4,177 research outputs found
The polarized Drell-Yan process at O(\alpha_s)
The results of a recent calculation of the QCD corrections to the polarized
Drell-Yan process are summarized. Some implications for the production of
vector bosons at RHIC are discussed.Comment: 4 pages, LaTeX, 3 figures included, uses aipproc.sty and epsf.tex;
Talk presented at the 5th International Workshop on "Deep Inelastic
Scattering and QCD" (DIS '97), Chicago, Illinois, USA, April 14-18, 199
Infrared structure of jets at NNLO: QED-type contributions
The NNLO QCD corrections to the jets can be decomposed
according to their colour factors. Out of the seven colour factors, three are
of QED-type: , and . We use the antenna subtraction
method to compute these contributions, providing complete expressions for the
subtraction terms in and .Comment: Talk presented at Loops and Legs 2006, Eisenac
Secure Mobile Social Networks using USIM in a Closed Environment
Online social networking and corresponding mobile based applications are gaining popularity and now considered
a well-integrated service within mobile devices. Basic security mechanisms normally based on passwords for the authentication of social-network users are widely deployed and poses a threat for the user security. In particular, for dedicated social groups with high confidentiality and privacy demands, stronger and user friendly principles for the authentication and identification of group members are needed. On the other hand, most of the mobile units already provide strong authentication procedures through the USIM/ISIM module. This paper explores how to build an architectural framework for secure enrollment and identification of group members in dedicated closed social groups using the USIM/SIM authentication and in particular, the 3GPP Generic Authentication Architecture (GAA), which is built upon the USIM/SIM capabilities. One part of the research is to identify the marketable use-cases with corresponding security challenges to fulfill the requirements that extend beyond the online connectivity. This paper proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have also implemented an initial proof of the concept prototype to simulate the secure identification procedure based on the proposed design. Our implementation has demonstrated the flexibility of the solution to be applied independently for applications requiring secure identification
ARIES WP3 â Needs and Requirements Analyses
Information and communication technologies have increasingly
influenced and changed our daily life. They allow global
connectivity and easy access to distributed applications and
digital services over the Internet. This report analysis security requirements on trust establishment and trust evaluation based on two different use case scenarios: "Trusted Communication using COTS" and "Trust Establishment for Cross-organizational Crises Management". A systematic needs analysis is performed on both scenarios which haver resulted in a large and well documented set of requirements. This is the first step in a large effort to define a security architecture for the two use case scenarios.
Two-Loop Jet Physics: Status and Prospects
I review the recent theoretical progress towards the computation of jet
observables at two loops in QCD.Comment: 5 pages, Talk presented at 9th International Workshop on ``Deep
Inelastic Scattering and QCD'' (DIS 2001), April 2001, Bologna, Ital
The rising sun of Australian Japan bashing? Racism, American cultural imperialism and Australian popular images of Asia
Review and consideration of the implications of the Australian response to the film 'Rising Sun'
Status of QCD
In this talk, I review recent developments in perturbative QCD and their
applications to collider physics.Comment: Plenary talk presented at XVIII International Workshop on
Deep-Inelastic Scattering and Related Subjects, DIS 2010, April 2010,
Firenze, Italy; v2: typos corrected, references adde
- âŠ