Results 11 to 20 of about 45,447 (293)
Detection and Localization of Network Black Holes [PDF]
Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fault monitoring capabilities that are built into today's IP protocols and routers.
Ramana Rao Kompella+3 more
openalex +3 more sources
Analysis of Black Hole Attacks on Wireless Sensor Networks [PDF]
K Varaha Samba Murthy Raju
openalex +2 more sources
On quivers, spectral networks and black holes [PDF]
45 ...
Paolo Arnaudo, Alba Grassi, Qianyu Hao
openalex +3 more sources
Tensor network and a black hole [PDF]
A tensor network formalism of thermofield dynamics is introduced. The formalism relates the original Hilbert space with its tilde space by a product of two copies of a tensor network. Then, their interface becomes an event horizon, and the logarithm of the tensor rank corresponds to the black hole entropy.
Hiroaki Matsueda+2 more
openaire +3 more sources
Characterization of binary black holes by heterogeneous gravitational-wave networks [PDF]
Comments welcome.
S. Vitale, C. Whittle
openalex +5 more sources
Entanglement, tensor networks and black hole horizons [PDF]
We elaborate on a previous proposal by Hartman and Maldacena on a tensor network which accounts for the scaling of the entanglement entropy in a system at a finite temperature. In this construction, the ordinary entanglement renormalization flow given by the class of tensor networks known as the Multi Scale Entanglement Renormalization Ansatz (MERA ...
Javier Prior, Javier Molina-Vilaplana
openaire +4 more sources
Tracing astrophysical black hole seeds and primordial black holes with LISA-Taiji network
ABSTRACT In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly.
Yuchan Yang+4 more
openaire +2 more sources
Probing black hole microstate evolution with networks and random walks [PDF]
We model black hole microstates and quantum tunneling transitions between them with networks and simulate their time evolution using well-established tools in network theory. In particular, we consider two models based on Bena-Warner three-charge multi-centered microstates and one model based on the D1-D5 system; we use network theory methods to ...
Daniel R. Mayerson+2 more
openaire +6 more sources
Searching for a black hole in arbitrary networks [PDF]
Protecting agents from host attacks is a pressing security concern in networked environments supporting mobile agents. In this paper, we consider a black hole: a highly harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction.
DOBREV STEFAN+3 more
openaire +3 more sources
Detection of Black Hole in AD- HOC Networks [PDF]
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR protocol is threaded by a particular type of attack called Black Hole attack. Black hole in Adhoc networks is a major problem.
Sona Malhotra, Sandeep Kumar
openaire +1 more source