منابع مشابه
Tracing the Source of Campylobacteriosis
Campylobacter jejuni is the leading cause of bacterial gastro-enteritis in the developed world. It is thought to infect 2-3 million people a year in the US alone, at a cost to the economy in excess of US $4 billion. C. jejuni is a widespread zoonotic pathogen that is carried by animals farmed for meat and poultry. A connection with contaminated food is recognized, but C. jejuni is also commonly...
متن کاملTracing the Source of a Shredded Document
Consider two ordinary, seemingly identical plain paper shredders labeled A and B. When each of the two shredders is fed a blank sheet of paper, the resulting remnants are sufficiently similar that they are indistinguishable upon visual inspection. Now suppose that one of the shredders has been modified to introduce imperceptible variations in the size of each remnant it cuts. One of the shredde...
متن کاملThe Role of Campylobacter Jejuni in Campylobacteriosis
Campylobacter jejuni is a Gram negative, curved, motile, thermophilic and microaerophilic bacillus in Campylobacteriaceae family, which is one of the main causes of enteritis in human named campylobacteriosis. The main reservoir of Campylobacter jejuni is the alimentary tract of animals, especially chicken and turkey. Consumption of semi-cooked chicken meat, raw milk and unchlorinated water are...
متن کاملEfficient Route Tracing from a Single Source
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as an engineering tool, and also as a scientific tool, such as for discovery of the network topology at the IP level. In prior work, authors on this technical report have shown how to improve the efficiency of route tracin...
متن کاملTracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program running on an unknown host, and carried by packets that bear no clues that could be used to determine their originating host. Identifying the source of such an attack requires tracing the packets back to the source hop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PLoS Genetics
سال: 2008
ISSN: 1553-7404
DOI: 10.1371/journal.pgen.1000203