Type

Database

Creator

Date

Thumbnail

Search results

40 records were found.

This dissertation describes a search for the Standard Model Higgs boson in Z+photon channel with the ATLAS detector at the LHC using 4.6 fb⁻¹ of proton-proton collisions at center of mass energy 7 TeV in 2011 and 20.7 fb⁻¹ of proton-proton collisions at center of mass energy 8 TeV in 2012. The distribution of the mass difference between M_Zphoton and M_Z is compared to the Standard Model (SM) background expectations. No significant deviation from the SM prediction is observed and the upper limits on the signal strength μ of a Higgs boson with a mass between 120 and 150 GeV are derived. The expected exclusion limits at 95% confidence level range between 7.3 and 22.3 times the predicted Standard Model cross section. The observed exclusion limits range between 5.3 and 38.7 times the Standard Model cross section. For a Higgs boson with m...
Role-based access control (RBAC) has been proven to be a flexible and useful access control model for information sharing in distributed collaborative environments. Permission-role assignments (PRA) are one important process in the access model. However, problems may arise during the procedures of PRA. Conflicting permissions may assign to one role, and as a result, the role with the permissions can derive unexpected access capabilities. This paper aims to analyse the problems during the procedures of permission-role assignments in distributed collaborative environments and to develop authorization allocation algorithms to address the problems with permission-role assignments. The algorithms are extended to the case of PRA with the mobility of permission-role relationship. Finally, comparisons with other related work are discussed to d...
This paper systematically addresses the security and pricacy concerns for e-learning systems. An effective architecture of e-learning system is proposed for a thorough overview on security and privacy issues related to current e-learning systems. This paper further examines the relationship among security & privacy policy, available security & privacy technolongy, and the degree of e-learning privacy & security. This paper significantly contributes to the knowledge of e-learning security & privacy research communities and will generate more research interests in this regard.
Comment: 21 pages,9 figures, 11 tables. Submitted to Wireless Personal Communications
Notes from a course taught by Palle Jorgensen in the fall semester of 2009. The course covered central themes in functional analysis and operator theory, with an emphasis on topics of special relevance to such applications as representation theory, harmonic analysis, mathematical physics, and stochastic integration.
Studying unitary one-parameter groups in Hilbert space (U(t),H), we show that a model for obstacle scattering can be built, up to unitary equivalence, with the use of translation representations for L2-functions in the complement of two finite and disjoint intervals. The model encompasses a family of systems (U (t), H). For each, we obtain a detailed spectral representation, and we compute the scattering operator, and scattering matrix. We illustrate our results in the Lax-Phillips model where (U (t), H) represents an acoustic wave equation in an exterior domain; and in quantum tunneling for dynamics of quantum states.
Comment: arXiv admin note: text overlap with arXiv:1201.1447
Comment: 21 pages with 2 figures
Want to know more?If you want to know more about this cutting edge product, or schedule a demonstration on your own organisation, please feel free to contact us or read the available documentation at http://www.keep.pt/produtos/retrievo/?lang=en