
We examine the consequences of the effective field theory (EFT) of dark
matternucleon scattering for current and proposed direct detection
experiments. Exclusion limits on EFT coupling constants computed using the
optimum interval method are presented for SuperCDMS Soudan, CDMS II, and LUX,
and the necessity of combining results from multiple experiments in order to
determine dark matter parameters is discussed. We demonstrate that spectral
differences between the standard dark matter model and a general EFT
interaction can produce a bias when calculating exclusion limits and when
developing signal models for likelihood and machine learning techniques. We
also discuss the implications of the EFT for the nextgeneration (G2) direct
detection experiments and point out regions of complementarity in the EFT
parameter space.

The CDMS low ionization threshold experiment (CDMSlite) uses cryogenic
germanium detectors operated at a relatively high bias voltage to amplify the
phonon signal in the search for weakly interacting massive particles (WIMPs).
Results are presented from the second CDMSlite run with an exposure of 70 kg
days, which reached an energy threshold for electron recoils as low as 56 eV. A
fiducialization cut reduces backgrounds below those previously reported by
CDMSlite. New parameter space for the WIMPnucleon spinindependent cross
section is excluded for WIMP masses between 1.6 and 5.5 GeV/$c^2$.

CDMS II data from the 5tower runs at the Soudan Underground Laboratory were
reprocessed with an improved chargepulse fitting algorithm. Two new analysis
techniques to reject surfaceevent backgrounds were applied to the 612 kg days
germaniumdetector WIMPsearch exposure. An extended analysis was also
completed by decreasing the 10 keV analysis threshold to $\sim$5 keV, to
increase sensitivity near a WIMP mass of 8 GeV/$c^2$. After unblinding, there
were zero candidate events above a deposited energy of 10 keV and 6 events in
the lowerthreshold analysis. This yielded minimum WIMPnucleon
spinindependent scattering crosssection limits of $1.8 \times 10^{44}$ and
$1.18 \times 10 ^{41}$ cm$^2$ at 90\% confidence for 60 and 8.6 GeV/$c^2$
WIMPs, respectively. This improves the previous CDMS II result by a factor of
2.4 (2.7) for 60 (8.6) GeV/$c^2$ WIMPs.

While the Standard Model of particle physics does not include free particles
with fractional charge, experimental searches have not ruled out their
existence. We report results from the Cryogenic Dark Matter Search (CDMS II)
experiment that give the first directdetection limits for
cosmogenicallyproduced relativistic particles with electric charge lower than
$e$/6. A search for tracks in the six stacked detectors of each of two of the
CDMS II towers found no candidates, thereby excluding new parameter space for
particles with electric charges between $e$/6 and $e$/200.

We report on the results of a search for a Weakly Interacting Massive
Particle (WIMP) signal in lowenergy data of the Cryogenic Dark Matter Search
(CDMS~II) experiment using a maximum likelihood analysis. A background model is
constructed using GEANT4 to simulate the surfaceevent background from
$^{210}$Pb decaychain events, while using independent calibration data to
model the gamma background. Fitting this background model to the data results
in no statistically significant WIMP component. In addition, we perform fits
using an analytic ad hoc background model proposed by Collar and Fields, who
claimed to find a large excess of signallike events in our data. We confirm
the strong preference for a signal hypothesis in their analysis under these
assumptions, but excesses are observed in both single and multiplescatter
events, which implies the signal is not caused by WIMPs, but rather reflects
the inadequacy of their background model.

We report a first search for weakly interacting massive particles (WIMPs)
using the background rejection capabilities of SuperCDMS. An exposure of 577
kgdays was analyzed for WIMPs with mass < 30 GeV/c2, with the signal region
blinded. Eleven events were observed after unblinding. We set an upper limit on
the spinindependent WIMPnucleon cross section of 1.2e42 cm2 at 8 GeV/c2.
This result is in tension with WIMP interpretations of recent experiments and
probes new parameter space for WIMPnucleon scattering for WIMP masses < 6
GeV/c2.

