Comments: 23 pages, 3 figures. Submitted, results presented to ISMVL-2012

    MSC Class: 94D05; 03B50

  20. arXiv:1505.01006  [pdf, other

    quant-ph cond-mat.mes-hall

    Purcell-enhanced optical spin readout of Nitrogen-Vacancy centers in diamond

    Authors: Sigal A. Wolf, Itamar Rosenberg, Ronen Rapaport, Nir Bar-Gill

    Abstract: Nitrogen-Vacancy (NV) color centers in diamond have emerged as promising quantum solid-state systems, with applications ranging from quantum information processing to magnetic sensing. One of the most useful properties of NVs is the ability to read their ground-state spin projection optically at room temperature. This work provides a theoretical analysis of Purcell enhanced NV optical coupling, th… ▽ More

    Submitted 5 May, 2015; originally announced May 2015.

  21. The Physics of the B Factories

    Authors: A. J. Bevan, B. Golob, Th. Mannel, S. Prell, B. D. Yabsley, K. Abe, H. Aihara, F. Anulli, N. Arnaud, T. Aushev, M. Beneke, J. Beringer, F. Bianchi, I. I. Bigi, M. Bona, N. Brambilla, J. B rodzicka, P. Chang, M. J. Charles, C. H. Cheng, H. -Y. Cheng, R. Chistov, P. Colangelo, J. P. Coleman, A. Drutskoy , et al. (2009 additional authors not shown)

    Abstract: This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C. Please note that version 3 on the archive is the auxiliary… ▽ More

    Submitted 31 October, 2015; v1 submitted 24 June, 2014; originally announced June 2014.

    Comments: 928 pages, version 3 (arXiv:1406.6311v3) corresponds to the alpha, beta, gamma version of the book, the other versions use the phi1, phi2, phi3 notation

    Report number: SLAC-PUB-15968, KEK Preprint 2014-3

    Journal ref: Eur. Phys. J. C74 (2014) 3026

  22. Initial-State Radiation Measurement of the e+e- -> pi+pi-pi+pi- Cross Section

    Authors: J. P. Lees, V. Poireau, V. Tisserand, J. Garra Tico, E. Grauges, M. Martinelli, D. A. Milanes, A. Palano, M. Pappagallo, G. Eigen, B. Stugu, D. N. Brown, L. T. Kerth, Yu. G. Kolomensky, G. Lynch, H. Koch, T. Schroeder, D. J. Asgeirsson, C. Hearty, T. S. Mattison, J. A. McKenna, A. Khan, V. E. Blinov, A. R. Buzykaev, V. P. Druzhinin , et al. (362 additional authors not shown)

    Abstract: We study the process e+e- -> pi+pi-pi+pi-gamma, with a photon emitted from the initial-state electron or positron, using 454.3 fb^-1 of data collected with the BABAR detector at SLAC, corresponding to approximately 260,000 signal events. We use these data to extract the non-radiative sigma(e+e- ->pi+pi-pi+pi-) cross section in the energy range from 0.6 to 4.5 Gev. The total uncertainty of the cros… ▽ More

    Submitted 27 August, 2012; v1 submitted 26 January, 2012; originally announced January 2012.

    Report number: SLAC-PUB-14857

    Journal ref: PRD 85, 112009 (2012)

  23. A Measurement of the Semileptonic Branching Fraction of the B_s Meson

    Authors: The BaBar Collaboration, J. P. Lees, V. Poireau, V. Tisserand, J. Garra Tico, E. Grauges, M. Martinelli, D. A. Milanes, A. Palano, M. Pappagallo, G. Eigen, B. Stugu, D. N. Brown, L. T. Kerth, Yu. G. Kolomensky, G. Lynch, H. Koch, T. Schroeder, D. J. Asgeirsson, C. Hearty, T. S. Mattison, J. A. McKenna, A. Khan, V. E. Blinov, A. R. Buzykaev , et al. (362 additional authors not shown)

    Abstract: We report a measurement of the inclusive semileptonic branching fraction of the B_s meson using data collected with the BaBar detector in the center-of-mass (CM) energy region above the Upsilon(4S) resonance. We use the inclusive yield of phi mesons and the phi yield in association with a high-momentum lepton to perform a simultaneous measurement of the semileptonic branching fraction and the pr… ▽ More

    Submitted 10 January, 2012; v1 submitted 25 October, 2011; originally announced October 2011.

