16,718 research outputs found

    Axioms for higher torsion invariants of smooth bundles

    Full text link
    We explain the relationship between various characteristic classes for smooth manifold bundles known as ``higher torsion'' classes. We isolate two fundamental properties that these cohomology classes may or may not have: additivity and transfer. We show that higher Franz-Reidemeister torsion and higher Miller-Morita-Mumford classes satisfy these axioms. Conversely, any characteristic class of smooth bundles satisfying the two axioms must be a linear combination of these two examples. We also show how higher torsion invariants can be computed using only the axioms. Finally, we explain the conjectured formula of S. Goette relating higher analytic torsion classes and higher Franz-Reidemeister torsion.Comment: 24 pages, 0 figure

    Dynamical Structure of Viscous Accretion Disks with Shocks

    Full text link
    We develop and discuss global accretion solutions for viscous ADAF disks containing centrifugally supported isothermal shock waves. The fact that such shocks can exist at all in ADAF disks is a new result. Interestingly, we find that isothermal shocks can form even when the level of viscous dissipation is relatively high. In order to better understand this phenomenon, we explore all possible combinations of the fundamental flow parameters, such as specific energy, specific angular momentum, and viscosity, to obtain the complete family of global solutions. This procedure allows us to identify the region of the parameter space where isothermal shocks can exist in viscous ADAF disks. The allowed region is maximized in the inviscid case, and it shrinks as the level of viscous dissipation increases. Adopting the canonical value gamma=1.5 for the ratio of specific heats, we find that the shock region disappears completely when the Shakura-Sunyaev viscosity parameter alpha exceeds the critical value ~0.27. This establishes for the first time that steady ADAF disks containing shocks can exist even for relatively high levels of viscous dissipation. If an isothermal shock is present in the disk, it would have important implications for the acceleration of energetic particles that can escape to power the relativistic jets commonly observed around underfed, radio-loud black holes. In two specific applications, we confirm that the kinetic luminosity lost from the disk at the isothermal shock location is sufficient to power the observed relativistic outflows in M87 and Sgr A*.Comment: accepted by Ap

    ROSAT HRI Observations of the Crab Pulsar: An Improved Temperature upper limit for PSR 0531+21

    Get PDF
    ROSAT HRI observations have been used to determine an upper limit of the Crab pulsar surface temperature from the off-pulse count rate. For a neutron star mass of 1.4 \Mo and a radius of 10 km as well as the standard distance and interstellar column density, the redshifted temperature upper limit is\/ Ts∞≀1.55×106T_s^\infty \le 1.55\times 10^6 K (3σ)(3\sigma). This is the lowest temperature upper limit obtained for the Crab pulsar so far. Slightly different values for Ts∞T_s^\infty are computed for the various neutron star models available in the literature, reflecting the difference in the equation of state.Comment: 5 pages, uuencoded postscript, to be published in the Proceedings of the NATO Advanced Study Insitute on "Lives of the Neutron Stars", ed. A. Alpar, U. Kiziloglu and J. van Paradijs ( Kluwer, Dordrecht, 1995 )

    Measuring the Success of Context-Aware Security Behaviour Surveys

    Get PDF
    Background: We reflect on a methodology for developing scenario-based security behaviour surveys that evolved through deployment in two large partner organisations (A & B). In each organisation, scenarios are grounded in workplace tensions between security and employees’ productive tasks. These tensions are drawn from prior interviews in the organisation, rather than using established but generic questionnaires. Survey responses allow clustering of participants according to predefined groups. Aim: We aim to establish the usefulness of framing survey questions around active security controls and problems experienced by employees, by assessing the validity of the clustering. We introduce measures for the appropriateness of the survey scenarios for each organisation and the quality of candidate answer options. We use these scores to articulate the methodological improvements between the two surveys. Method: We develop a methodology to verify the clustering of participants, where 516 (A) and 195 (B) free-text responses are coded by two annotators. Inter-annotator metrics are adopted to identify agreement. Further, we analyse 5196 (A) and 1824 (B) appropriateness and severity scores to measure the appropriateness and quality of the questions. Results: Participants rank questions in B as more appropriate than in A, although the variations in the severity of the answer options available to participants is higher in B than in A. We find that the scenarios presented in B are more recognisable to the participants, suggesting that the survey design has indeed improved. The annotators mostly agree strongly on their codings with Krippendorff’s α\textgreater0.7. A number of clusterings should be questioned, although α improves for reliable questionsby 0.15 from A to B. Conclusions: To be able to draw valid conclusions from survey responses, the train of analysis needs to be verifiable. Our approach allows us to further validate the clustering of responses by utilising free-text responses. Further, we establish the relevance and appropriateness of the scenarios for individual organisations. While much prior research draws on survey instruments from research before it, this is then often applied in a different context; in these cases adding metrics of appropriateness and severity to the survey design can ensure that results relate to the security experiences of employees

