4,567 research outputs found
Reflective scattering effects in double-pomeron exchange processes
We discuss energy dependence of rapidity gap survival probability in the
double-pomeron exchange processes with account of the reflective scattering
effects.Comment: 11 pages, 3 figure
Optical Properties of the DIRC Fused Silica Cherenkov Radiator
The DIRC is a new type of Cherenkov detector that is successfully operating
as the hadronic particle identification system for the BABAR experiment at
SLAC. The fused silica bars that serve as the DIRC's Cherenkov radiators must
transmit the light over long optical pathlengths with a large number of
internal reflections. This imposes a number of stringent and novel requirements
on the bar properties. This note summarizes a large amount of R&D that was
performed both to develop specifications and production methods and to
determine whether commercially produced bars could meet the requirements. One
of the major outcomes of this R&D work is an understanding of methods to select
radiation hard and optically uniform fused silica material. Others include
measurement of the wavelength dependency of the internal reflection
coefficient, and its sensitivity to surface contaminants, development of
radiator support methods, and selection of good optical glue.Comment: 36 pages, submitted to Nuclear Instruments and Methods
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks
As today's organizational computer networks are ever evolving and becoming
more and more complex, finding potential vulnerabilities and conducting
security audits has become a crucial element in securing these networks. The
first step in auditing a network is reconnaissance by mapping it to get a
comprehensive overview over its structure. The growing complexity, however,
makes this task increasingly effortful, even more as mapping (instead of plain
scanning), presently, still involves a lot of manual work. Therefore, the
concept proposed in this paper automates the scanning and mapping of unknown
and non-cooperative computer networks in order to find security weaknesses or
verify access controls. It further helps to conduct audits by allowing
comparing documented with actual networks and finding unauthorized network
devices, as well as evaluating access control methods by conducting delta
scans. It uses a novel approach of augmenting data from iteratively chained
existing scanning tools with context, using genuine analytics modules to allow
assessing a network's topology instead of just generating a list of scanned
devices. It further contains a visualization model that provides a clear, lucid
topology map and a special graph for comparative analysis. The goal is to
provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure
Outstanding problems in the phenomenology of hard diffractive scattering
This paper is a summary of the discussion within the Diffractive and Low-x
Physics Working Group at the 1999 Durham Collider Workshop of the
interpretation of the Tevatron and HERA measurements of inclusive hard
diffraction.Comment: 5 pages, 1 figure. Talks and discussions from the UK Phenomenology
Workshop on Collider Physics, Durham, September 199
- …