The Pigmy Shrew

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The taming of the shrew

Transposons are mobile genetic elements that can be harmful for the host when mobilized. However, they are also genomic reservoirs for novel genes that can be evolutionarily beneficial. There are many examples of domesticated transposases, which play important roles in the hosts. In most cases domesticated transposases have lost their endonuclease activities and the hosts utilize their DNA-bind...

متن کامل

The Taming of the Shrew

The Shrew attack is a denial of service attack wherein a rogue end-system periodically generates a high-bandwidth “spike” in order to cause TCP senders to experience loss simultaneously, synchronize their retransmissions, and ultimately experience congestive collapse. Because these spikes are periodic, overall the Shrew is a low bandwidth flow and difficult to detect and police. Currently, the ...

متن کامل

The Common Shrew Gene Map.

Among mammals, gene mapping efforts have concentrated mainly on humans and house mice. However, although studies of these 2 species can add much to our understanding of eutherian genome evolution (for example, Ehrlich and others 1997), it is important to expand the range of species to be examined for a more complete picture of the genomic changes that have occurred during the eutherian radiatio...

متن کامل

The taming of the shrew milk teeth.

A characteristic feature of mammalian dentition is the evolutionary reduction of tooth number and replacement. Because mice do not replace teeth, here we used Sorex araneus, the common shrew, as a model to investigate the loss of tooth replacement. Historically, shrews have been reported to initiate the development of several, milk or deciduous teeth but these soon become rudimentary and only t...

متن کامل

DDoS: Flood vs. Shrew

Distributed Denial of Service (DDoS) attack is one of the greatest threats to connectivity, continuity, and availability of the Internet. In this paper, two typical types of DDoS attacks, high-rate (Flood) and low-rate (Shrew), are studied on their generation principles, mechanism utilizations, behaviors, signatures, and attack performances. Experiment results show that: (I) high-rate DDoS send...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Blue Jay

سال: 1954

ISSN: 2562-5667,0006-5099

DOI: 10.29173/bluejay1696