3,785 research outputs found

    High-Mass Supersymmetry with High Energy Hadron Colliders

    Full text link
    While it is natural for supersymmetric particles to be well within the mass range of the large hadron collider, it is possible that the sparticle masses could be very heavy. Signatures are examined at a very high energy hadron collider and an very high luminosity option for the Large Hadron Collider in such scenarios

    180 DEGREE REFLECTIVITY AND VELOCITY PERTURBATION OF THIN METAL DOTS.

    Get PDF
    Reflective arrays of rectangular thin metal 'dots' spaced in a regular or near regular grid pattern, such as have been used in surface acoustic wave resonators and in-line dot RACs on LiNbO//3 , are analyzed. The half-wavelength spacing of dots required leads to capacitative coupling between adjacent dots. The charge distribution induced on the dots by the passage of the SAW is presented including the coupling. The 180 degree SAW reflectivity of the dots and the SAW velocity perturbation through the dot array are given for a range of dot sizes. These are shown to be in good agreement with experimental results. The work establishes that the method of analysis can form the basis of the design of 180 degree reflective weighted dot arrays, allowing them to be implemented through varying dot density and/or by varying dot dimensions

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    World Bank work with nongovernmental organizations

    Get PDF
    This report reviews 24 out of 202 Bank projects that involved nongovernmental organizations (NGOs) in order to identify ways to improve Bank-NGO collaboration. It identifies five functional categories of NGO interaction with the Bank along a public-private continuum, based on the varying degrees to which they represent social goals on the public end of the continuum and economic goals on the private end. Discussion focuses on the benefits and difficulties arising from the involvement of NGOs in each category in Bank-supported projects. It recommends involving NGOs before implementation, developing creative financing mechanisms to support them, and learning what they have to teach Bank staff about motivation, education and organization. The challenge for the Bank is to forge institutional links between governments and NGOs that extend and complement government capabilities. Governments and NGOs must learn to respect each other so they can work toward such mutual goals as poverty alleviation.Health Monitoring&Evaluation,Agricultural Knowledge&Information Systems,Poverty Monitoring&Analysis,ICT Policy and Strategies,Health Economics&Finance

    Metamodel-based model conformance and multiview consistency checking

    Get PDF
    Model-driven development, using languages such as UML and BON, often makes use of multiple diagrams (e.g., class and sequence diagrams) when modeling systems. These diagrams, presenting different views of a system of interest, may be inconsistent. A metamodel provides a unifying framework in which to ensure and check consistency, while at the same time providing the means to distinguish between valid and invalid models, that is, conformance. Two formal specifications of the metamodel for an object-oriented modeling language are presented, and it is shown how to use these specifications for model conformance and multiview consistency checking. Comparisons are made in terms of completeness and the level of automation each provide for checking multiview consistency and model conformance. The lessons learned from applying formal techniques to the problems of metamodeling, model conformance, and multiview consistency checking are summarized

    Simulating Supersymmetry with ISAJET 7.0/ ISASUSY 1.0

    Full text link
    We review the physics assumptions and input used in ISAJET~7.0 / ISA\-SUSY~1.0 that are relevant for simulating fundamental processes within the framework of the Minimal Supersymmetric Standard Model (MSSM) at ppˉp\bar p and pppp colliders. After a brief discussion of the underlying MSSM framework, we discuss event simulation and list the sparticle production processes and decay modes that have been incorporated into our calculations. We then describe how to set up and run an ISAJET / ISASUSY job and the user input and output formats. The ISAJET program is sufficiently flexible that some non-minimal supersymmetry scenarios may be simulated as well. Finally, plans for future upgrades which include the extension to e+ee^+ e^- collisions, are listed.Comment: 17 pages, FSU-HEP-930329 UH-511-764-9

    Lamp enables measurement of oxygen concentration in presence of water vapor

    Get PDF
    Open-electrode ultraviolet source lamp radiates sufficient energy at 1800 angstroms and 1470 angstroms for use in a double-beam, duel-wavelength oxygen sensor. The lamp is filled with xenon at a pressure of 100 mm of Hg

    Putting formal specifications under the magnifying glass: Model-based testing for validation

    Get PDF
    A software development process is effectively an abstract form of model transformation, starting from an end-user model of requirements, through to a system model for which code can be automatically generated. The success (or failure) of such a transformation depends substantially on obtaining a correct, well-formed initial model that captures user concerns. Model-based testing automates black box testing based on the model of the system under analysis. This paper proposes and evaluates a novel model-based testing technique that aims to reveal specification/requirement-related errors by generating test cases from a test model and exercising them on the design model. The case study outlined in the paper shows that a separate test model not only increases the level of objectivity of the requirements, but also supports the validation of the system under test through test case generation. The results obtained from the case study support the hypothesis that there may be discrepancies between the formal specification of the system modeled at developer end and the problem to be solved, and using solely formal verification methods may not be sufficient to reveal these. The approach presented in this paper aims at providing means to obtain greater confidence in the design model that is used as the basis for code generation

    Engineering bidirectional transformations

    Get PDF
    Bidirectional transformations, like software, need to be carefully engineered in order to provide guarantees about their correctness, completeness, acceptability and usability. This paper summarises a collection of lectures pertaining to engineering bidirectional transformations using Model-Driven Engineering techniques and technologies. It focuses on stages of a typical engineering lifecycle, starting with requirements and progressing to implementation and verification. It summarises Model-Driven Engineering approaches to capturing requirements, architectures and designs for bidirectional transformations, and suggests an approach for verification as well. It concludes by describing some challenges for future research into engineering bidirectional transformations
    corecore