skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Remarks on a Mean Field Equation on S2
Award ID(s):
1901914 1953620
PAR ID:
10227488
Author(s) / Creator(s):
Date Published:
Journal Name:
Journal of Mathematical Study
Volume:
54
Issue:
1
ISSN:
1006-6837
Page Range / eLocation ID:
81 to 88
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract We develop a Fredholm theory for the Hodge Laplacian in weighted spaces on ALG ∗ manifolds in dimension four.We then give several applications of this theory.First, we show the existence of harmonic functions with prescribed asymptotics at infinity.A corollary of this is a non-existence result for ALG ∗ manifolds with non-negative Ricci curvature having group Γ = { e } \Gamma=\{e\} at infinity.Next, we prove a Hodge decomposition for the first de Rham cohomology group of an ALG ∗ manifold.A corollary of this is vanishing of the first Betti number for any ALG ∗ manifold with non-negative Ricci curvature.Another application of our analysis is to determine the optimal order of ALG ∗ gravitational instantons. 
    more » « less
  2. Vulnerability Management, which is a vital part of risk and resiliency management efforts, is a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on devices that are likely to be used by attackers to compromise a network component. For effective and efficient vulnerability management, which requires extensive resources– such as time and personnel, vulnerabilities should be prioritized based on their criticality. One of the most common methods to prioritize vulnerabilities is the Common Vulnerability Scoring System (CVSS). However, in its severity score, the National Institute of Standards and Technology (NIST) only provides the base metric values that include exploitability and impact information for the known vulnerabilities and acknowledges the importance of temporal and environmental characteristics to have a more accurate vulnerability assessment. There is no established method to conduct the integration of these metrics. In this study, we created a testbed to assess the vulnerabilities by considering the functional dependencies between vulnerable assets, other assets, and business processes. The experiment results revealed that a vulnerability's severity significantly changes from its CVSS base score when the vulnerable asset's characteristics and role inside the organization are considered. 
    more » « less
  3. null (Ed.)