Results 1 
7 of
7
Jottar, “Thermodynamics of higher spin black holes
 in AdS3,” JHEP 1401 (2014) 023, arXiv:1302.0816 [hepth
"... We discuss the thermodynamics of recently constructed threedimensional higher spin black holes in SL(N,R) × SL(N,R) ChernSimons theory with generalized asymptoticallyantide Sitter boundary conditions. From a holographic perspective, these bulk theories are dual to twodimensional CFTs with WN s ..."
Abstract

Cited by 13 (1 self)
 Add to MetaCart
(Show Context)
We discuss the thermodynamics of recently constructed threedimensional higher spin black holes in SL(N,R) × SL(N,R) ChernSimons theory with generalized asymptoticallyantide Sitter boundary conditions. From a holographic perspective, these bulk theories are dual to twodimensional CFTs with WN symmetry algebras, and the black hole solutions are dual to thermal states with higher spin chemical potentials and charges turned on. Because the notion of horizon area is not gaugeinvariant in the higher spin theory, the traditional approaches to the computation of black hole entropy must be reconsidered. One possibility, explored in the recent literature, involves demanding the existence of a partition function in the CFT, and consistency with the first law of thermodynamics. This approach is not free from ambiguities, however, and in particular different definitions of energy result in different expressions for the entropy. In the present work we show that there are natural definitions of the thermodynamically conjugate variables that follow from careful examination of the variational principle, and moreover agree with those obtained via canonical methods. Building on this intuition, we derive general expressions for the higher spin black hole entropy and free energy which are written entirely in terms of the ChernSimons connections, and are valid for both static and rotating solutions. We compare our results to other proposals in the literature, and provide a new and efficient way to determine the generalization of the Cardy formula to a situation with higher spin charges.a rX iv
Generalized Black Holes in Threedimensional Spacetime
, 2014
"... Threedimensional spacetime with a negative cosmological constant has proven to be a remarkably fertile ground for the study of gravity and higher spin fields. The theory is topological and, since there are no propagating field degrees of freedom, the asymptotic symmetries become all the more cruc ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
Threedimensional spacetime with a negative cosmological constant has proven to be a remarkably fertile ground for the study of gravity and higher spin fields. The theory is topological and, since there are no propagating field degrees of freedom, the asymptotic symmetries become all the more crucial. For pure (2+1) gravity they consist of two copies of the Virasoro algebra. There exists a black hole which may be endowed with all the corresponding charges. The pure (2+1) gravity theory may be reformulated in terms of two ChernSimons connections for sl (2,R). This permits an immediate generalization which may be interpreted as containing gravity and a finite number of higher spin fields. The generalization is achieved by replacing sl (2,R) by sl (3,R) or, more generally, by sl (N,R). The asymptotic symmetries are then two copies of the socalledWN algebra, which contains the Virasoro algebra as a subalgebra. The question then arises as to whether there exists a generalization of the standard pure gravity (2+1) black hole which would be endowed with all the WN charges. Since the generalized ChernSimons theory does not admit a direct metric interpretation, one must define the black hole in Euclidean spacetime through its thermal properties, and then continue to Lorentzian spacetime. The original pioneer
Contents
, 2005
"... Hostbased Intrusion Detection Systems can be used to determine if a system has been compromised and can warn administrators if that happens. We recognize four different methods of hostbased intrusion detection: • Filesystem monitoring. • Logfile analysis. • Connection analysis. • Kernelbased intr ..."
Abstract
 Add to MetaCart
Hostbased Intrusion Detection Systems can be used to determine if a system has been compromised and can warn administrators if that happens. We recognize four different methods of hostbased intrusion detection: • Filesystem monitoring. • Logfile analysis. • Connection analysis. • Kernelbased intrusion detection. Implementations of intrusion detection systems generally use one of these four methods to detect intrusions. We have studied multiple implementations, determined their features, ways of evading their restrictions and ways to prevent evasion. We have also given insight into the reasons why certain systems should or should not be used and to what extent, based on their effectiveness and ease of