• ### Dark matter effective field theory scattering in direct detection experiments(1503.03379)

Aug. 16, 2016 hep-ph, hep-ex, astro-ph.CO
We examine the consequences of the effective field theory (EFT) of dark matter-nucleon scattering for current and proposed direct detection experiments. Exclusion limits on EFT coupling constants computed using the optimum interval method are presented for SuperCDMS Soudan, CDMS II, and LUX, and the necessity of combining results from multiple experiments in order to determine dark matter parameters is discussed. We demonstrate that spectral differences between the standard dark matter model and a general EFT interaction can produce a bias when calculating exclusion limits and when developing signal models for likelihood and machine learning techniques. We also discuss the implications of the EFT for the next-generation (G2) direct detection experiments and point out regions of complementarity in the EFT parameter space.
• ### WIMP-Search Results from the Second CDMSlite Run(1509.02448)

The CDMS low ionization threshold experiment (CDMSlite) uses cryogenic germanium detectors operated at a relatively high bias voltage to amplify the phonon signal in the search for weakly interacting massive particles (WIMPs). Results are presented from the second CDMSlite run with an exposure of 70 kg days, which reached an energy threshold for electron recoils as low as 56 eV. A fiducialization cut reduces backgrounds below those previously reported by CDMSlite. New parameter space for the WIMP-nucleon spin-independent cross section is excluded for WIMP masses between 1.6 and 5.5 GeV/$c^2$.
• ### Improved WIMP-search reach of the CDMS II germanium data(1504.05871)

Oct. 13, 2015 hep-ex, astro-ph.CO
CDMS II data from the 5-tower runs at the Soudan Underground Laboratory were reprocessed with an improved charge-pulse fitting algorithm. Two new analysis techniques to reject surface-event backgrounds were applied to the 612 kg days germanium-detector WIMP-search exposure. An extended analysis was also completed by decreasing the 10 keV analysis threshold to $\sim$5 keV, to increase sensitivity near a WIMP mass of 8 GeV/$c^2$. After unblinding, there were zero candidate events above a deposited energy of 10 keV and 6 events in the lower-threshold analysis. This yielded minimum WIMP-nucleon spin-independent scattering cross-section limits of $1.8 \times 10^{-44}$ and $1.18 \times 10 ^{-41}$ cm$^2$ at 90\% confidence for 60 and 8.6 GeV/$c^2$ WIMPs, respectively. This improves the previous CDMS II result by a factor of 2.4 (2.7) for 60 (8.6) GeV/$c^2$ WIMPs.
• ### First direct limits on Lightly Ionizing Particles with electric charge less than $e/6$(1409.3270)

While the Standard Model of particle physics does not include free particles with fractional charge, experimental searches have not ruled out their existence. We report results from the Cryogenic Dark Matter Search (CDMS II) experiment that give the first direct-detection limits for cosmogenically-produced relativistic particles with electric charge lower than $e$/6. A search for tracks in the six stacked detectors of each of two of the CDMS II towers found no candidates, thereby excluding new parameter space for particles with electric charges between $e$/6 and $e$/200.
• ### Maximum Likelihood Analysis of Low Energy CDMS II Germanium Data(1410.1003)

We report on the results of a search for a Weakly Interacting Massive Particle (WIMP) signal in low-energy data of the Cryogenic Dark Matter Search (CDMS~II) experiment using a maximum likelihood analysis. A background model is constructed using GEANT4 to simulate the surface-event background from $^{210}$Pb decay-chain events, while using independent calibration data to model the gamma background. Fitting this background model to the data results in no statistically significant WIMP component. In addition, we perform fits using an analytic ad hoc background model proposed by Collar and Fields, who claimed to find a large excess of signal-like events in our data. We confirm the strong preference for a signal hypothesis in their analysis under these assumptions, but excesses are observed in both single- and multiple-scatter events, which implies the signal is not caused by WIMPs, but rather reflects the inadequacy of their background model.
• ### Search for Low-Mass WIMPs with SuperCDMS(1402.7137)

We report a first search for weakly interacting massive particles (WIMPs) using the background rejection capabilities of SuperCDMS. An exposure of 577 kg-days was analyzed for WIMPs with mass < 30 GeV/c2, with the signal region blinded. Eleven events were observed after unblinding. We set an upper limit on the spin-independent WIMP-nucleon cross section of 1.2e-42 cm2 at 8 GeV/c2. This result is in tension with WIMP interpretations of recent experiments and probes new parameter space for WIMP-nucleon scattering for WIMP masses < 6 GeV/c2.
• ### CDMSlite: A Search for Low-Mass WIMPs using Voltage-Assisted Calorimetric Ionization Detection in the SuperCDMS Experiment(1309.3259)

SuperCDMS is an experiment designed to directly detect Weakly Interacting Massive Particles (WIMPs), a favored candidate for dark matter ubiquitous in the Universe. In this paper, we present WIMP-search results using a calorimetric technique we call CDMSlite, which relies on voltage- assisted Luke-Neganov amplification of the ionization energy deposited by particle interactions. The data were collected with a single 0.6 kg germanium detector running for 10 live days at the Soudan Underground Laboratory. A low energy threshold of 170 eVee (electron equivalent) was obtained, which allows us to constrain new WIMP-nucleon spin-independent parameter space for WIMP masses below 6 GeV/c2.
• ### Silicon Detector Dark Matter Results from the Final Exposure of CDMS II(1304.4279)

