Results 11 to 20 of about 45,447 (293)

Detection and Localization of Network Black Holes [PDF]

open access: greenIEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, 2007
Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fault monitoring capabilities that are built into today's IP protocols and routers.
Ramana Rao Kompella   +3 more
openalex   +3 more sources

Analysis of Black Hole Attacks on Wireless Sensor Networks [PDF]

open access: bronzeInternational Journal of Advanced Research in Computer and Information Security, 2019
K Varaha Samba Murthy Raju
openalex   +2 more sources

Tensor network and a black hole [PDF]

open access: yesPhysical Review D, 2013
A tensor network formalism of thermofield dynamics is introduced. The formalism relates the original Hilbert space with its tilde space by a product of two copies of a tensor network. Then, their interface becomes an event horizon, and the logarithm of the tensor rank corresponds to the black hole entropy.
Hiroaki Matsueda   +2 more
openaire   +3 more sources

Entanglement, tensor networks and black hole horizons [PDF]

open access: yesGeneral Relativity and Gravitation, 2014
We elaborate on a previous proposal by Hartman and Maldacena on a tensor network which accounts for the scaling of the entanglement entropy in a system at a finite temperature. In this construction, the ordinary entanglement renormalization flow given by the class of tensor networks known as the Multi Scale Entanglement Renormalization Ansatz (MERA ...
Javier Prior, Javier Molina-Vilaplana
openaire   +4 more sources

Tracing astrophysical black hole seeds and primordial black holes with LISA-Taiji network

open access: yesMonthly Notices of the Royal Astronomical Society, 2022
ABSTRACT In this work, we discuss the improvement that the joint network of LISA and Taiji could provide on exploring two kinds of black hole formation mechanisms. For astrophysical origin, we consider light seed and heavy seed scenarios, and generate populations accordingly.
Yuchan Yang   +4 more
openaire   +2 more sources

Probing black hole microstate evolution with networks and random walks [PDF]

open access: yesSciPost Physics, 2020
We model black hole microstates and quantum tunneling transitions between them with networks and simulate their time evolution using well-established tools in network theory. In particular, we consider two models based on Bena-Warner three-charge multi-centered microstates and one model based on the D1-D5 system; we use network theory methods to ...
Daniel R. Mayerson   +2 more
openaire   +6 more sources

Searching for a black hole in arbitrary networks [PDF]

open access: yesProceedings of the twenty-first annual symposium on Principles of distributed computing - PODC '02, 2002
Protecting agents from host attacks is a pressing security concern in networked environments supporting mobile agents. In this paper, we consider a black hole: a highly harmful host that disposes of visiting agents upon their arrival, leaving no observable trace of such a destruction.
DOBREV STEFAN   +3 more
openaire   +3 more sources

Detection of Black Hole in AD- HOC Networks [PDF]

open access: yesInternational Journal of Computer Applications Technology and Research, 2014
Unattended installation of sensor nodes in the environment causes many security threats in the Ad-hoc networks. The security of the DSR protocol is threaded by a particular type of attack called Black Hole attack. Black hole in Adhoc networks is a major problem.
Sona Malhotra, Sandeep Kumar
openaire   +1 more source

Home - About - Disclaimer - Privacy