منابع مشابه
Deconstructing 5-D QED
We discuss periodic compactification and latticization of a 5-D U(1) theory with a Dirac fermion, yielding a 1 + 3 effective theory. We address subtleties in the lattice fermionic action, such as fermion doubling and the Wilson term. We compute the Coleman-Weinberg potential for the Wilson line which is finite for N -branes ≥ 3, due to the ZN symmetry, which replaces translations in the 5th dim...
متن کاملDeconstructing 5D supersymmetric U(1) gauge theories on orbifolds
We investigate deconstruction of five dimensional supersymmetric abelian gauge theories compactified on S1/Z2, with various sets of bulk and matter multiplets. The problem of anomalies, chirality and stability in the deconstructed theories is discussed. We find that for most of the 5d brane/bulk matter assignments there exists the deconstructed version. There are, however, some exceptions. High...
متن کاملDeconstructing SYNtax
There are at least two distinct ways of conceiving of syntax: the set of rules that enable speakers and listeners to combine the meaning of expressions (compositional syntax), or the set of formal constraints on the combinations of expressions (formal syntax). The question that occupies us in this paper is whether all languages include a significant formal syntax component or whether there are ...
متن کاملDeconstructing stemness.
Stem cells are unique in their capacity to self-renew and generate differentiated progeny to maintain tissues throughout life. A common molecular program for stem cells has remained elusive. We discuss what the molecular logic of stemness may be. We suggest that it may not be coupled to distinct cellular properties such as self-renewal or multipotency, but rather to the stable suspension at a s...
متن کاملDeconstructing Xen
Hypervisors have quickly become essential but are vulnerable to attack. Unfortunately, efficiently hardening hypervisors is challenging because they lack a privileged security monitor and decomposition strategies. In this work we systematically analyze the 191 Xen hypervisor vulnerabilities from Xen Security Advisories, revealing that the majority (144) are in the core hypervisor not Dom0. We t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review D
سال: 2002
ISSN: 0556-2821,1089-4918
DOI: 10.1103/physrevd.66.016006