排序方式: 共有8条查询结果,搜索用时 421 毫秒
1
1.
A number of IDSs have been proposed for a networked or distributed environment. A modified D-IDS using federated peer-to-peer architecture, MCR (Multicast Reflector) and modified shaker protocol were proposed. The suggested scheme can be implemented easily and performs the information sharing between low-level IDS agents. As all users within a group monitor each other's, the common control server can perform detect intrusions with less cost and support the detection of the inside intruders. 相似文献
2.
Hoan Kyu Lee In Joo Jang Hyeong Seon Yoo 《重庆邮电大学学报(自然科学版)》2007,19(3):377-380
A number of IDSs have been proposed for a networked or distributed environment. A modified D-IDS using federated peer-to-peer architecture, MCR (Multicast Reflector) and modified shaker protocol were proposed. The suggested scheme can be implemented easily and performs the information sharing between low-level IDS agents. As all users within a group monitor each other's, the common control server can perform detect intrusions with less cost and support the detection of the inside intruders. 相似文献
3.
The multiagent negotiation testbed proposed by Collins was modified. It utilizes publish/subscribe system, timerelease cryptography and anonymous communication. The proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that generating random number to the supplier by market is better than the supplier doing it by him in guaranteeing anonymity. Market publishes an interpolating polynomial for sharing the determination process data. It avoids collusion between a customer and a certain supplier. According to the comparison and analysis with other protocols, the proposed protocol shows good security and better efficiency.
相似文献
4.
首先对Woedroofe和Jhun(1989)中的结果在简单点阵中进行了模拟研究,然后通过模拟对靴带法与通常的近似值法进行了比较,揭示了采用平均覆盖概率的靴带法的优越性. 相似文献
5.
H Pälike MW Lyle H Nishi I Raffi A Ridgwell K Gamage A Klaus G Acton L Anderson J Backman J Baldauf C Beltran SM Bohaty P Bown W Busch JE Channell CO Chun M Delaney P Dewangan T Dunkley Jones KM Edgar H Evans P Fitch GL Foster N Gussone H Hasegawa EC Hathorne H Hayashi JO Herrle A Holbourn S Hovan K Hyeong K Iijima T Ito S Kamikuri K Kimoto J Kuroda L Leon-Rodriguez A Malinverno TC Moore BH Murphy DP Murphy H Nakamura K Ogane C Ohneiser C Richter R Robinson EJ Rohling O Romero K Sawada H Scher 《Nature》2012,488(7413):609-614
Atmospheric carbon dioxide concentrations and climate are regulated on geological timescales by the balance between carbon input from volcanic and metamorphic outgassing and its removal by weathering feedbacks; these feedbacks involve the erosion of silicate rocks and organic-carbon-bearing rocks. The integrated effect of these processes is reflected in the calcium carbonate compensation depth, which is the oceanic depth at which calcium carbonate is dissolved. Here we present a carbonate accumulation record that covers the past 53 million years from a depth transect in the equatorial Pacific Ocean. The carbonate compensation depth tracks long-term ocean cooling, deepening from 3.0-3.5?kilometres during the early Cenozoic (approximately 55?million years ago) to 4.6 kilometres at present, consistent with an overall Cenozoic increase in weathering. We find large superimposed fluctuations in carbonate compensation depth during the middle and late Eocene. Using Earth system models, we identify changes in weathering and the mode of organic-carbon delivery as two key processes to explain these large-scale Eocene fluctuations of the carbonate compensation depth. 相似文献
6.
Calmodulin interacts with MLO protein to regulate defence against mildew in barley 总被引:29,自引:0,他引:29
Kim MC Panstruga R Elliott C Müller J Devoto A Yoon HW Park HC Cho MJ Schulze-Lefert P 《Nature》2002,416(6879):447-451
In plants, defence against specific isolates of a pathogen can be triggered by the presence of a corresponding race-specific resistance gene, whereas resistance of a more broad-spectrum nature can result from recessive, presumably loss-of-regulatory-function, mutations. An example of the latter are mlo mutations in barley, which have been successful in agriculture for the control of powdery mildew fungus (Blumeria graminis f. sp. hordei; Bgh). MLO protein resides in the plasma membrane, has seven transmembrane domains, and is the prototype of a sequence-diversified family unique to plants, reminiscent of the seven-transmembrane receptors in fungi and animals. In animals, these are known as G-protein-coupled receptors and exist in three main families, lacking sequence similarity, that are thought to be an example of molecular convergence. MLO seems to function independently of heterotrimeric G proteins. We have identified a domain in MLO that mediates a Ca2+-dependent interaction with calmodulin in vitro. Loss of calmodulin binding halves the ability of MLO to negatively regulate defence against powdery mildew in vivo. We propose a sensor role for MLO in the modulation of defence reactions. 相似文献
7.
A number of IDSs have been proposed for a networked or distributed environment. A modified DIDS using federated peertopeer architecture, MCR (Multicast Reflector) and modified shaker protocol were proposed. The suggested scheme can be implemented easily and performs the information sharing between lowlevel IDS agents. As all users within a group monitor each other's, the common control server can perform detect intrusions with less cost and support the detection of the inside intruders. 相似文献
8.
Hyeong Seon Yoo 《重庆邮电学院学报(自然科学版)》2007,(3)
The multi-agent negotiation test-bed proposed by Collins was modified. It utilizes publish/subscribe system, time-release cryptography and anonymous communication. The proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that generating random number to the supplier by market is better than the supplier doing it by him in guaranteeing anonymity. Market publishes an interpolating polynomial for sharing the determination process data. It avoids collusion between a customer and a certain supplier. According to the comparison and analysis with other protocols, the proposed protocol shows good security and better efficiency. 相似文献
1