    Comments: 8 pages, 7 eps figures

    Report number: BaBar-Pub-11/021; SLAC-PUB-14653

    Journal ref: Phys. Rev. D 85, 011101(R) (2012)

  24. Search for hadronic decays of a light Higgs boson in the radiative decay Upsilon --> gamma A0

    Authors: The BABAR Collaboration, J. P. Lees, V. Poireau, V. Tisserand, J. Garra Tico, E. Grauges, M. Martinelli, D. A. Milanes, A. Palano, M. Pappagallo, G. Eigen, B. Stugu, D. N. Brown, L. T. Kerth, Yu. G. Kolomensky, G. Lynch, H. Koch, T. Schroeder, D. J. Asgeirsson, C. Hearty, T. S. Mattison, J. A. McKenna, R. Y. So, A. Khan, V. E. Blinov , et al. (364 additional authors not shown)

    Abstract: We search for hadronic decays of a light Higgs boson (A0) produced in radiative decays of an Upsilon(2S) or Upsilon(3S) meson, Upsilon --> gamma A0. The data have been recorded by the BABAR experiment at the Upsilon(3S) and Upsilon(2S) center of mass energies, and include (121.3 \pm 1.2) x 10^6 Upsilon(3S) and (98.3 \pm 0.9) x 10^6 Upsilon(2S) mesons. No significant signal is observed. We set 90%… ▽ More

    Submitted 17 August, 2011; originally announced August 2011.

    Comments: 7 pages, 5 postscript figures, submitted to Physical Review Letters

    Report number: Report-no: BABAR-PUB-11/019, SLAC-PUB-14541

  25. Observation of the baryonic B decay B0bar --> Lambda_c^+ anti-Lambda K-

    Authors: The BABAR Collaboration, J. P. Lees, V. Poireau, V. Tisserand, J. Garra Tico, E. Grauges, M. Martinelli, D. A. Milanes, A. Palano, M. Pappagallo, G. Eigen, B. Stugu, L. Sun, D. N. Brown, L. T. Kerth, Yu. G. Kolomensky, G. Lynch, H. Koch, T. Schroeder, D. J. Asgeirsson, C. Hearty, T. S. Mattison, J. A. McKenna, A. Khan, V. E. Blinov , et al. (363 additional authors not shown)

    Abstract: We report the observation of the baryonic B decay B0bar --> Lambda_c^+ anti-Lambda K- with a significance larger than 7 standard deviations based on 471x10^6$ BBbar pairs collected with the BABAR detector at the PEP-II storage ring at SLAC. We measure the branching fraction for the decay B0bar --> Lambda_c^+ anti-Lambda K- to be (3.8 \pm 0.8_{stat} \pm 0.2_{sys} \pm 1.0_{Lambda_c^+})x10^{-5}. The… ▽ More

    Submitted 16 August, 2011; originally announced August 2011.

    Comments: 7 pages, 7 figures, submitted to Phys. Rev. D (Rapid Communications)

  26. Study of radiative bottomonium transitions using converted photons

    Authors: The BABAR Collaboration, J. P. Lees, V. Poireau, E. Prencipe, V. Tisserand, J. GarraTico, E. Grauges, M. Martinelli, D. A. Milanes, A. Palano, M. Pappagallo, G. Eigen, B. Stugu, L. Sun, D. N. Brown, L. T. Kerth, Yu. G. Kolomensky, G. Lynch, H. Koch, T. Schroeder, D. J. Asgeirsson, C. Hearty, T. S. Mattison, J. A. McKenna, A. Khan , et al. (367 additional authors not shown)

    Abstract: We use 111+/-1 million Upsilon(3S) and 89+/-1 million Upsilon(2S) events recorded by the BaBar detector at the PEP-II B-factory at SLAC to perform a study of radiative transitions between bottomonium states using photons that have been converted to e+e- pairs by the detector material. We observe Upsilon(3S) -> gamma chi_b0,2(1P) decay, make precise measurements of the branching fractions for chi_b… ▽ More

    Submitted 21 December, 2011; v1 submitted 27 April, 2011; originally announced April 2011.

