4,568 research outputs found

    The role of the synchrotron component in the mid infrared spectrum of M 87

    Full text link
    We study in detail the mid-infrared Spitzer-IRS spectrum of M 87 in the range 5 to 20 micron. Thanks to the high sensitivity of our Spitzer-IRS spectra we can disentangle the stellar and nuclear components of this active galaxy. To this end we have properly subtracted from the M 87 spectrum, the contribution of the underlying stellar continuum, derived from passive Virgo galaxies in our sample. The residual is a clear power-law, without any additional thermal component, with a zero point consistent with that obtained by high spatial resolution, ground based observations. The residual is independent of the adopted passive template. This indicates that the 10 micron silicate emission shown in spectra of M 87 can be entirely accounted for by the underlying old stellar population, leaving little room for a possible torus contribution. The MIR power-law has a slope alpha ~ 0.77-0.82 (SΜ∝Μ−α_\nu\propto\nu^{-\alpha}), consistent with optically thin synchrotron emission.Comment: 5 pages, 4 figures, accepted for publication in ApJ main journa

    Covert Ephemeral Communication in Named Data Networking

    Full text link
    In the last decade, there has been a growing realization that the current Internet Protocol is reaching the limits of its senescence. This has prompted several research efforts that aim to design potential next-generation Internet architectures. Named Data Networking (NDN), an instantiation of the content-centric approach to networking, is one such effort. In contrast with IP, NDN routers maintain a significant amount of user-driven state. In this paper we investigate how to use this state for covert ephemeral communication (CEC). CEC allows two or more parties to covertly exchange ephemeral messages, i.e., messages that become unavailable after a certain amount of time. Our techniques rely only on network-layer, rather than application-layer, services. This makes our protocols robust, and communication difficult to uncover. We show that users can build high-bandwidth CECs exploiting features unique to NDN: in-network caches, routers' forwarding state and name matching rules. We assess feasibility and performance of proposed cover channels using a local setup and the official NDN testbed

    Discovery of a very X-ray luminous galaxy cluster at z=0.89 in the WARPS survey

    Get PDF
    We report the discovery of the galaxy cluster ClJ1226.9+3332 in the Wide Angle ROSAT Pointed Survey (WARPS). At z=0.888 and L_X=1.1e45 erg/s (0.5-2.0 keV, h_0=0.5) ClJ1226.9+3332 is the most distant X-ray luminous cluster currently known. The mere existence of this system represents a huge problem for Omega_0=1 world models. At the modest (off-axis) resolution of the ROSAT PSPC observation in which the system was detected, ClJ1226.9+3332 appears relaxed; an off-axis HRI observation confirms this impression and rules out significant contamination from point sources. However, in moderately deep optical images (R and I band) the cluster exhibits signs of substructure in its apparent galaxy distribution. A first crude estimate of the velocity dispersion of the cluster galaxies based on six redshifts yields a high value of 1650 km/s, indicative of a very massive cluster and/or the presence of substructure along the line of sight. While a more accurate assessment of the dynamical state of this system requires much better data at both optical and X-ray wavelengths, the high mass of the cluster has already been unambiguously confirmed by a very strong detection of the Sunyaev-Zel'dovich effect in its direction (Joy et al. 2001). Using ClJ1226.9+3332 and ClJ0152.7-1357 (z=0.835), the second-most distant X-ray luminous cluster currently known and also a WARPS discovery, we obtain a first estimate of the cluster X-ray luminosity function at 0.8<z<1.4 and L_X>5e44 erg/s. Using the best currently available data, we find the comoving space density of very distant, massive clusters to be in excellent agreement with the value measured locally (z<0.3), and conclude that negative evolution is not required at these luminosities out to z~1. (truncated)Comment: accepted for publication in ApJ Letters, 6 pages, 2 figures, uses emulateapj.st

    Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information

    Get PDF
    Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contain personal information -- either intentionally released by the person herself, or unintentionally leaked or published by third parties, often with detrimental effects on the individual's privacy. To grant individuals the ability to regain control over their disseminated personal information, the European Court of Justice recently ruled that EU citizens have a right to be forgotten in the sense that indexing systems, must offer them technical means to request removal of links from search results that point to sources violating their data protection rights. As of now, these technical means consist of a web form that requires a user to manually identify all relevant links upfront and to insert them into the web form, followed by a manual evaluation by employees of the indexing system to assess if the request is eligible and lawful. We propose a universal framework Oblivion to support the automation of the right to be forgotten in a scalable, provable and privacy-preserving manner. First, Oblivion enables a user to automatically find and tag her disseminated personal information using natural language processing and image recognition techniques and file a request in a privacy-preserving manner. Second, Oblivion provides indexing systems with an automated and provable eligibility mechanism, asserting that the author of a request is indeed affected by an online resource. The automated ligibility proof ensures censorship-resistance so that only legitimately affected individuals can request the removal of corresponding links from search results. We have conducted comprehensive evaluations, showing that Oblivion is capable of handling 278 removal requests per second, and is hence suitable for large-scale deployment
    • 

    corecore