منابع مشابه
How to Construct a Mobile Botnet?
Botnets are one of the most serious security threats to the Internet and the personal computer (PC) world, but they have not yet caused major outbreaks in the mobile world. Nevertheless, attacks on mobile networks and devices have recently grown in number and sophistication. With the arrival of smartphones such as the iPhone and Android-based phones, there has been a drastic increase in downloa...
متن کاملHow to Construct a GRB Engine?
Our understanding of Gamma-Ray Bursts (GRBs) was revolutionized during the last ten years. According to the generally accepted Fireball model (see e.g. [1, 2]) the gamma-rays and their subsequent multiwavelength afterglow are produced when an ultra-relativistic flow is slowed down. All current observations, from prompt emission to late afterglow, from γ-rays via X-ray optical and IR to radio, a...
متن کاملHow to Construct Tetris Configurations
In this paper we show that every (reasonable) TETRIS configuration can be constructed from an initially empty game board using a suitable sequence of pieces. On game boards of even width a simple parity condition has to be fulfilled. The paper provides an explicit construction. This problem is connected to the NP-completeness of certain TETRIS related decision problems. INTRODUCTION It has rece...
متن کاملHow to construct the perfect sandcastle
Just a bit of water enables one to turn a pile of dry sand into a spectacular sandcastle. Too much water however will destabilize the material, as is seen in landslides. Here we investigated the stability of wet sand columns to account for the maximum height of sandcastles. We find that the columns become unstable to elastic buckling under their own weight. This allows to account for the maximu...
متن کاملHow to Construct Multilingual Domain Ontologies
The research focuses on automatic construction of multi-lingual domain-ontologies, i.e., creating a DAG (directed acyclic graph) consisting of concepts relating to a specific domain and the relations between them. The domain example on which the research performed is Organized Crime. The contribution of the work is the investigation of and comparison between several data sources and methods to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific American
سال: 1888
ISSN: 0036-8733
DOI: 10.1038/scientificamerican06231888-10402supp