1,380 research outputs found

    Large rescaling of the Higgs condensate: theoretical motivations and lattice results

    Get PDF
    In the Standard Model the Fermi constant is associated with the vacuum expectation value of the Higgs field, `the condensate', usually believed to be a cutoff-independent quantity. General arguments related to the `triviality' of Ί4\Phi^4 theory in 4 space-time dimensions suggest, however, a dramatic renormalization effect in the continuum limit that is clearly visible on the relatively large lattices available today. The result can be crucial for the Higgs phenomenology and in any context where spontaneous symmetry breaking is induced through scalar fields.Comment: LATTICE99(Higgs) 3 pages, 3 figure

    Indications on the Higgs boson mass from lattice simulations

    Full text link
    The `triviality' of Ί44\Phi^4_4 has been traditionally interpreted within perturbation theory where the prediction for the Higgs boson mass depends on the magnitude of the ultraviolet cutoff Λ\Lambda. This approach crucially assumes that the vacuum field and its quantum fluctuations rescale in the same way. The results of the present lattice simulation, confirming previous numerical indications, show that this assumption is not true. As a consequence, large values of the Higgs mass mHm_H can coexist with the limit Λ→∞\Lambda\to \infty . As an example, by extrapolating to the Standard Model our results obtained in the Ising limit of the one-component theory, one can obtain a value as large as mH=760±21m_H=760 \pm 21 GeV, independently of Λ\Lambda.Comment: 3 pages, 2 figures, Lattice2003(higgs

    Vulnerabilities and responsibilities: dealing with monsters in computer security

    Get PDF
    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud \ud Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud \ud Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud \ud Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud \ud Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud \ud Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk

    Vacuum condensates and `ether-drift' experiments

    Full text link
    The idea of a `condensed' vacuum state is generally accepted in modern elementary particle physics. We argue that this should motivate a new generation of precise `ether-drift' experiments with present-day technology.Comment: Latex file, 12 pages, no figure
    • 

    corecore