446,995 research outputs found
Transversely polarized Drell-Yan asymmetry AT T at NLO
We present the first fully differential next-To-leading order QCD calculation for lepton production in transversely polarized hadronic collisions, p↑p↑→±X, where the lepton arises from the decay of an electroweak gauge boson. The calculation is implemented in the Monte-Carlo like code che that already includes the unpolarized and longitudinally polarized cross sections and may be readily used to perform a comparison to experimental data and to extract information on the related parton distributions. We analyze the perturbative stability of the cross-section and double spin asymmetry ATT at RHIC kinematics. We find that the QCD corrections are non-negligible even at the level of asymmetries and that they strongly depend on the lepton kinematics. Furthermore, we present two scenarios for transversely polarized parton distributions, based on the de Florian-Sassot-Stratmann-Vogelsang (DSSV) set of longitudinally parton densities and fully evolved to NLO accuracy, that can be used for the evaluation of different observables involving transverse polarization.Fil: de Florian, Daniel Enrique. Universidad Nacional de San Martín. Escuela de Ciencia y Tecnología. Centro Internacional de Estudios Avanzados; Argentina. Tübingen University; Alemania. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentin
Leading twist nuclear shadowing phenomena in hard processes with nuclei
We present and discuss the theory and phenomenology of the leading twist
theory of nuclear shadowing which is based on the combination of the
generalization of the Gribov-Glauber theory, QCD factorization theorems, and
the HERA QCD analysis of diffraction in lepton-proton deep inelastic scattering
(DIS). We apply this technique for the analysis of a wide range of hard
processes with nuclei---inclusive DIS on deuterons, medium-range and heavy
nuclei, coherent and incoherent diffractive DIS with nuclei, and hard
diffraction in proton-nucleus scattering---and make predictions for the effect
of nuclear shadowing in the corresponding sea quark and gluon parton
distributions. We also analyze the role of the leading twist nuclear shadowing
in generalized parton distributions in nuclei and in certain characteristics of
final states in nuclear DIS. We discuss the limits of applicability of the
leading twist approximation for small x scattering off nuclei and the onset of
the black disk regime and methods of detecting it. It will be possible to check
many of our predictions in the near future in the studies of the
ultraperipheral collisions at the Large Hadron Collider (LHC). Further checks
will be possible in pA collisions at the LHC and forward hadron production at
the Relativistic Heavy Ion Collider (RHIC). Detailed tests will be possible at
an Electron-Ion Collider (EIC) in the USA and at the Large Hadron-Electron
Collider (LHeC) at CERN.Comment: 253 pages, 103 figures, 7 tables. The final published versio
Introduction: Prevent and Tame : Ideas for a New Perspective on Social Movements and Protest
Part of:
Ullrich, Peter ; Papst, Andrea ; Heßdörfer, Florian: Introduction: Prevent and Tame : Ideas for a new
perspective on social movements and protest. - In: Heßdörfer, Florian ; Pabst, Andrea ; Ullrich, Peter:
Prevent and tame : Protest under (self-)control. - Berlin: Dietz, 2010. - (Rosa-Luxemburg-Stiftung:
Manuskripte ; 88) - ISBN 978-3-320-02246-4
Recommended from our members
Security analysis of the micro transport protocol with a misbehaving receiver
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives correct feedback, since otherwise this deteriorates throughput or yields to corrupted data. We show through experimental investigation that a misbehaving uTP receiver, which is not interested in data integrity, can increase the bandwidth of the sender by up to five times. This can cause a congestion collapse and steal large share of a victim’s bandwidth. We present three attacks, which increase the bandwidth usage significantly. We have tested these attacks in a real world environment and show its severity both in terms of number of packets and total traffic generated. We also present a countermeasure for protecting against the attacks and evaluate the performance of that defence strategy
- …
