Dancing with Wolves

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dancing with Wolves Confining Stealthy Attackers with a Lower-Bound Guarantee on Packet Delivery

Packet delivery is the core functionality of any communications network, such as ISP, multi-hop wireless, and smart-grid networks. Packet delivery is threatened by surreptitious attacks launched by not only malicious end hosts but also colluding compromised routers. One commonality of many existing efforts for mitigating network attacks is that, they aim at 1) either completely removing the att...

متن کامل

Dancing with black holes

We describe efforts over the last six years to implement regularization methods suitable for studying one or more interacting black holes by direct N-body simulations. Three different methods have been adapted to large-N systems: (i) Time-Transformed Leapfrog, (ii) Wheel-Spoke, and (iii) Algorithmic Regularization. These methods have been tried out with some success on GRAPE-type computers. Spe...

متن کامل

Dancing with your ride

The technologies that make this possible are those of miniaturized electronics, digital communications, inexpensive distributed computation, and advanced control software. They enable us to get rid of most of the junk that currently encumbers automobiles – engines, power trains, dashboards, and steering wheels. They allow us to define a fundamentally new, radically restructured architecture for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science

سال: 1996

ISSN: 0036-8075,1095-9203

DOI: 10.1126/science.271.5257.1787