4,177 research outputs found

    The polarized Drell-Yan process at O(\alpha_s)

    Full text link
    The results of a recent calculation of the QCD corrections to the polarized Drell-Yan process are summarized. Some implications for the production of vector bosons at RHIC are discussed.Comment: 4 pages, LaTeX, 3 figures included, uses aipproc.sty and epsf.tex; Talk presented at the 5th International Workshop on "Deep Inelastic Scattering and QCD" (DIS '97), Chicago, Illinois, USA, April 14-18, 199

    Infrared structure of e+e−→3e^+e^- \to 3 jets at NNLO: QED-type contributions

    Get PDF
    The NNLO QCD corrections to the e+e−→3e^+e^- \to 3 jets can be decomposed according to their colour factors. Out of the seven colour factors, three are of QED-type: 1/N21/N^2, NF/NN_F/N and NF2N_F^2. We use the antenna subtraction method to compute these contributions, providing complete expressions for the subtraction terms in NF/NN_F/N and NF2N_F^2.Comment: Talk presented at Loops and Legs 2006, Eisenac

    Secure Mobile Social Networks using USIM in a Closed Environment

    Get PDF
    Online social networking and corresponding mobile based applications are gaining popularity and now considered a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification

    ARIES WP3 – Needs and Requirements Analyses

    Get PDF
    Information and communication technologies have increasingly influenced and changed our daily life. They allow global connectivity and easy access to distributed applications and digital services over the Internet. This report analysis security requirements on trust establishment and trust evaluation based on two different use case scenarios: "Trusted Communication using COTS" and "Trust Establishment for Cross-organizational Crises Management". A systematic needs analysis is performed on both scenarios which haver resulted in a large and well documented set of requirements. This is the first step in a large effort to define a security architecture for the two use case scenarios.

    Two-Loop Jet Physics: Status and Prospects

    Get PDF
    I review the recent theoretical progress towards the computation of jet observables at two loops in QCD.Comment: 5 pages, Talk presented at 9th International Workshop on ``Deep Inelastic Scattering and QCD'' (DIS 2001), April 2001, Bologna, Ital

    The rising sun of Australian Japan bashing? Racism, American cultural imperialism and Australian popular images of Asia

    Get PDF
    Review and consideration of the implications of the Australian response to the film 'Rising Sun'

    Status of QCD

    Full text link
    In this talk, I review recent developments in perturbative QCD and their applications to collider physics.Comment: Plenary talk presented at XVIII International Workshop on Deep-Inelastic Scattering and Related Subjects, DIS 2010, April 2010, Firenze, Italy; v2: typos corrected, references adde
    • 

    corecore