Deconstructing 5D QED

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deconstructing 5-D QED

We discuss periodic compactification and latticization of a 5-D U(1) theory with a Dirac fermion, yielding a 1 + 3 effective theory. We address subtleties in the lattice fermionic action, such as fermion doubling and the Wilson term. We compute the Coleman-Weinberg potential for the Wilson line which is finite for N -branes ≥ 3, due to the ZN symmetry, which replaces translations in the 5th dim...

متن کامل

Deconstructing 5D supersymmetric U(1) gauge theories on orbifolds

We investigate deconstruction of five dimensional supersymmetric abelian gauge theories compactified on S1/Z2, with various sets of bulk and matter multiplets. The problem of anomalies, chirality and stability in the deconstructed theories is discussed. We find that for most of the 5d brane/bulk matter assignments there exists the deconstructed version. There are, however, some exceptions. High...

متن کامل

Deconstructing SYNtax

There are at least two distinct ways of conceiving of syntax: the set of rules that enable speakers and listeners to combine the meaning of expressions (compositional syntax), or the set of formal constraints on the combinations of expressions (formal syntax). The question that occupies us in this paper is whether all languages include a significant formal syntax component or whether there are ...

متن کامل

Deconstructing stemness.

Stem cells are unique in their capacity to self-renew and generate differentiated progeny to maintain tissues throughout life. A common molecular program for stem cells has remained elusive. We discuss what the molecular logic of stemness may be. We suggest that it may not be coupled to distinct cellular properties such as self-renewal or multipotency, but rather to the stable suspension at a s...

متن کامل

Deconstructing Xen

Hypervisors have quickly become essential but are vulnerable to attack. Unfortunately, efficiently hardening hypervisors is challenging because they lack a privileged security monitor and decomposition strategies. In this work we systematically analyze the 191 Xen hypervisor vulnerabilities from Xen Security Advisories, revealing that the majority (144) are in the core hypervisor not Dom0. We t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review D

سال: 2002

ISSN: 0556-2821,1089-4918

DOI: 10.1103/physrevd.66.016006