SuperCDMS is an experiment designed to directly detect Weakly Interacting
Massive Particles (WIMPs), a favored candidate for dark matter ubiquitous in
the Universe. In this paper, we present WIMPsearch results using a
calorimetric technique we call CDMSlite, which relies on voltage assisted
LukeNeganov amplification of the ionization energy deposited by particle
interactions. The data were collected with a single 0.6 kg germanium detector
running for 10 live days at the Soudan Underground Laboratory. A low energy
threshold of 170 eVee (electron equivalent) was obtained, which allows us to
constrain new WIMPnucleon spinindependent parameter space for WIMP masses
below 6 GeV/c2.

We report results of a search for Weakly Interacting Massive Particles
(WIMPS) with the silicon detectors of the CDMS II experiment. This blind
analysis of 140.2 kgdays of data taken between July 2007 and September 2008
revealed three WIMPcandidate events with a surfaceevent background estimate
of 0.41^{+0.20}_{0.08}(stat.)^{+0.28}_{0.24}(syst.). Other known backgrounds
from neutrons and 206Pb are limited to < 0.13 and <0.08 events at the 90%
confidence level, respectively. The exposure of this analysis is equivalent to
23.4 kgdays for a recoil energy range of 7100 keV for a WIMP of mass 10
GeV/c2. The probability that the known backgrounds would produce three or more
events in the signal region is 5.4%. A profile likelihood ratio test of the
three events that includes the measured recoil energies gives a 0.19%
probability for the knownbackgroundonly hypothesis when tested against the
alternative WIMP+background hypothesis. The highest likelihood occurs for a
WIMP mass of 8.6 GeV/c2 and WIMPnucleon cross section of 1.9e41 cm2.

The algebraic formulation for linear network coding in acyclic networks with
the links having integer delay is well known. Based on this formulation, for a
given set of connections over an arbitrary acyclic network with integer delay
assumed for the links, the output symbols at the sink nodes, at any given time
instant, is a $\mathbb{F}_{p^m}$linear combination of the input symbols across
different generations where, $\mathbb{F}_{p^m}$ denotes the field over which
the network operates ($p$ is prime and $m$ is a positive integer). We use
finitefield discrete fourier transform (DFT) to convert the output symbols at
the sink nodes, at any given time instant, into a $\mathbb{F}_{p^m}$linear
combination of the input symbols generated during the same generation without
making use of memory at the intermediate nodes. We call this as transforming
the acyclic network with delay into {\em $n$instantaneous networks} ($n$ is
sufficiently large). We show that under certain conditions, there exists a
network code satisfying sink demands in the usual (nontransform) approach if
and only if there exists a network code satisfying sink demands in the
transform approach. When the zerointerference conditions are not satisfied, we
propose three Precoding Based Network Alignment (PBNA) schemes for threesource
threedestination multiple unicast network with delays (3S 3D MUND) termed
as PBNA using transform approach and timeinvariant local encoding coefficients
(LECs), PBNA using timevarying LECs, and PBNA using transform approach and
block timevarying LECs. Their feasibility conditions are then analyzed.

The SuperCDMS experiment in the Soudan Underground Laboratory searches for
dark matter with a 9kg array of cryogenic germanium detectors. Symmetric
sensors on opposite sides measure both charge and phonons from each particle
interaction, providing excellent discrimination between electron and nuclear
recoils, and between surface and interior events. Surface event rejection
capabilities were tested with two $^{210}$Pb sources producing $\sim$130 beta
decays/hr. In $\sim$800 live hours, no events leaked into the 8115 keV signal
region, giving upper limit leakage fraction $1.7 \times 10^{5}$ at 90% C.L.,
corresponding to $< 0.6$ surface event background in the future 200kg
SuperCDMS SNOLAB experiment.

