期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Next-to-leading-order relativistic and QCD corrections to prompt J/ψpair photoproduction at future e^(+)e^(−)colliders
1
作者 Zhi-Guo He Xiao-Bo Jin +1 位作者 Bernd A.Kniehl Rong Li 《Chinese Physics C》 SCIE CAS CSCD 2024年第8期104-112,共9页
Within the framework of nonrelativistic-QCD factorization,we calculate both the next-to-leading-order relativistic and QCD corrections to prompt J/ψpair production,with feed-down fromψ(2S)mesons,via photon-photon co... Within the framework of nonrelativistic-QCD factorization,we calculate both the next-to-leading-order relativistic and QCD corrections to prompt J/ψpair production,with feed-down fromψ(2S)mesons,via photon-photon collisions at future e^(+)e^(−)colliders,including the Future Circular Lepton Collider(FCC-ee),the Circular Electron Positron Collider(CEPC),and the Compact Linear Collider(CLIC).We present total cross sections and distributions in single J/ψtransverse momentum and rapidity,as well as in J/ψpair invariant mass.The relativistic and QCD corrections both turn out to be large and negative.However,the production rates are large enough for useful experimental studies. 展开更多
关键词 heavy quarkonium perturbative calculation two-photon collisions
原文传递
On the Relative Twist Formula of l-adic Sheaves 被引量:1
2
作者 En Lin YANG Yi Geng ZHAO 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2021年第1期73-94,共22页
We propose a conjecture on the relative twist formula of l-adic sheaves,which can be viewed as a generalization of Kato-Saito’s conjecture.We verify this conjecture under some transversal assumptions.We also define a... We propose a conjecture on the relative twist formula of l-adic sheaves,which can be viewed as a generalization of Kato-Saito’s conjecture.We verify this conjecture under some transversal assumptions.We also define a relative cohomological characteristic class and prove that its formation is compatible with proper push-forward.A conjectural relation is also given between the relative twist formula and the relative cohomological characteristic class. 展开更多
关键词 Epsilon factor twist formula cohomological characteristic class Künneth formula
原文传递
Human-as-a-security-sensor for harvesting threat intelligence 被引量:1
3
作者 Manfred Vielberth Florian Menges Günther Pernul 《Cybersecurity》 CSCD 2019年第1期349-363,共15页
Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the tar... Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept. 展开更多
关键词 Cyber threat intelligence Human awareness Human-as-a-security-sensor Security information and event management(SIEM)
原文传递
The Convex-Set Algebra and Intersection Theory on the Toric Riemann–Zariski Space
4
作者 Ana María BOTERO 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2022年第3期465-486,共22页
In previous work of the author,a top intersection product of toric b-divisors on a smooth complete toric variety is defined.It is shown that a nef toric b-divisor corresponds to a convex set and that its top inetersec... In previous work of the author,a top intersection product of toric b-divisors on a smooth complete toric variety is defined.It is shown that a nef toric b-divisor corresponds to a convex set and that its top inetersection number equals the volume of this convex set.The goal of this article is to extend this result and define an intersection product of sufficiently positive toric b-classes of arbitrary codimension.For this,we extend the polytope algebra of McMullen to the so called convex-set algebra and we show that it embeds in the toric b-Chow group.In this way,the convex-set algebra can be viewed as a ring for an intersection theory for sufficiently positive toric b-classes.As an application,we show that some Hodge type inequalities are satisfied for the convex set algebra. 展开更多
关键词 Convex geometry intersection theory toric varieties b-Chow groups Riemann–Zariski spaces
原文传递
Correction to:Human-as-a-security-sensor for harvesting threat intelligence
5
作者 Manfred Vielberth Florian Menges Günther Pernul 《Cybersecurity》 CSCD 2019年第1期364-364,共1页
Correction to:Cybersecurity(2019)2:23 https://doi.org/10.1186/s42400-019-0040-0 In the original publication of this article(Vielberth et al.2019),the author list was not completed.The correct author list should be Man... Correction to:Cybersecurity(2019)2:23 https://doi.org/10.1186/s42400-019-0040-0 In the original publication of this article(Vielberth et al.2019),the author list was not completed.The correct author list should be Manfred Vielberth,Florian Menges and Günther Pernul.The publisher apologizes to the readers and authors for the inconvenience.The original publication has been corrected. 展开更多
关键词 HARVESTING HUMAN THREAT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部