3,958 research outputs found
High-Mass Supersymmetry with High Energy Hadron Colliders
While it is natural for supersymmetric particles to be well within the mass
range of the large hadron collider, it is possible that the sparticle masses
could be very heavy. Signatures are examined at a very high energy hadron
collider and an very high luminosity option for the Large Hadron Collider in
such scenarios
180 DEGREE REFLECTIVITY AND VELOCITY PERTURBATION OF THIN METAL DOTS.
Reflective arrays of rectangular thin metal 'dots' spaced in a regular or near regular grid pattern, such as have been used in surface acoustic wave resonators and in-line dot RACs on LiNbO//3 , are analyzed. The half-wavelength spacing of dots required leads to capacitative coupling between adjacent dots. The charge distribution induced on the dots by the passage of the SAW is presented including the coupling. The 180 degree SAW reflectivity of the dots and the SAW velocity perturbation through the dot array are given for a range of dot sizes. These are shown to be in good agreement with experimental results. The work establishes that the method of analysis can form the basis of the design of 180 degree reflective weighted dot arrays, allowing them to be implemented through varying dot density and/or by varying dot dimensions
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
World Bank work with nongovernmental organizations
This report reviews 24 out of 202 Bank projects that involved nongovernmental organizations (NGOs) in order to identify ways to improve Bank-NGO collaboration. It identifies five functional categories of NGO interaction with the Bank along a public-private continuum, based on the varying degrees to which they represent social goals on the public end of the continuum and economic goals on the private end. Discussion focuses on the benefits and difficulties arising from the involvement of NGOs in each category in Bank-supported projects. It recommends involving NGOs before implementation, developing creative financing mechanisms to support them, and learning what they have to teach Bank staff about motivation, education and organization. The challenge for the Bank is to forge institutional links between governments and NGOs that extend and complement government capabilities. Governments and NGOs must learn to respect each other so they can work toward such mutual goals as poverty alleviation.Health Monitoring&Evaluation,Agricultural Knowledge&Information Systems,Poverty Monitoring&Analysis,ICT Policy and Strategies,Health Economics&Finance
Metamodel-based model conformance and multiview consistency checking
Model-driven development, using languages such as UML and BON, often makes use of multiple diagrams (e.g., class and sequence diagrams) when modeling systems. These diagrams, presenting different views of a system of interest, may be inconsistent. A metamodel provides a unifying framework in which to ensure and check consistency, while at the same time providing the means to distinguish between valid and invalid models, that is, conformance. Two formal specifications of the metamodel for an object-oriented modeling language are presented, and it is shown how to use these specifications for model conformance and multiview consistency checking. Comparisons are made in terms of completeness and the level of automation each provide for checking multiview consistency and model conformance. The lessons learned from applying formal techniques to the problems of metamodeling, model conformance, and multiview consistency checking are summarized
Simulating Supersymmetry with ISAJET 7.0/ ISASUSY 1.0
We review the physics assumptions and input used in ISAJET~7.0 /
ISA\-SUSY~1.0 that are relevant for simulating fundamental processes within the
framework of the Minimal Supersymmetric Standard Model (MSSM) at and
colliders. After a brief discussion of the underlying MSSM framework, we
discuss event simulation and list the sparticle production processes and decay
modes that have been incorporated into our calculations. We then describe how
to set up and run an ISAJET / ISASUSY job and the user input and output
formats. The ISAJET program is sufficiently flexible that some non-minimal
supersymmetry scenarios may be simulated as well. Finally, plans for future
upgrades which include the extension to collisions, are listed.Comment: 17 pages, FSU-HEP-930329 UH-511-764-9
Lamp enables measurement of oxygen concentration in presence of water vapor
Open-electrode ultraviolet source lamp radiates sufficient energy at 1800 angstroms and 1470 angstroms for use in a double-beam, duel-wavelength oxygen sensor. The lamp is filled with xenon at a pressure of 100 mm of Hg
Putting formal specifications under the magnifying glass: Model-based testing for validation
A software development process is effectively an abstract form of model transformation, starting from an end-user model of requirements, through to a system model for which code can be automatically generated. The success (or failure) of such a transformation depends substantially on obtaining a correct, well-formed initial model that captures user concerns.
Model-based testing automates black box testing based on the model of the system under analysis. This paper proposes and evaluates a novel model-based testing technique that aims to reveal specification/requirement-related errors by generating test cases from a test model and exercising them on the design model. The case study outlined in the paper shows that a separate test model not only increases the level of objectivity of the requirements, but also supports the validation of the system under test through test case generation. The results obtained from the case study support the hypothesis that there may be discrepancies between the formal specification of the system modeled at developer end and the problem to be solved, and using solely formal verification methods may not be sufficient to reveal these. The approach presented in this paper aims at providing means to obtain greater confidence in the design model that is used as the basis for code generation
- …