13 research outputs found

    Experience with SPM in IPv6

    No full text

    DNS Resolvers Considered Harmful

    No full text

    A low-angle detachment fault revealed: three-dimensional images of the S-reflector fault zone along the Galicia passive margin

    Get PDF
    A new 3-D seismic reflection volume over the Galicia margin continent–ocean transition zone provides an unprecedented view of the prominent S-reflector detachment fault that underlies the outer part of the margin. This volume images the fault's structure from breakaway to termination. The filtered time-structure map of the S-reflector shows coherent corrugations parallel to the expected paleo-extension directions with an average azimuth of 107°. These corrugations maintain their orientations, wavelengths and amplitudes where overlying faults sole into the S-reflector, suggesting that the parts of the detachment fault containing multiple crustal blocks may have slipped as discrete units during its late stages. Another interface above the S-reflector, here named S′, is identified and interpreted as the upper boundary of the fault zone associated with the detachment fault. This layer, named the S-interval, thickens by tens of meters from SE to NW in the direction of transport. Localized thick accumulations also occur near overlying fault intersections, suggesting either non-uniform fault rock production, or redistribution of fault rock during slip. These observations have important implications for understanding how detachment faults form and evolve over time. 3-D seismic reflection imaging has enabled unique insights into fault slip history, fault rock production and redistribution

    Towards Network Denial Of Service Resistant Protocols

    No full text
    Networked and distributed systems have introduced a new significant threat to the availability of data and services: network denial of service attacks. A well known example is the TCP SYN ooding. In general, any statefull handshake protocol is vulnerable to similar attacks. This paper examines the network denial of service in detail and surveys and compares different approaches towards preventing the attacks. As a conclusion, a number of protocol design principles are identified essential in designing network denial of service resistant protocols, and examples provided on applying the principles
    corecore