    Applying Cognitive Control Modes to Identify Security Fatigue Hotspots

    Get PDF
    Security tasks can burden the individual, to the extent that security fatigue promotes habits that undermine security. Here we revisit a series of user-centred studies which focus on security mechanisms as part of regular routines, such as two-factor authentication. By examining routine security behaviours, these studies expose perceived contributors and consequences of security fatigue, and the strategies that a person may adopt when feeling overburdened by security. Behaviours and strategies are framed according to a model of cognitive control modes, to explore the role of human performance and error in producing security fatigue. Security tasks are then considered in terms of modes such as unconscious routines and knowledge-based ad-hoc approaches. Conscious attention can support adaptation to novel security situations, but is error-prone and tiring; both simple security routines and technology-driven automation can minimise effort, but may miss cues from the environment that a nuanced response is required

    Interface-tuned epoxy/clay nanocomposites

    Get PDF
    Though interface has been known for a critical role in determining the properties of conventional composites, its role in polymer nanocomposites is still fragmented and in its infancy. This study synthesized a series of epoxy/clay nanocomposites with different interface strength by using three types of modiïŹers: ethanolamine (denoted ETH), Jeffamineïżœ M2070 (M27) and Jeffamineïżœ XTJ502 (XTJ). XTJ created a strong interface between clay layers and matrix because it bridged the layers with matrix by a chemical reaction as proved by Fourier transform infrared spectroscopy; M27 produced an interme-diate interface strength due to the molecular entanglement between grafted M27 chains and matrix molecules; the interface made by ETH was weak because neither chemical bridging nor molecular entanglement was involved. The studies of mechanical and thermal properties and morphology at a wide range of magniïŹcation show that the strong interface promoted the highest level of exfoliation and dispersion of clay layers, and achieved the most increment in Young’s modulus, fracture toughness and glass transition temperature (Tg) of matrix. With w1.3 wt% clay, the critical strain energy release rate G1c of neat epoxy improved from 179.0 to 384.7 J/m, 115% improvement and Tg enhanced from 93.7 to 99.

    Finding Security Champions in Blends of Organisational Culture

    Get PDF
    Security managers define policies and procedures to express how employees should behave to 'do their bit' for information security. They assume these policies are compatible with the business processes and individual employees' tasks as they know them. Security managers usually rely on the 'official' description of how those processes are run; the day-to-day reality is different, and this is where security policies can cause friction. Organisations need employees to participate in the construction of workable security, by identifying where policies causes friction, are ambiguous, or just do not apply. However, current efforts to involve employees in security act to identify employees who can be local representatives of policy - as with the currently popular idea of 'security champions' - rather than as a representative of employee security needs. Towards helping organisations 'close the loop' and get input from employees, we have conducted employee surveys on security in the context of their specific jobs. The paper presents results from secondary analysis of one such survey in a large commercial organisation. The analysis of 608 responses finds that attitude to policy and behaviour types - the prevailing security cultures - vary greatly in the organisation and across four business divisions examined in further detail. There is a role in contributing to the effectiveness of security policies not only for those who follow policy, but also for those who question policy, socialise solutions, or expect security to justify itself as a critical part of their productive work. This demonstrates that security champions cannot be uniform across the organisation, but rather that organisations should re-think the role of security champions as diverse 'bottom-up' agents to change policy for the better, rather than communicators of existing 'top-down' policies

    Applications of High Resolution High Sensitivity Observations of the CMB

    Full text link
    With WMAP putting the phenomenological standard model of cosmology on a strong footing, one can look forward to mining the cosmic microwave background (CMB) for fundamental physics with higher sensitivity and on smaller scales. Future CMB observations have the potential to measure absolute neutrino masses, test for cosmic acceleration independent of supernova Ia observations, probe for the presence of dark energy at redshifts of 2 and larger, illuminate the end of the dark ages, measure the scale--dependence of the primordial power spectrum and detect gravitational waves generated by inflation.Comment: To be published in the proceedings of the workshop on "The Cosmic Microwave Background and its Polarization", New Astronomy Reviews, (eds. S. Hanany and K.A. Olive

    Towards Agile Scalability Engineering

    Get PDF
    Scalability engineering is currently not well integrated into agile development techniques. This paper extends agile development techniques so that scalability can be handled in an incremental and iterative development process. By scalability we mean the ability of a system to handle increasing workload. We propose the ScrumScale Method which includes scalability engineering in Scrum. This extension should also be applicable to other agile techniques. For scalability testing, we indicate how quality thresholds should be scaled up or down according to the degree of completeness of the product, test hardware, test software, test data and test workload. Using action research, we have conducted three pilots in three Norwegian software organizations. These three pilots have different architectures and operate in different markets yet have in common scalability challengespublishedVersio

    "No Good Reason to Remove Features": Expert Users Value Useful Apps over Secure Ones

    Get PDF
    Application sandboxes are an essential security mechanism to contain malware, but are seldom used on desktops. To understand why this is the case, we interviewed 13 expert users about app appropriation decisions they made on their desktop computers. We collected 201 statements about app appropriation decisions. Our value-sensitive empirical analysis of the interviews revealed that (a) security played a very minor role in app appropriation; (b) users valued plugins that support their productivity; (c) users may abandon apps that remove a feature – especially when a feature was blocked for security reasons. Our expert desktop users valued a stable user experience and flexibility, and are unwilling to sacrifice those for better security. We conclude that sandboxing – as currently implemented – is unlikely to be voluntarily adopted, especially by expert users. For sandboxing to become a desirable security mechanism, they must first accommodate plugins and features widely found in popular desktop apps
    • 

    corecore