We abstract the essential aspects of networkerror detecting and correcting
codes to arrive at the definitions of matroidal error detecting networks and
matroidal error correcting networks. An acyclic network (with arbitrary sink
demands) is then shown to possess a scalar linear error detecting (correcting)
network code if and only if it is a matroidal error detecting (correcting)
network associated with a representable matroid. Therefore, constructing such
networkerror correcting and detecting codes implies the construction of
certain representable matroids that satisfy some special conditions, and vice
versa. We then present algorithms which enable the construction of matroidal
error detecting and correcting networks with a specified capability of
networkerror correction. Using these construction algorithms, a large class of
hitherto unknown scalar linearly solvable networks with multisource multicast
and multipleunicast networkerror correcting codes is made available for
theoretical use and practical implementation, with parameters such as number of
information symbols, number of sinks, number of coding nodes, error correcting
capability, etc. being arbitrary but for computing power (for the execution of
the algorithms). The complexity of the construction of these networks is shown
to be comparable to the complexity of existing algorithms that design multicast
scalar linear networkerror correcting codes. Finally we also show that linear
network coding is not sufficient for the general networkerror detection
problem with arbitrary demands. In particular, for the same number of
networkerrors, we show a network for which there is a nonlinear networkerror
detecting code satisfying the demands at the sinks, while there are no linear
networkerror detecting codes that do the same.

Problems related to network coding for acyclic, instantaneous networks (where
the edges of the acyclic graph representing the network are assumed to have
zerodelay) have been extensively dealt with in the recent past. The most
prominent of these problems include (a) the existence of network codes that
achieve maximum rate of transmission, (b) efficient network code constructions,
and (c) field size issues. In practice, however, networks have transmission
delays. In network coding theory, such networks with transmission delays are
generally abstracted by assuming that their edges have integer delays. Note
that using enough memory at the nodes of an acyclic network with integer delays
can effectively simulate instantaneous behavior, which is probably why only
acyclic instantaneous networks have been primarily focused on thus far. In this
work, we elaborate on issues ((a), (b) and (c) above) related to network coding
for acyclic networks with integer delays, which have till now mostly been
overlooked. We show that the delays associated with the edges of the network
cannot be ignored, and in fact turn out to be advantageous, disadvantageous or
immaterial, depending on the topology of the network and the problem considered
i.e., (a), (b) or (c). In the process, we also show that for a single source
multicast problem in acyclic networks (instantaneous and with delays), the
network coding operations at each node can simply be limited to storing old
symbols and coding them over a binary field. Therefore, operations over
elements of larger fields are unnecessary in the network, the tradeoff being
that enough memory exists at the nodes and at the sinks, and that the sinks
have more processing power.

Existing construction algorithms of block networkerror correcting codes
require a rather large field size, which grows with the size of the network and
the number of sinks, and thereby can be prohibitive in large networks. In this
work, we give an algorithm which, starting from a given networkerror
correcting code, can obtain another network code using a small field, with the
same error correcting capability as the original code. An algorithm for
designing network codes using small field sizes proposed recently by Ebrahimi
and Fragouli can be seen as a special case of our algorithm. The major step in
our algorithm is to find a least degree irreducible polynomial which is coprime
to another large degree polynomial. We utilize the algebraic properties of
finite fields to implement this step so that it becomes much faster than the
bruteforce method. As a result the algorithm given by Ebrahimi and Fragouli is
also quickened.

We report limits on annual modulation of the lowenergy event rate from the
Cryogenic Dark Matter Search (CDMS II) experiment at the Soudan Underground
Laboratory. Such a modulation could be produced by interactions from Weakly
Interacting Massive Particles (WIMPs) with masses ~10 GeV/c^2. We find no
evidence for annual modulation in the event rate of vetoanticoincident
singledetector interactions consistent with nuclear recoils, and constrain the
magnitude of any modulation to <0.06 event [keVnr kg day]^1 in the 511.9
keVnr energy range at the 99% confidence level. These results disfavor an
explanation for the reported modulation in the 1.23.2 keVee energy range in
CoGeNT in terms of nuclear recoils resulting from elastic scattering of WIMPs
at >98% confidence. For events consistent with electron recoils, no significant
modulation is observed for either single or multipledetector interactions in
the 3.07.4 keVee range.

