7,325 research outputs found

    From internet architecture research to standards

    Get PDF
    Many Internet architectural research initiatives have been undertaken over last twenty years. None of them actually reached their intended goal: the evolution of the Internet architecture is still driven by its protocols not by genuine architectural evolutions. As this approach becomes the main limiting factor of Internet growth and application deployment, this paper proposes an alternative research path starting from the root causes (the progressive depletion of the design principles of the Internet) and motivates the need for a common architectural foundation. For this purpose, it proposes a practical methodology to incubate architectural research results as part of the standardization process

    First Law, Counterterms and Kerr-AdS_5 Black Holes

    Full text link
    We apply the counterterm subtraction technique to calculate the action and other quantities for the Kerr--AdS black hole in five dimensions using two boundary metrics; the Einstein universe and rotating Einstein universe with arbitrary angular velocity. In both cases, the resulting thermodynamic quantities satisfy the first law of thermodynamics. We point out that the reason for the violation of the first law in previous calculations is that the rotating Einstein universe, used as a boundary metric, was rotating with an angular velocity that depends on the black hole rotation parameter. Using a new coordinate system with a boundary metric that has an arbitrary angular velocity, one can show that the resulting physical quantities satisfy the first law.Comment: 19 pages, 1 figur

    Holographic Renormalization of general dilaton-axion gravity

    Get PDF
    We consider a very general dilaton-axion system coupled to Einstein-Hilbert gravity in arbitrary dimension and we carry out holographic renormalization for any dimension up to and including five dimensions. This is achieved by developing a new systematic algorithm for iteratively solving the radial Hamilton-Jacobi equation in a derivative expansion. The boundary term derived is valid not only for asymptotically AdS backgrounds, but also for more general asymptotics, including non-conformal branes and Improved Holographic QCD. In the second half of the paper, we apply the general result to Improved Holographic QCD with arbitrary dilaton potential. In particular, we derive the generalized Fefferman-Graham asymptotic expansions and provide a proof of the holographic Ward identities.Comment: 42 pages. v2: two references added. Version published in JHEP. v3: fixed minor typos in eqs. (1.6), (2.3), (3.20), (A.3), (B.8), (B.12) and (B.22

    A Note on Scalar Field Theory in AdS_3/CFT_2

    Full text link
    We consider a scalar field theory in AdS_{d+1}, and introduce a formalism on surfaces at equal values of the radial coordinate. In particular, we define the corresponding conjugate momentum. We compute the Noether currents for isometries in the bulk, and perform the asymptotic limit on the corresponding charges. We then introduce Poisson brackets at the border, and show that the asymptotic values of the bulk scalar field and the conjugate momentum transform as conformal fields of scaling dimensions \Delta_{-} and \Delta_{+}, respectively, where \Delta_{\pm} are the standard parameters giving the asymptotic behavior of the scalar field in AdS. Then we consider the case d=2, where we obtain two copies of the Virasoro algebra, with vanishing central charge at the classical level. An AdS_3/CFT_2 prescription, giving the commutators of the boundary CFT in terms of the Poisson brackets at the border, arises in a natural way. We find that the boundary CFT is similar to a generalized ghost system. We introduce two different ground states, and then compute the normal ordering constants and quantum central charges, which depend on the mass of the scalar field and the AdS radius. We discuss certain implications of the results.Comment: 24 pages. v2: added minor clarification. v3: added several comments and discussions, abstract sligthly changed. Version to be publishe

    The K-Server Dual and Loose Competitiveness for Paging

    Full text link
    This paper has two results. The first is based on the surprising observation that the well-known ``least-recently-used'' paging algorithm and the ``balance'' algorithm for weighted caching are linear-programming primal-dual algorithms. This observation leads to a strategy (called ``Greedy-Dual'') that generalizes them both and has an optimal performance guarantee for weighted caching. For the second result, the paper presents empirical studies of paging algorithms, documenting that in practice, on ``typical'' cache sizes and sequences, the performance of paging strategies are much better than their worst-case analyses in the standard model suggest. The paper then presents theoretical results that support and explain this. For example: on any input sequence, with almost all cache sizes, either the performance guarantee of least-recently-used is O(log k) or the fault rate (in an absolute sense) is insignificant. Both of these results are strengthened and generalized in``On-line File Caching'' (1998).Comment: conference version: "On-Line Caching as Cache Size Varies", SODA (1991

    GraphSE2^2: An Encrypted Graph Database for Privacy-Preserving Social Search

    Full text link
    In this paper, we propose GraphSE2^2, an encrypted graph database for online social network services to address massive data breaches. GraphSE2^2 preserves the functionality of social search, a key enabler for quality social network services, where social search queries are conducted on a large-scale social graph and meanwhile perform set and computational operations on user-generated contents. To enable efficient privacy-preserving social search, GraphSE2^2 provides an encrypted structural data model to facilitate parallel and encrypted graph data access. It is also designed to decompose complex social search queries into atomic operations and realise them via interchangeable protocols in a fast and scalable manner. We build GraphSE2^2 with various queries supported in the Facebook graph search engine and implement a full-fledged prototype. Extensive evaluations on Azure Cloud demonstrate that GraphSE2^2 is practical for querying a social graph with a million of users.Comment: This is the full version of our AsiaCCS paper "GraphSE2^2: An Encrypted Graph Database for Privacy-Preserving Social Search". It includes the security proof of the proposed scheme. If you want to cite our work, please cite the conference version of i
    corecore