Sciweavers

46 search results - page 2 / 10
» Black holes
Sort
View
SCHOLARPEDIA
2008
187views more  SCHOLARPEDIA 2008»
13 years 5 months ago
Bekenstein-Hawking entropy
We demonstrate how Sakharov's idea of induced gravity allows one to explain the statistical-mechanical origin of the entropy of a black hole. According to this idea, gravity b...
Jacob Bekenstein
CPHYSICS
2008
87views more  CPHYSICS 2008»
13 years 5 months ago
Simulating black hole white dwarf encounters
The existence of supermassive black holes lurking in the centers of galaxies and of stellar binary systems containing a black hole with a few solar masses has been established bey...
Stephan Rosswog, Enrico Ramirez-Ruiz, W. Raphael H...
LCN
2007
IEEE
13 years 12 months ago
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs
Abstract— Black Hole Attacks are a serious threat to communication in tactical MANETs. In this work we present TOGBAD a new centralised approach, using topology graphs to identif...
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Ma...
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 19 days ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
OPODIS
2004
13 years 7 months ago
Searching for a Black Hole in Tree Networks
A black hole is a highly harmful stationary process residing in a node of a network and destroying all mobile agents visiting the node, without leaving any trace. We consider the t...
Jurek Czyzowicz, Dariusz R. Kowalski, Euripides Ma...