Welcome to the Wikispace for the Kavli Institute for Theoretical Physics program
Experimental Challenges for the LHC Run II
Mar 28, 2016 - Jun 3, 2016
Coordinators: Claudio Campagnari, Monica D'Onofrio, Fabiola Gianotti, Ian Hinchliffe, Joe Incandela
experlhc16-logo.jpg

Items for subsequent discussion throughout the program:
  • Recipe for usage of NLO electroweak corrections in high PT tails of jet, V+jet, VV, and VV+jets production
  • Recipe for systematic uncertainties for NLO electroweak corrections for precision electroweak physics
  • Best practices and issues for estimating the W and Z PT distribution for precision electroweak physics
  • What differences if any are important for 4F and 5F calculations for V+heavy flavor production, as well as Single Top and charged Higgs
  • Uncertainties for VV and VV+0 jet cross sections in light of recent progress for NNLO QCD cross sections
  • Technical considerations for PDF error estimation in precision electroweak physics arising from profiling Hessians and/or using NNPDF-style replicas simultaneously with the data
  • Experimental limitations for measuring heavy quark production especially in the collinear/gluon splitting instance

Need Help?

  • Claudio C. has volunteered to be the wikimaster for our program. He can be reached by regular email here, by phone at 805 689 3116, or in person in office 2109.

Getting started

  • Learning to use this wiki is no harder than learning to use email. Briefly, to edit a page, simply click the Edit tab at the top of the page. To add a page, click on the New Page item at the top left. Every page has a discussion board associated with it. To peruse the comments or to add your thoughts, click the discussion tab on the top of any page.
  • There is practice wikispace where you can try your hand at using the editor without fear of destroying previous handiwork. Here, you will find pages illustrating how to add tables, files, images, mathematical expressions, etc. You will also find a list of all previous KITP wikis from which you may get some idea how others have exploited this platform.