3,069 research outputs found
Detecting Blackholes and Volcanoes in Directed Networks
In this paper, we formulate a novel problem for finding blackhole and volcano
patterns in a large directed graph. Specifically, a blackhole pattern is a
group which is made of a set of nodes in a way such that there are only inlinks
to this group from the rest nodes in the graph. In contrast, a volcano pattern
is a group which only has outlinks to the rest nodes in the graph. Both
patterns can be observed in real world. For instance, in a trading network, a
blackhole pattern may represent a group of traders who are manipulating the
market. In the paper, we first prove that the blackhole mining problem is a
dual problem of finding volcanoes. Therefore, we focus on finding the blackhole
patterns. Along this line, we design two pruning schemes to guide the blackhole
finding process. In the first pruning scheme, we strategically prune the search
space based on a set of pattern-size-independent pruning rules and develop an
iBlackhole algorithm. The second pruning scheme follows a divide-and-conquer
strategy to further exploit the pruning results from the first pruning scheme.
Indeed, a target directed graphs can be divided into several disconnected
subgraphs by the first pruning scheme, and thus the blackhole finding can be
conducted in each disconnected subgraph rather than in a large graph. Based on
these two pruning schemes, we also develop an iBlackhole-DC algorithm. Finally,
experimental results on real-world data show that the iBlackhole-DC algorithm
can be several orders of magnitude faster than the iBlackhole algorithm, which
has a huge computational advantage over a brute-force method.Comment: 18 page
Combining general relativity and quantum theory: points of conflict and contact
The issues related to bringing together the principles of general relativity
and quantum theory are discussed. After briefly summarising the points of
conflict between the two formalisms I focus on four specific themes in which
some contact has been established in the past between GR and quantum field
theory: (i) The role of planck length in the microstructure of spacetime (ii)
The role of quantum effects in cosmology and origin of the universe (iii) The
thermodynamics of spacetimes with horizons and especially the concept of
entropy related to spacetime geometry (iv) The problem of the cosmological
constant.Comment: Invited Talk at "The Early Universe and Cosmological Observations: a
Critical Review", UCT, Cape Town, 23-25 July,2001; to appear in
Class.Quan.Gra
Recommended from our members
Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN is application specific and ensures large scale real-time data processing in complex environment. Both these wireless networks have some common vulnerable features which may increase the chances of different sorts of security attacks. Wireless sensor nodes have computation, memory and power limitations, which do not allow for implementation of complex security mechanism. In this paper, we discuss the common limitations and vulnerable features of WMN and WSN, along with the associated security threats and possible countermeasures. We also propose security mechanisms keeping in view the architecture and limitations of both. This article will serve as a baseline guide for the new researchers who are concern with the security aspects of WMN and WSN
Rapid "Turn-on" of type 1 AGN in a quiescent early type galaxy SDSS1115+0544
We present a detailed study of a transient in the center of SDSS1115+0544
based on the extensive UV, optical, mid-IR light curves (LC) and spectra over
1200 days. The host galaxy is a quiescent early type galaxy at = 0.0899
with a blackhole mass of . The transient underwent a 2.5
magnitude brightening over days, reaching a peak -band luminosity
(extinction corrected) of magnitude, then fading 0.5 magnitude over 200
days, settling into a plateau of days. Following the optical brightening
are the significant mid-IR flares at and m, with a peak time
delay of days. The mid-IR LCs are explained as the echo of UV photons
by a dust medium with a radius of cm, consistent with of 0.58 inferred from the spectra. This event is very energetic with an
extinction corrected erg s. Optical
spectra over 400 days in the plateau phase revealed newly formed broad
H emission with a FWHM of km s and narrow
coronal lines such as [Fe VII], [Ne V]. This flare also has a steeply rising UV
continuum, detected by multi-epoch data at to days post
optical peak. The broad Balmer lines and the UV continuum do not show
significant temporal variations. The slow evolving LCs over 1200 days, the
constant Balmer lines and UV continuum at late-times rule out TDE and SN IIn as
the physical model for this event. We propose that this event is a `turn-on'
AGN, transitioning from a quiescent state to a type 1 AGN with a sub-Eddington
accretion rate of /yr. This change occurred on a very short time
scale of days. The discovery of such a rapid `turn-on' AGN
poses challenges to accretion disk theories and may indicate such event is not
extremely rare.Comment: Comments are welcome. Emails to the first author. Accepted for
publication in Ap
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
Recommended from our members
Passive security threats and consequences in IEEE 802.11 wireless mesh networks
The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst end-users are such characteristics which increases the vulnerabilities of WMN towards many passive and active attacks. A secure network ensures the confidentiality, integrity and availability of wireless network. Integrity and availability is compromised by active attacks, while the confidentiality of end-users traffic is compromised by passive attacks. Passive attacks are silent in nature and do not harm the network traffic or normal network operations, therefore very difficult to detect. However, passive attacks lay down a foundation for later launching an active attack. In this article, we discuss the vulnerable features and possible passive threats in WMN along with current security mechanisms as well as future research directions. This article will serve as a baseline guide for the passive security threats and related issues in WMNs
- …