7,747 research outputs found
From internet architecture research to standards
Many Internet architectural research initiatives have been undertaken over last twenty years. None of them actually reached their intended goal: the evolution of the Internet architecture is still driven by its protocols not by genuine architectural evolutions. As this approach becomes the main limiting factor of Internet growth and application deployment, this paper proposes an alternative research path starting from the root causes (the progressive depletion of the design principles of the Internet) and motivates the need for a common architectural foundation. For this purpose, it proposes a practical methodology to incubate architectural research results as part of the standardization process
First Law, Counterterms and Kerr-AdS_5 Black Holes
We apply the counterterm subtraction technique to calculate the action and
other quantities for the Kerr--AdS black hole in five dimensions using two
boundary metrics; the Einstein universe and rotating Einstein universe with
arbitrary angular velocity. In both cases, the resulting thermodynamic
quantities satisfy the first law of thermodynamics. We point out that the
reason for the violation of the first law in previous calculations is that the
rotating Einstein universe, used as a boundary metric, was rotating with an
angular velocity that depends on the black hole rotation parameter. Using a new
coordinate system with a boundary metric that has an arbitrary angular
velocity, one can show that the resulting physical quantities satisfy the first
law.Comment: 19 pages, 1 figur
Holographic Renormalization of general dilaton-axion gravity
We consider a very general dilaton-axion system coupled to Einstein-Hilbert
gravity in arbitrary dimension and we carry out holographic renormalization for
any dimension up to and including five dimensions. This is achieved by
developing a new systematic algorithm for iteratively solving the radial
Hamilton-Jacobi equation in a derivative expansion. The boundary term derived
is valid not only for asymptotically AdS backgrounds, but also for more general
asymptotics, including non-conformal branes and Improved Holographic QCD. In
the second half of the paper, we apply the general result to Improved
Holographic QCD with arbitrary dilaton potential. In particular, we derive the
generalized Fefferman-Graham asymptotic expansions and provide a proof of the
holographic Ward identities.Comment: 42 pages. v2: two references added. Version published in JHEP. v3:
fixed minor typos in eqs. (1.6), (2.3), (3.20), (A.3), (B.8), (B.12) and
(B.22
A Note on Scalar Field Theory in AdS_3/CFT_2
We consider a scalar field theory in AdS_{d+1}, and introduce a formalism on
surfaces at equal values of the radial coordinate. In particular, we define the
corresponding conjugate momentum. We compute the Noether currents for
isometries in the bulk, and perform the asymptotic limit on the corresponding
charges. We then introduce Poisson brackets at the border, and show that the
asymptotic values of the bulk scalar field and the conjugate momentum transform
as conformal fields of scaling dimensions \Delta_{-} and \Delta_{+},
respectively, where \Delta_{\pm} are the standard parameters giving the
asymptotic behavior of the scalar field in AdS. Then we consider the case d=2,
where we obtain two copies of the Virasoro algebra, with vanishing central
charge at the classical level. An AdS_3/CFT_2 prescription, giving the
commutators of the boundary CFT in terms of the Poisson brackets at the border,
arises in a natural way. We find that the boundary CFT is similar to a
generalized ghost system. We introduce two different ground states, and then
compute the normal ordering constants and quantum central charges, which depend
on the mass of the scalar field and the AdS radius. We discuss certain
implications of the results.Comment: 24 pages. v2: added minor clarification. v3: added several comments
and discussions, abstract sligthly changed. Version to be publishe
The K-Server Dual and Loose Competitiveness for Paging
This paper has two results. The first is based on the surprising observation
that the well-known ``least-recently-used'' paging algorithm and the
``balance'' algorithm for weighted caching are linear-programming primal-dual
algorithms. This observation leads to a strategy (called ``Greedy-Dual'') that
generalizes them both and has an optimal performance guarantee for weighted
caching.
For the second result, the paper presents empirical studies of paging
algorithms, documenting that in practice, on ``typical'' cache sizes and
sequences, the performance of paging strategies are much better than their
worst-case analyses in the standard model suggest. The paper then presents
theoretical results that support and explain this. For example: on any input
sequence, with almost all cache sizes, either the performance guarantee of
least-recently-used is O(log k) or the fault rate (in an absolute sense) is
insignificant.
Both of these results are strengthened and generalized in``On-line File
Caching'' (1998).Comment: conference version: "On-Line Caching as Cache Size Varies", SODA
(1991
GraphSE: An Encrypted Graph Database for Privacy-Preserving Social Search
In this paper, we propose GraphSE, an encrypted graph database for online
social network services to address massive data breaches. GraphSE preserves
the functionality of social search, a key enabler for quality social network
services, where social search queries are conducted on a large-scale social
graph and meanwhile perform set and computational operations on user-generated
contents. To enable efficient privacy-preserving social search, GraphSE
provides an encrypted structural data model to facilitate parallel and
encrypted graph data access. It is also designed to decompose complex social
search queries into atomic operations and realise them via interchangeable
protocols in a fast and scalable manner. We build GraphSE with various
queries supported in the Facebook graph search engine and implement a
full-fledged prototype. Extensive evaluations on Azure Cloud demonstrate that
GraphSE is practical for querying a social graph with a million of users.Comment: This is the full version of our AsiaCCS paper "GraphSE: An
Encrypted Graph Database for Privacy-Preserving Social Search". It includes
the security proof of the proposed scheme. If you want to cite our work,
please cite the conference version of i
- …