1,401 research outputs found
Large rescaling of the Higgs condensate: theoretical motivations and lattice results
In the Standard Model the Fermi constant is associated with the vacuum
expectation value of the Higgs field, `the condensate', usually believed to be
a cutoff-independent quantity. General arguments related to the `triviality' of
theory in 4 space-time dimensions suggest, however, a dramatic
renormalization effect in the continuum limit that is clearly visible on the
relatively large lattices available today. The result can be crucial for the
Higgs phenomenology and in any context where spontaneous symmetry breaking is
induced through scalar fields.Comment: LATTICE99(Higgs) 3 pages, 3 figure
Indications on the Higgs boson mass from lattice simulations
The `triviality' of has been traditionally interpreted within
perturbation theory where the prediction for the Higgs boson mass depends on
the magnitude of the ultraviolet cutoff . This approach crucially
assumes that the vacuum field and its quantum fluctuations rescale in the same
way. The results of the present lattice simulation, confirming previous
numerical indications, show that this assumption is not true. As a consequence,
large values of the Higgs mass can coexist with the limit . As an example, by extrapolating to the Standard Model our results
obtained in the Ising limit of the one-component theory, one can obtain a value
as large as GeV, independently of .Comment: 3 pages, 2 figures, Lattice2003(higgs
Vulnerabilities and responsibilities: dealing with monsters in computer security
Purpose â The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud
\ud
Design/methodology/approach â Vulnerabilities in information security are compared to the concept of âmonsterâ introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud
\ud
Findings â It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud
\ud
Research limitations/implications â The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud
\ud
Practical implications â The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud
\ud
Originality/value â This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk
Vacuum condensates and `ether-drift' experiments
The idea of a `condensed' vacuum state is generally accepted in modern
elementary particle physics. We argue that this should motivate a new
generation of precise `ether-drift' experiments with present-day technology.Comment: Latex file, 12 pages, no figure
- âŠ