The algebraic formulation for linear network coding in acyclic networks with
the links having integer delay is well known. Based on this formulation, for a
given set of connections over an arbitrary acyclic network with integer delay
assumed for the links, the output symbols at the sink nodes, at any given time
instant, is a \mathbb{F}_{q}$linear combination of the input symbols across
different generations, where $\mathbb{F}_{q}$ denotes the field over which the
network operates. We use finitefield discrete fourier transform (DFT) to
convert the output symbols at the sink nodes, at any given time instant, into a
$\mathbb{F}_{q}$linear combination of the input symbols generated during the
same generation. We call this as transforming the acyclic network with delay
into {\em $n$instantaneous networks} ($n$ is sufficiently large). We show that
under certain conditions, there exists a network code satisfying sink demands
in the usual (nontransform) approach if and only if there exists a network
code satisfying sink demands in the transform approach. Furthermore, we show
that the transform method (along with the use of alignment strategies) can be
employed to achieve half the rate corresponding to the individual
sourcedestination mincut (which are assumed to be equal to 1) for some
classes of threesource threedestination unicast network with delays, when the
zerointerference conditions are not satisfied.

Convolutional networkerror correcting codes (CNECCs) are known to provide
error correcting capability in acyclic instantaneous networks within the
network coding paradigm under small field size conditions. In this work, we
investigate the performance of CNECCs under the error model of the network
where the edges are assumed to be statistically independent binary symmetric
channels, each with the same probability of error $p_e$($0\leq p_e<0.5$). We
obtain bounds on the performance of such CNECCs based on a modified generating
function (the transfer function) of the CNECCs. For a given network, we derive
a mathematical condition on how small $p_e$ should be so that only single edge
networkerrors need to be accounted for, thus reducing the complexity of
evaluating the probability of error of any CNECC. Simulations indicate that
convolutional codes are required to possess different properties to achieve
good performance in low $p_e$ and high $p_e$ regimes. For the low $p_e$ regime,
convolutional codes with good distance properties show good performance. For
the high $p_e$ regime, convolutional codes that have a good \textit{slope} (the
minimum normalized cycle weight) are seen to be good. We derive a lower bound
on the slope of any rate $b/c$ convolutional code with a certain degree.

A singlesource network is said to be \textit{memoryfree} if all of the
internal nodes (those except the source and the sinks) do not employ memory but
merely send linear combinations of the incoming symbols (received at their
incoming edges) on their outgoing edges. Memoryfree networks with delay using
network coding are forced to do intergeneration network coding, as a result of
which the problem of some or all sinks requiring a large amount of memory for
decoding is faced. In this work, we address this problem by utilizing memory
elements at the internal nodes of the network also, which results in the
reduction of the number of memory elements used at the sinks. We give an
algorithm which employs memory at the nodes to achieve singlegeneration
network coding. For fixed latency, our algorithm reduces the total number of
memory elements used in the network to achieve singlegeneration network
coding. We also discuss the advantages of employing singlegeneration network
coding together with convolutional networkerror correction codes (CNECCs) for
networks with unitdelay and illustrate the performance gain of CNECCs by using
memory at the intermediate nodes using simulations on an example network under
a probabilistic network error model.

A single source network is said to be memoryfree if all of the internal
nodes (those except the source and the sinks) do not employ memory but merely
send linear combinations of the symbols received at their incoming edges on
their outgoing edges. In this work, we introduce networkerror correction for
single source, acyclic, unitdelay, memoryfree networks with coherent network
coding for multicast. A convolutional code is designed at the source based on
the network code in order to correct networkerrors that correspond to any of a
given set of error patterns, as long as consecutive errors are separated by a
certain interval which depends on the convolutional code selected. Bounds on
this interval and the field size required for constructing the convolutional
code with the required free distance are also obtained. We illustrate the
performance of convolutional network error correcting codes (CNECCs) designed
for the unitdelay networks using simulations of CNECCs on an example network
under a probabilistic error model.

In this work, we introduce convolutional codes for networkerror correction
in the context of coherent network coding. We give a construction of
convolutional codes that correct a given set of error patterns, as long as
consecutive errors are separated by a certain interval. We also give some
bounds on the field size and the number of errors that can get corrected in a
certain interval. Compared to previous network error correction schemes, using
convolutional codes is seen to have advantages in field size and decoding
technique. Some examples are discussed which illustrate the several possible
situations that arise in this context.