4,529 research outputs found

    Reflective scattering effects in double-pomeron exchange processes

    Full text link
    We discuss energy dependence of rapidity gap survival probability in the double-pomeron exchange processes with account of the reflective scattering effects.Comment: 11 pages, 3 figure

    Optical Properties of the DIRC Fused Silica Cherenkov Radiator

    Full text link
    The DIRC is a new type of Cherenkov detector that is successfully operating as the hadronic particle identification system for the BABAR experiment at SLAC. The fused silica bars that serve as the DIRC's Cherenkov radiators must transmit the light over long optical pathlengths with a large number of internal reflections. This imposes a number of stringent and novel requirements on the bar properties. This note summarizes a large amount of R&D that was performed both to develop specifications and production methods and to determine whether commercially produced bars could meet the requirements. One of the major outcomes of this R&D work is an understanding of methods to select radiation hard and optically uniform fused silica material. Others include measurement of the wavelength dependency of the internal reflection coefficient, and its sensitivity to surface contaminants, development of radiator support methods, and selection of good optical glue.Comment: 36 pages, submitted to Nuclear Instruments and Methods

    An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

    Full text link
    As today's organizational computer networks are ever evolving and becoming more and more complex, finding potential vulnerabilities and conducting security audits has become a crucial element in securing these networks. The first step in auditing a network is reconnaissance by mapping it to get a comprehensive overview over its structure. The growing complexity, however, makes this task increasingly effortful, even more as mapping (instead of plain scanning), presently, still involves a lot of manual work. Therefore, the concept proposed in this paper automates the scanning and mapping of unknown and non-cooperative computer networks in order to find security weaknesses or verify access controls. It further helps to conduct audits by allowing comparing documented with actual networks and finding unauthorized network devices, as well as evaluating access control methods by conducting delta scans. It uses a novel approach of augmenting data from iteratively chained existing scanning tools with context, using genuine analytics modules to allow assessing a network's topology instead of just generating a list of scanned devices. It further contains a visualization model that provides a clear, lucid topology map and a special graph for comparative analysis. The goal is to provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure

    Outstanding problems in the phenomenology of hard diffractive scattering

    Get PDF
    This paper is a summary of the discussion within the Diffractive and Low-x Physics Working Group at the 1999 Durham Collider Workshop of the interpretation of the Tevatron and HERA measurements of inclusive hard diffraction.Comment: 5 pages, 1 figure. Talks and discussions from the UK Phenomenology Workshop on Collider Physics, Durham, September 199
    • …
    corecore