منابع مشابه
Viva the worm
Viva the worm ike yin and yang, good things usually come at a cost. If you live longer, then you give up reproductive fitness in return. The merits of this model—termed antagonistic pleiotropy—have been argued by evolutionary biologists for half a century. Some believe that the effort of reproduction is necessarily linked to deterioration characteristic of aging. have challenged the idea by unc...
متن کاملThe Viva File System
This paper describes the Viva File System or VIFS, a technique for highperformance file allocation on disks. VIFS uses bitmaps to represent both free blocks on the disk and allocated blocks in each file. Allocation bitmaps provide a very fast method of finding blocks close to the last allocated block in a file. Fragments (partial blocks) are used to store the overflow from the last file block; ...
متن کاملViva the h-index
In their article ‘The inconsistency of the h-index’ Ludo Waltman and Nees Jan van Neck give three examples to demonstrate the inconsistency of the h-index. As will be shown below, a little extension of their examples just illustrate the opposite, a stable feature of the h-index. For starting authors it, the h-index that is, focusses on the number of articles; for experienced authors its focus s...
متن کاملVIVA Knowledge-Based Agent Programming
We sketch VIVA, a new agent-oriented programming language based on the theory of VIVid Agents presented in [Wag96a]. VIVA follows the AOP paradigm of [Sho93] but is, in a sense, more conservative by adopting as many concepts as possible from SQL and Prolog. This concerns, e.g., the distinction between the schema and the state of an agent, or the use of facts and rules with negation-as-failure, ...
متن کاملWorm virulence estimation for the containment of local worm outbreak
A worm-infected host scanning globally may not cause any new infection in its underlying local network before it is detected and quarantined by a worm detector. To defend this type of scanning hosts, a number of worm scanner detection methods such as failed scan detection, honeypot, and dark port detection are proposed. However, for a stealthier worm limiting its scan inside an enterprise netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cell Biology
سال: 2002
ISSN: 1540-8140,0021-9525
DOI: 10.1083/jcb1594rr2