Scalable BGP Prefix Selection for Effective Inter-domain Traffic Engineering
Inter-domain Traffic Engineering for multi-homed networks faces a scalability challenge, as the size of BGP routing table continue to grow. In this context, the choice of the best path must be made potentially for each destination prefix, requiring all ...
Devienne, Francois +4 more
core +1 more source
Borax Promotes Fertility of Brassica napus Better Than Other Boron Species at Suboptimal Supply
ABSTRACT Background Continuous and sufficient boron (B) supply is essential for achieving maximum yield in Brassica napus. Increasing incidences of environmental water limitation are linked to reduced plant B availability and increased B deficiencies.
Jiline B. Tölle +2 more
wiley +1 more source
The Internet AS-Level Topology: Three Data Sources and One Definitive Metric
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP, and WHOIS.
Amin Vahdat +7 more
core +2 more sources
Safety Evaluation of an Aqueous Root and Leaf Extract of Ashwagandha (Withania somnifera)
Sensoril, an aqueous root and leaf extract of ashwagandha showed no evidence of mutagenicity in the in vitro Ames assay, was negative in the in vitro micronucleus, in vivo mammalian bone marrow chromosome aberration assays, and was well tolerated in the rat at up to 4000 mg/kg BW/day when administered orally for a period of 90 days. The data from these
Mukesh Summan +2 more
wiley +1 more source
Towards a Rigorous Methodology for Measuring Adoption of RPKI Route Validation and Filtering
A proposal to improve routing security---Route Origin Authorization (ROA)---has been standardized. A ROA specifies which network is allowed to announce a set of Internet destinations.
Bush, Randy +5 more
core +1 more source
Dutch disease, unemployment and structural change
Abstract We find that Dutch disease effects on unemployment are small even in a commodity‐rich economy like Australia. Using an estimated open‐economy model with frictional unemployment, we quantify how business‐cycle shocks and structural changes shape aggregate unemployment.
Mariano Kulish +3 more
wiley +1 more source
Q estimation of seismic reflection data and its application in oil and gas exploration
In oil and gas seismic exploration, when the seismic wave propagates in the earth medium, it will encounter obvious absorption and attenuation, resulting in the main frequency of the seismic signal shifting to the low-frequency end.
ZHANG Hao +5 more
doaj +1 more source
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
The vulnerability of the Internet has been demonstrated by prominent IP prefix hijacking events. Major outages such as the China Telecom incident in 2010 stimulate speculations about malicious intentions behind such anomalies.
Carle, Georg +4 more
core +2 more sources
Using Bursty Announcements for Detecting BGP Routing Anomalies
Despite the robust structure of the Internet, it is still susceptible to disruptive routing updates that prevent network traffic from reaching its destination.
Camp, L. Jean +2 more
core +2 more sources
The Legacy of Policy Inaction in Climate‐Growth Models
ABSTRACT To better understand the structure and core mechanisms of a broad class of climate‐growth models, we study a simplified version of the dynamic integrated model of climate and the economy (DICE) through the lens of growth theory. We analytically show that this model features a continuum of saddle‐point stable steady states.
Thomas Steger, Timo Trimborn
wiley +1 more source