We report results of a search for Weakly Interacting Massive Particles (WIMPS) with the silicon detectors of the CDMS II experiment. This blind analysis of 140.2 kg-days of data taken between July 2007 and September 2008 revealed three WIMP-candidate events with a surface-event background estimate of 0.41^{+0.20}_{-0.08}(stat.)^{+0.28}_{-0.24}(syst.). Other known backgrounds from neutrons and 206Pb are limited to < 0.13 and <0.08 events at the 90% confidence level, respectively. The exposure of this analysis is equivalent to 23.4 kg-days for a recoil energy range of 7-100 keV for a WIMP of mass 10 GeV/c2. The probability that the known backgrounds would produce three or more events in the signal region is 5.4%. A profile likelihood ratio test of the three events that includes the measured recoil energies gives a 0.19% probability for the known-background-only hypothesis when tested against the alternative WIMP+background hypothesis. The highest likelihood occurs for a WIMP mass of 8.6 GeV/c2 and WIMP-nucleon cross section of 1.9e-41 cm2.
• ### Precoding Based Network Alignment using Transform Approach for Acyclic Networks with Delay(1310.2809)

Oct. 10, 2013 cs.IT, math.IT
The algebraic formulation for linear network coding in acyclic networks with the links having integer delay is well known. Based on this formulation, for a given set of connections over an arbitrary acyclic network with integer delay assumed for the links, the output symbols at the sink nodes, at any given time instant, is a $\mathbb{F}_{p^m}$-linear combination of the input symbols across different generations where, $\mathbb{F}_{p^m}$ denotes the field over which the network operates ($p$ is prime and $m$ is a positive integer). We use finite-field discrete fourier transform (DFT) to convert the output symbols at the sink nodes, at any given time instant, into a $\mathbb{F}_{p^m}$-linear combination of the input symbols generated during the same generation without making use of memory at the intermediate nodes. We call this as transforming the acyclic network with delay into {\em $n$-instantaneous networks} ($n$ is sufficiently large). We show that under certain conditions, there exists a network code satisfying sink demands in the usual (non-transform) approach if and only if there exists a network code satisfying sink demands in the transform approach. When the zero-interference conditions are not satisfied, we propose three Precoding Based Network Alignment (PBNA) schemes for three-source three-destination multiple unicast network with delays (3-S 3-D MUN-D) termed as PBNA using transform approach and time-invariant local encoding coefficients (LECs), PBNA using time-varying LECs, and PBNA using transform approach and block time-varying LECs. Their feasibility conditions are then analyzed.
• ### Demonstration of Surface Electron Rejection with Interleaved Germanium Detectors for Dark Matter Searches(1305.2405)

The SuperCDMS experiment in the Soudan Underground Laboratory searches for dark matter with a 9-kg array of cryogenic germanium detectors. Symmetric sensors on opposite sides measure both charge and phonons from each particle interaction, providing excellent discrimination between electron and nuclear recoils, and between surface and interior events. Surface event rejection capabilities were tested with two $^{210}$Pb sources producing $\sim$130 beta decays/hr. In $\sim$800 live hours, no events leaked into the 8--115 keV signal region, giving upper limit leakage fraction $1.7 \times 10^{-5}$ at 90% C.L., corresponding to $< 0.6$ surface event background in the future 200-kg SuperCDMS SNOLAB experiment.
• ### A Matroidal Framework for Network-Error Correcting Codes(1201.6459)

July 6, 2013 cs.IT, math.IT
We abstract the essential aspects of network-error detecting and correcting codes to arrive at the definitions of matroidal error detecting networks and matroidal error correcting networks. An acyclic network (with arbitrary sink demands) is then shown to possess a scalar linear error detecting (correcting) network code if and only if it is a matroidal error detecting (correcting) network associated with a representable matroid. Therefore, constructing such network-error correcting and detecting codes implies the construction of certain representable matroids that satisfy some special conditions, and vice versa. We then present algorithms which enable the construction of matroidal error detecting and correcting networks with a specified capability of network-error correction. Using these construction algorithms, a large class of hitherto unknown scalar linearly solvable networks with multisource multicast and multiple-unicast network-error correcting codes is made available for theoretical use and practical implementation, with parameters such as number of information symbols, number of sinks, number of coding nodes, error correcting capability, etc. being arbitrary but for computing power (for the execution of the algorithms). The complexity of the construction of these networks is shown to be comparable to the complexity of existing algorithms that design multicast scalar linear network-error correcting codes. Finally we also show that linear network coding is not sufficient for the general network-error detection problem with arbitrary demands. In particular, for the same number of network-errors, we show a network for which there is a nonlinear network-error detecting code satisfying the demands at the sinks, while there are no linear network-error detecting codes that do the same.
• ### On network coding for acyclic networks with delays(1102.1782)

