Cosmological daemon

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Daemon detection experiment

A month-long observation of two horizontal mutually light-isolated scintillating screens, 1 m in area and located one above the other a certain distance apart, revealed about 60–70 correlated signals, whose time shift corresponds to an average velocity of only ∼ 5(±0.3dex) km s. We assign the origin of these signals to the negative daemons, i.e. electrically charged Planckian particles which su...

متن کامل

Further daemon detection experiments

The experiments on detection of daemons captured into geocentric orbits, which are based on the postulated fast decay of daemon-containing nuclei, have been continued. By properly varying the experimental parameters, it has become possible to reveal and formulate some relations governing the interaction of daemons with matter. Among them are, for instance, the emission of energetic Auger-type e...

متن کامل

Honeyd: A Virtual Honeypot Daemon

Honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attack and exploitation trends and they allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying physical honeypots is often time intensive and expensive as different oper...

متن کامل

Maxwell's Daemon: Information versus Particle Statistics

Maxwell's daemon is a popular personification of a principle connecting information gain and extractable work in thermodynamics. A Szilard Engine is a particular hypothetical realization of Maxwell's daemon, which is able to extract work from a single thermal reservoir by measuring the position of particle(s) within the system. Here we investigate the role of particle statistics in the whole pr...

متن کامل

pktd: A Packet Capture and Injection Daemon

Administrators can be highly reluctant to run foreign measurement tools on their hosts because (a) such tools frequently require privileged execution in order to transmit customized measurement packets and/or to passively capture network traffic, and (b) the administrators lack mechanisms to control the rate, duration, type, destination, and contents of traffic generated by the measurements. We...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of High Energy Physics

سال: 2011

ISSN: 1029-8479

DOI: 10.1007/jhep08(2011)102