منابع مشابه
Wiping the cellular slate clean
dose of the JNK kinase can reset chromatin states and turn leg into wing, according to Nara Lee, Renato Paro (University of Heidelberg, Germany), and colleagues. The pathway may help cells to become reprogrammable when they find themselves in areas of injury or developmental transition. JNK has for some time been known to turn on during wound healing, and Polycomb group (PcG) proteins are known...
متن کاملA Clean-Slate Look at Disk Scrubbing
A number of techniques have been proposed to reduce the risk of data loss in hard-drives, from redundant disks (e.g., RAID systems) to error coding within individual drives. Disk scrubbing is a background process that reads disks during idle periods to detect irremediable read errors in infrequently accessed sectors. Timely detection of such latent sector errors (LSEs) is important to reduce da...
متن کاملGetting Students’ Hands Dirty with Clean-Slate Networking
Conventional networking courses treat today’s protocols and mechanisms as fixed artifacts, rather than as part of a continually evolving system. To prepare students to think critically about Internet architecture, we created a graduate networking course that combines “clean slate” networking research with hands-on experience in analyzing, building, and extending real networks. Our goal was to p...
متن کاملPoint / Counterpoint Future Internet Architecture : Clean - Slate Versus
OV E R T H E PA S T several years, the networking research community has engaged in an ongoing conversation about how to move the field—and the Internet itself—forward. These discussions take place in the context of the tremendous success of the Internet, begging the question of whether researchers should focus on understanding and improving today’s Internet or on designing new network architec...
متن کاملA Clean Slate Approach to Secure Wireless Networking
Traditionally, wireless network protocols have been developed for performance. Subsequently, as attacks are identified, patches or defenses have been developed. This has led to an “arms race,” where one is never confident about what other vulnerabilities may be exposed in the future. We seek to reverse this process. We identify a set of axioms describing a model, under which we develop a secure...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cultural and Pedagogical Inquiry
سال: 2016
ISSN: 1916-3460
DOI: 10.18733/c3m88f