3,069 research outputs found

    Detecting Blackholes and Volcanoes in Directed Networks

    Full text link
    In this paper, we formulate a novel problem for finding blackhole and volcano patterns in a large directed graph. Specifically, a blackhole pattern is a group which is made of a set of nodes in a way such that there are only inlinks to this group from the rest nodes in the graph. In contrast, a volcano pattern is a group which only has outlinks to the rest nodes in the graph. Both patterns can be observed in real world. For instance, in a trading network, a blackhole pattern may represent a group of traders who are manipulating the market. In the paper, we first prove that the blackhole mining problem is a dual problem of finding volcanoes. Therefore, we focus on finding the blackhole patterns. Along this line, we design two pruning schemes to guide the blackhole finding process. In the first pruning scheme, we strategically prune the search space based on a set of pattern-size-independent pruning rules and develop an iBlackhole algorithm. The second pruning scheme follows a divide-and-conquer strategy to further exploit the pruning results from the first pruning scheme. Indeed, a target directed graphs can be divided into several disconnected subgraphs by the first pruning scheme, and thus the blackhole finding can be conducted in each disconnected subgraph rather than in a large graph. Based on these two pruning schemes, we also develop an iBlackhole-DC algorithm. Finally, experimental results on real-world data show that the iBlackhole-DC algorithm can be several orders of magnitude faster than the iBlackhole algorithm, which has a huge computational advantage over a brute-force method.Comment: 18 page

    Combining general relativity and quantum theory: points of conflict and contact

    Get PDF
    The issues related to bringing together the principles of general relativity and quantum theory are discussed. After briefly summarising the points of conflict between the two formalisms I focus on four specific themes in which some contact has been established in the past between GR and quantum field theory: (i) The role of planck length in the microstructure of spacetime (ii) The role of quantum effects in cosmology and origin of the universe (iii) The thermodynamics of spacetimes with horizons and especially the concept of entropy related to spacetime geometry (iv) The problem of the cosmological constant.Comment: Invited Talk at "The Early Universe and Cosmological Observations: a Critical Review", UCT, Cape Town, 23-25 July,2001; to appear in Class.Quan.Gra

    Rapid "Turn-on" of type 1 AGN in a quiescent early type galaxy SDSS1115+0544

    Get PDF
    We present a detailed study of a transient in the center of SDSS1115+0544 based on the extensive UV, optical, mid-IR light curves (LC) and spectra over 1200 days. The host galaxy is a quiescent early type galaxy at zz = 0.0899 with a blackhole mass of 2×107M2\times10^7M_\odot. The transient underwent a 2.5 magnitude brightening over 120\sim120 days, reaching a peak VV-band luminosity (extinction corrected) of 20.9-20.9 magnitude, then fading 0.5 magnitude over 200 days, settling into a plateau of >600>600 days. Following the optical brightening are the significant mid-IR flares at 3.43.4 and 4.5μ4.5\mum, with a peak time delay of 180\sim180 days. The mid-IR LCs are explained as the echo of UV photons by a dust medium with a radius of 5×10175\times10^{17} cm, consistent with E(BV)\rm E(B-V) of 0.58 inferred from the spectra. This event is very energetic with an extinction corrected Lbol4×1044L_{bol} \sim 4\times10^{44} erg s1^{-1}. Optical spectra over 400 days in the plateau phase revealed newly formed broad Hα,β\alpha, \beta emission with a FWHM of 3750\sim3750 km s1^{-1} and narrow coronal lines such as [Fe VII], [Ne V]. This flare also has a steeply rising UV continuum, detected by multi-epoch SwiftSwift data at +700+700 to +900+900 days post optical peak. The broad Balmer lines and the UV continuum do not show significant temporal variations. The slow evolving LCs over 1200 days, the constant Balmer lines and UV continuum at late-times rule out TDE and SN IIn as the physical model for this event. We propose that this event is a `turn-on' AGN, transitioning from a quiescent state to a type 1 AGN with a sub-Eddington accretion rate of 0.017M0.017M_\odot/yr. This change occurred on a very short time scale of 120200\sim 120- 200 days. The discovery of such a rapid `turn-on' AGN poses challenges to accretion disk theories and may indicate such event is not extremely rare.Comment: Comments are welcome. Emails to the first author. Accepted for publication in Ap

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table
    corecore