Results 11 to 20 of about 46,100 (297)
Entanglement, tensor networks and black hole horizons [PDF]
We elaborate on a previous proposal by Hartman and Maldacena on a tensor network which accounts for the scaling of the entanglement entropy in a system at a finite temperature. In this construction, the ordinary entanglement renormalization flow given by the class of tensor networks known as the Multi Scale Entanglement Renormalization Ansatz (MERA ...
Javier Prior, Javier Molina-Vilaplana
openaire +4 more sources
Tracing astrophysical black hole seeds and primordial black holes with LISA-Taiji network
ABSTRACT In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly.
Yuchan Yang +4 more
openaire +2 more sources
Probing black hole microstate evolution with networks and random walks [PDF]
We model black hole microstates and quantum tunneling transitions between them with networks and simulate their time evolution using well-established tools in network theory. In particular, we consider two models based on Bena-Warner three-charge multi-centered microstates and one model based on the D1-D5 system; we use network theory methods to ...
Daniel R. Mayerson +2 more
openaire +7 more sources
Searching for a black hole in arbitrary networks [PDF]
Protecting agents from host attacks is a pressing security concern in networked environments supporting mobile agents. In this paper, we consider a black hole: a highly harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction.
DOBREV STEFAN +3 more
openaire +3 more sources
Software Defined Networking (SDN) presents a tremendous opportunity for developing abstract management of network updates. However, network updates introduce challenges in terms of consistency. Many consistent update algorithms are proposed for Ethernet,
Jun Lu +4 more
doaj +1 more source
Detection of Black Hole in AD- HOC Networks [PDF]
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR protocol is threaded by a particular type of attack called Black Hole attack. Black hole in Adhoc networks is a major problem.
Sona Malhotra, Sandeep Kumar
openaire +1 more source
From Physics Model to Results: An Optimizing Framework for Cross-Architecture Code Generation [PDF]
Starting from a high-level problem description in terms of partial differential equations using abstract tensor notation, the Chemora framework discretizes, optimizes, and generates complete high performance codes for a wide range of compute ...
Blazewicz, Marek +8 more
core +4 more sources
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +2 more sources
discovery of black holes in complex networks
Abstract. Networks are vital in today's world. Design and configuration of networks have made the special considerations necessary for its various aspects such as security, integrity, scalability and cost. Malicious nodes on the network must be identified to enhance the resistance of network.
MİRZAEİ, Alireza +2 more
openaire +2 more sources
The Impacts of Social Equity on Health
Terry Gerton: Those that are coming behind us have a different level of expectation. They are expecting us to be better and to do better, and they're not going to let us continue the status quo. Welcome to Management Matters, a National Academy of Public
doaj +1 more source

