SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Edgar Richard) srt2:(2010-2014)"

Search: WFRF:(Edgar Richard) > (2010-2014)

  • Result 1-4 of 4
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Abelev, Betty, et al. (author)
  • Measurement of prompt J/psi and beauty hadron production cross sections at mid-rapidity in pp collisions at root s=7 TeV
  • 2012
  • In: Journal of High Energy Physics. - 1029-8479. ; :11
  • Journal article (peer-reviewed)abstract
    • The ALICE experiment at the LHC has studied J/psi production at mid-rapidity in pp collisions at root s = 7 TeV through its electron pair decay on a data sample corresponding to an integrated luminosity L-int = 5.6 nb(-1). The fraction of J/psi from the decay of long-lived beauty hadrons was determined for J/psi candidates with transverse momentum p(t) > 1,3 GeV/c and rapidity vertical bar y vertical bar < 0.9. The cross section for prompt J/psi mesons, i.e. directly produced J/psi and prompt decays of heavier charmonium states such as the psi(2S) and chi(c) resonances, is sigma(prompt J/psi) (p(t) > 1.3 GeV/c, vertical bar y vertical bar < 0.9) = 8.3 +/- 0.8(stat.) +/- 1.1 (syst.)(-1.4)(+1.5) (syst. pol.) mu b. The cross section for the production of b-hadrons decaying to J/psi with p(t) > 1.3 GeV/c and vertical bar y vertical bar < 0.9 is a sigma(J/psi <- hB) (p(t) > 1.3 GeV/c, vertical bar y vertical bar < 0.9) = 1.46 +/- 0.38 (stat.)(-0.32)(+0.26) (syst.) mu b. The results are compared to QCD model predictions. The shape of the p(t) and y distributions of b-quarks predicted by perturbative QCD model calculations are used to extrapolate the measured cross section to derive the b (b) over bar pair total cross section and d sigma/dy at mid-rapidity.
  •  
2.
  • Bellomo, Rinaldo, et al. (author)
  • A controlled trial of electronic automated advisory vital signs monitoring in general hospital wards*
  • 2012
  • In: Critical Care Medicine. - 1530-0293. ; 40:8, s. 2349-2361
  • Journal article (peer-reviewed)abstract
    • OBJECTIVES: Deteriorating ward patients are at increased risk. Electronic automated advisory vital signs monitors may help identify such patients and improve their outcomes. SETTING: A total of 349 beds, in 12 general wards in ten hospitals in the United States, Europe, and Australia. PATIENTS: Cohort of 18,305 patients. DESIGN: Before-and-after controlled trial. INTERVENTION: We deployed electronic automated advisory vital signs monitors to assist in the acquisition of vital signs and calculation of early warning scores. We assessed their effect on frequency, type, and treatment of rapid response team calls; survival to hospital discharge or to 90 days for rapid response team call patients; overall type and number of serious adverse events and length of hospital stay. MEASUREMENTS AND MAIN RESULTS: We studied 9,617 patients before (control) and 8,688 after (intervention) deployment of electronic automated advisory vital signs monitors. Among rapid response team call patients, intervention was associated with an increased proportion of calls secondary to abnormal respiratory vital signs (from 21% to 31%; difference [95% confidence interval] 9.9 [0.1-18.5]; p = .029). Survival immediately after rapid response team treatment and survival to hospital discharge or 90 days increased from 86% to 92% (difference [95% confidence interval] 6.3 [0.0-12.6]; p = .04). Intervention was also associated with a decrease in median length of hospital stay in all patients (unadjusted p < .0001; adjusted p = .09) and more so in U.S. patients (from 3.4 to 3.0 days; unadjusted p < .0001; adjusted ratio [95% confidence interval] 1.03 [1.00-1.06]; p = .026). The time required to complete and record a set of vital signs decreased from 4.1 ± 1.3 mins to 2.5 ± 0.5 mins (difference [95% confidence interval] 1.6 [1.4-1.8]; p < .0001). CONCLUSIONS: Deployment of electronic automated advisory vital signs monitors was associated with an improvement in the proportion of rapid response team-calls triggered by respiratory criteria, increased survival of patients receiving rapid response team calls, and decreased time required for vital signs measurement and recording (NCT01197326).
  •  
3.
  • Pälike, Heiko, et al. (author)
  • A Cenozoic record of the equatorial Pacific carbonate compensation depth
  • 2012
  • In: Nature. - : Springer Science and Business Media LLC. - 0028-0836 .- 1476-4687. ; 488:7413, s. 609-614
  • Journal article (peer-reviewed)abstract
    • Atmospheric carbon dioxide concentrations and climate are regulated on geological timescales by the balance between carbon input from volcanic and metamorphic outgassing and its removal by weathering feedbacks; these feedbacks involve the erosion of silicate rocks and organic-carbon-bearing rocks. The integrated effect of these processes is reflected in the calcium carbonate compensation depth, which is the oceanic depth at which calcium carbonate is dissolved. Here we present a carbonate accumulation record that covers the past 53 million years from a depth transect in the equatorial Pacific Ocean. The carbonate compensation depth tracks long-term ocean cooling, deepening from 3.0-3.5 kilometres during the early Cenozoic (approximately 55 million years ago) to 4.6 kilometres at present, consistent with an overall Cenozoic increase in weathering. We find large superimposed fluctuations in carbonate compensation depth during the middle and late Eocene. Using Earth system models, we identify changes in weathering and the mode of organic-carbon delivery as two key processes to explain these large-scale Eocene fluctuations of the carbonate compensation depth.
  •  
4.
  • Winter, Philipp, 1986-, et al. (author)
  • Spoiled Onions : Exposing Malicious Tor Exit Relays
  • 2014
  • In: Privacy Enhancing Technologies. - Cham : Springer. - 9783319085067 - 9783319085050 ; , s. 304-331
  • Conference paper (peer-reviewed)abstract
    • Tor exit relays are operated by volunteers and together push more than 1 GiB/s of network traffic. By design, these volunteers are able to inspect and modify the anonymized network traffic. In this paper, we seek to expose such malicious exit relays and document their actions. First, we monitored the Tor network after developing two fast and modular exit relay scanners-one for credential sniffing and one for active MitM attacks. We implemented several scanning modules for detecting common attacks and used them to probe all exit relays over a period of several months. We discovered numerous malicious exit relays engaging in a multitude of different attacks. To reduce the attack surface users are exposed to, we patched Torbutton, an existing browser extension and part of the Tor Browser Bundle, to fetch and compare suspicious X. 509 certificates over independent Tor circuits. Our work makes it possible to continuously and systematically monitor Tor exit relays. We are able to detect and thwart many man-in-the-middle attacks, thereby making the network safer for its users. All our source code is available under a free license.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-4 of 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view