The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new heavy gauge boson, W′, decaying to a muon and a neutrino, is searched for in pp collisions at a centre-of-mass energy of 7 TeV. The data, collected with the CMS detector at the LHC, correspond to an integrated luminosity of 36 pb−1. No significant excess of events above the standard model expectation is found in the transverse mass distribution of the muon–neutrino system. Masses below 1.40...
A measurement of W+W− production in pp collisions at s=7 TeV and a search for the Higgs boson are reported. The W+W− candidates are selected in events with two leptons, either electrons or muons. The measurement is performed using LHC data recorded with the CMS detector, corresponding to an integrated luminosity of 36 pb−1. The pp → W+W− cross section is measured to be 41.1±15.3(stat)±5.8(syst)±4...
Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of rules where each rule is represented as a predicate and an action. This paper proposes modeling of firewall rules via directed acyclic graphs (DAG), from which test cases can be automatically...
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of program, and can be provoked by an intruder to gain control of or access to stored data. In order to countermeasure this well-known vulnerability issue, this paper focuses on input validation of graphical user interfaces (GUI). The approach proposed generates test cases for numerical inputs based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.