July 6, 2013 cs.IT, math.IT
Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now mostly been overlooked. We show that the delays associated with the edges of the network cannot be ignored, and in fact turn out to be advantageous, disadvantageous or immaterial, depending on the topology of the network and the problem considered i.e., (a), (b) or (c). In the process, we also show that for a single source multicast problem in acyclic networks (instantaneous and with delays), the network coding operations at each node can simply be limited to storing old symbols and coding them over a binary field. Therefore, operations over elements of larger fields are unnecessary in the network, the trade-off being that enough memory exists at the nodes and at the sinks, and that the sinks have more processing power.
• ### Network-Error Correcting Codes using Small Fields(1009.3728)

July 6, 2013 cs.IT, math.IT
Existing construction algorithms of block network-error correcting codes require a rather large field size, which grows with the size of the network and the number of sinks, and thereby can be prohibitive in large networks. In this work, we give an algorithm which, starting from a given network-error correcting code, can obtain another network code using a small field, with the same error correcting capability as the original code. An algorithm for designing network codes using small field sizes proposed recently by Ebrahimi and Fragouli can be seen as a special case of our algorithm. The major step in our algorithm is to find a least degree irreducible polynomial which is coprime to another large degree polynomial. We utilize the algebraic properties of finite fields to implement this step so that it becomes much faster than the brute-force method. As a result the algorithm given by Ebrahimi and Fragouli is also quickened.
• ### Search for annual modulation in low-energy CDMS-II data(1203.1309)

Sept. 18, 2012 hep-ex, astro-ph.CO
We report limits on annual modulation of the low-energy event rate from the Cryogenic Dark Matter Search (CDMS II) experiment at the Soudan Underground Laboratory. Such a modulation could be produced by interactions from Weakly Interacting Massive Particles (WIMPs) with masses ~10 GeV/c^2. We find no evidence for annual modulation in the event rate of veto-anticoincident single-detector interactions consistent with nuclear recoils, and constrain the magnitude of any modulation to <0.06 event [keVnr kg day]^-1 in the 5-11.9 keVnr energy range at the 99% confidence level. These results disfavor an explanation for the reported modulation in the 1.2-3.2 keVee energy range in CoGeNT in terms of nuclear recoils resulting from elastic scattering of WIMPs at >98% confidence. For events consistent with electron recoils, no significant modulation is observed for either single- or multiple-detector interactions in the 3.0-7.4 keVee range.
• ### A Transform Approach to Linear Network Coding for Acyclic Networks with Delay(1103.3882)

May 10, 2012 cs.IT, math.IT
• ### Single-generation Network Coding for Networks with Delay(0909.1638)

Sept. 9, 2009 cs.IT, math.IT
A single-source network is said to be \textit{memory-free} if all of the internal nodes (those except the source and the sinks) do not employ memory but merely send linear combinations of the incoming symbols (received at their incoming edges) on their outgoing edges. Memory-free networks with delay using network coding are forced to do inter-generation network coding, as a result of which the problem of some or all sinks requiring a large amount of memory for decoding is faced. In this work, we address this problem by utilizing memory elements at the internal nodes of the network also, which results in the reduction of the number of memory elements used at the sinks. We give an algorithm which employs memory at the nodes to achieve single-generation network coding. For fixed latency, our algorithm reduces the total number of memory elements used in the network to achieve single-generation network coding. We also discuss the advantages of employing single-generation network coding together with convolutional network-error correction codes (CNECCs) for networks with unit-delay and illustrate the performance gain of CNECCs by using memory at the intermediate nodes using simulations on an example network under a probabilistic network error model.
• ### Network error correction for unit-delay, memory-free networks using convolutional codes(0903.1967)

Sept. 9, 2009 cs.IT, math.IT
A single source network is said to be memory-free if all of the internal nodes (those except the source and the sinks) do not employ memory but merely send linear combinations of the symbols received at their incoming edges on their outgoing edges. In this work, we introduce network-error correction for single source, acyclic, unit-delay, memory-free networks with coherent network coding for multicast. A convolutional code is designed at the source based on the network code in order to correct network-errors that correspond to any of a given set of error patterns, as long as consecutive errors are separated by a certain interval which depends on the convolutional code selected. Bounds on this interval and the field size required for constructing the convolutional code with the required free distance are also obtained. We illustrate the performance of convolutional network error correcting codes (CNECCs) designed for the unit-delay networks using simulations of CNECCs on an example network under a probabilistic error model.
• ### Convolutional Codes for Network-Error Correction(0902.4177)

Aug. 6, 2009 cs.IT, math.IT
In this work, we introduce convolutional codes for network-error correction in the context of coherent network coding. We give a construction of convolutional codes that correct a given set of error patterns, as long as consecutive errors are separated by a certain interval. We also give some bounds on the field size and the number of errors that can get corrected in a certain interval. Compared to previous network error correction schemes, using convolutional codes is seen to have advantages in field size and decoding technique. Some examples are discussed which illustrate the several possible situations that arise in this context.