    Comments: 19 pages, 8 figures, published by Phys. Rev. D

    Report number: BABAR-PUB-11/002; SLAC-PUB-14446

    Journal ref: Phys. Rev. D 84, 072002 (2011)

  27. Evidence for the h_b(1P) meson in the decay Upsilon(3S) --> pi0 h_b(1P)

    Authors: The BABAR Collaboration, J. P. Lees, V. Poireau, E. Prencipe, V. Tisserand, J. Garra Tico, E. Grauges, M. Martinelli, D. A. Milanes, A. Palano, M. Pappagallo, G. Eigen, B. Stugu, L. Sun, D. N. Brown, L. T. Kerth, Yu. G. Kolomensky, G. Lynch, I. L. Osipenkov, H. Koch, T. Schroeder, D. J. Asgeirsson, C. Hearty, T. S. Mattison, J. A. McKenna , et al. (386 additional authors not shown)

    Abstract: Using a sample of 122 million Upsilon(3S) events recorded with the BaBar detector at the PEP-II asymmetric-energy e+e- collider at SLAC, we search for the $h_b(1P)$ spin-singlet partner of the P-wave chi_{bJ}(1P) states in the sequential decay Upsilon(3S) --> pi0 h_b(1P), h_b(1P) --> gamma eta_b(1S). We observe an excess of events above background in the distribution of the recoil mass against the… ▽ More

    Submitted 17 October, 2011; v1 submitted 22 February, 2011; originally announced February 2011.

    Comments: 8 pages, 4 postscript figures, submitted to Phys. Rev. D (Rapid Communications)

    Report number: SLAC-PUB-14378

  28. arXiv:1101.3631   

    physics.optics cond-mat.mes-hall

    Highly directional emission and photon beaming from nanocrystal quantum dots embedded in metallic nanoslit arrays

    Authors: Nitzan Livneh, Ayelet Strauss, Ilai Schwarz, Itamar Rosenberg, Adiel Zimran, Shira Yochelis, Gang Chen, Uri Banin, Yossi Paltiel, Ronen Rapaport

    Abstract: This paper has been withdrawn by the authors.

    Submitted 17 March, 2011; v1 submitted 19 January, 2011; originally announced January 2011.

    Comments: This paper has been withdrawn by the authors

  29. arXiv:0901.0512  [pdf

    hep-ex

    Expected Performance of the ATLAS Experiment - Detector, Trigger and Physics

    Authors: The ATLAS Collaboration, G. Aad, E. Abat, B. Abbott, J. Abdallah, A. A. Abdelalim, A. Abdesselam, O. Abdinov, B. Abi, M. Abolins, H. Abramowicz, B. S. Acharya, D. L. Adams, T. N. Addy, C. Adorisio, P. Adragna, T. Adye, J. A. Aguilar-Saavedra, M. Aharrouche, S. P. Ahlen, F. Ahles, A. Ahmad, H. Ahmed, G. Aielli, T. Akdogan , et al. (2587 additional authors not shown)

    Abstract: A detailed study is presented of the expected performance of the ATLAS detector. The reconstruction of tracks, leptons, photons, missing energy and jets is investigated, together with the performance of b-tagging and the trigger. The physics potential for a variety of interesting physics processes, within the Standard Model and beyond, is examined. The study comprises a series of notes based on… ▽ More

    Submitted 14 August, 2009; v1 submitted 28 December, 2008; originally announced January 2009.

  30. arXiv:0705.1519  [pdf, ps, other

    math.LO math.CO

    Small clones and the projection property

    Authors: Maurice Pouzet, Ivo G. Rosenberg

    Abstract: In 1986, the second author classified the minimal clones on a finite universe into five types. We extend this classification to infinite universes and to multiclones. We show that every non-trivial clone contains a "small" clone of one of the five types. From it we deduce, in part, an earlier result, namely that if $\mathcal C$ is a clone on a universe $A$ with at least two elements, that contai… ▽ More

    Submitted 10 May, 2007; originally announced May 2007.

    Comments: 10 pages

    MSC Class: 08A55; 08A62

  31. arXiv:math/0005270  [pdf, ps, other

    math.CO

    Small cones of m-hemimetrics

    Authors: M. Deza, I. Rosenberg

    Abstract: We introduce polyhedral cones associated with $m$-hemimetrics on $n$ points, and, in particular, with $m$-hemimetrics coming from partitions of an $n$-set into $m+1$ blocks. We compute generators and facets of the cones for small values of $m,n$ and study their skeleton graphs.

    Submitted 25 December, 2001; v1 submitted 27 May, 2000; originally announced May 2000.

    Comments: 19 pages. To appear in Discrete Mathematics