Viva the worm

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Viva the worm

Viva the worm ike yin and yang, good things usually come at a cost. If you live longer, then you give up reproductive fitness in return. The merits of this model—termed antagonistic pleiotropy—have been argued by evolutionary biologists for half a century. Some believe that the effort of reproduction is necessarily linked to deterioration characteristic of aging. have challenged the idea by unc...

متن کامل

The Viva File System

This paper describes the Viva File System or VIFS, a technique for highperformance file allocation on disks. VIFS uses bitmaps to represent both free blocks on the disk and allocated blocks in each file. Allocation bitmaps provide a very fast method of finding blocks close to the last allocated block in a file. Fragments (partial blocks) are used to store the overflow from the last file block; ...

متن کامل

Viva the h-index

In their article ‘The inconsistency of the h-index’ Ludo Waltman and Nees Jan van Neck give three examples to demonstrate the inconsistency of the h-index. As will be shown below, a little extension of their examples just illustrate the opposite, a stable feature of the h-index. For starting authors it, the h-index that is, focusses on the number of articles; for experienced authors its focus s...

متن کامل

VIVA Knowledge-Based Agent Programming

We sketch VIVA, a new agent-oriented programming language based on the theory of VIVid Agents presented in [Wag96a]. VIVA follows the AOP paradigm of [Sho93] but is, in a sense, more conservative by adopting as many concepts as possible from SQL and Prolog. This concerns, e.g., the distinction between the schema and the state of an agent, or the use of facts and rules with negation-as-failure, ...

متن کامل

Worm virulence estimation for the containment of local worm outbreak

A worm-infected host scanning globally may not cause any new infection in its underlying local network before it is detected and quarantined by a worm detector. To defend this type of scanning hosts, a number of worm scanner detection methods such as failed scan detection, honeypot, and dark port detection are proposed. However, for a stealthier worm limiting its scan inside an enterprise netwo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cell Biology

سال: 2002

ISSN: 1540-8140,0021-9525

DOI: 10.1083/jcb1594rr2