4,642 research outputs found
Reflective scattering effects in double-pomeron exchange processes
We discuss energy dependence of rapidity gap survival probability in the
double-pomeron exchange processes with account of the reflective scattering
effects.Comment: 11 pages, 3 figure
Optical Properties of the DIRC Fused Silica Cherenkov Radiator
The DIRC is a new type of Cherenkov detector that is successfully operating
as the hadronic particle identification system for the BABAR experiment at
SLAC. The fused silica bars that serve as the DIRC's Cherenkov radiators must
transmit the light over long optical pathlengths with a large number of
internal reflections. This imposes a number of stringent and novel requirements
on the bar properties. This note summarizes a large amount of R&D that was
performed both to develop specifications and production methods and to
determine whether commercially produced bars could meet the requirements. One
of the major outcomes of this R&D work is an understanding of methods to select
radiation hard and optically uniform fused silica material. Others include
measurement of the wavelength dependency of the internal reflection
coefficient, and its sensitivity to surface contaminants, development of
radiator support methods, and selection of good optical glue.Comment: 36 pages, submitted to Nuclear Instruments and Methods
Stakeholder Conflict and Standard-setting foundation oversight
This study examines foundation oversight authority as a distinct tool used to maintain the accounting profession’s delegated authority to set standards. Prior literature traditionally focuses on the standard-setting boards and technical arguments surrounding proposed accounting standards. We examine whether the Financial Accounting Foundation (FAF) can manage stakeholder conflict and legitimize contentious activity through exercise of its oversight role. The presented case is a qualitative analysis of the FAF’s GASB Scope of Authority project, a rare public exercise of FAF oversight authority, in which the FAF applied its authority despite stakeholder disagreement on the line between oversight and standard setting. We observe the FAF’s oversight of standard setting due process as opposed to the content of proposed standard setting projects. The policy formalizes private consultation at this blurred boundary to safeguard board autonomy and delegated authority. Implications and precedence for the FASB and other contentious accounting issues (e.g., deliberations around ESG reporting) are discussed
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks
As today's organizational computer networks are ever evolving and becoming
more and more complex, finding potential vulnerabilities and conducting
security audits has become a crucial element in securing these networks. The
first step in auditing a network is reconnaissance by mapping it to get a
comprehensive overview over its structure. The growing complexity, however,
makes this task increasingly effortful, even more as mapping (instead of plain
scanning), presently, still involves a lot of manual work. Therefore, the
concept proposed in this paper automates the scanning and mapping of unknown
and non-cooperative computer networks in order to find security weaknesses or
verify access controls. It further helps to conduct audits by allowing
comparing documented with actual networks and finding unauthorized network
devices, as well as evaluating access control methods by conducting delta
scans. It uses a novel approach of augmenting data from iteratively chained
existing scanning tools with context, using genuine analytics modules to allow
assessing a network's topology instead of just generating a list of scanned
devices. It further contains a visualization model that provides a clear, lucid
topology map and a special graph for comparative analysis. The goal is to
provide maximum insight with a minimum of a priori knowledge.Comment: 7 pages, 6 figure
- …