Hi everyone,
I am new to this mailing list and I was wondering
if anyone can help me with some online papers or internet links regarding
the application of Fuzzy Neural Algorithms to Mobile Ad Hoc Networks, such as
route discovery process? I was unable to find related research from the WWW
the bggest problems with security ssytems are generally 90% to do with
design errors at level 10 (human, not policitcal, economic,
application, transport etc)
it would be interestign to run a _real_ experiment in 3 types of
voting (comuter based, networked computer based and traiditional) and
In message [EMAIL PROTECTED], Jon Crowcroft writes:
the bggest problems with security ssytems are generally 90% to do with
design errors at level 10 (human, not policitcal, economic,
application, transport etc)
Mostly right, though one shouldn't rule out the possibility of layer
10-inspired
Jon Crowcroft wrote:
the bggest problems with security ssytems are generally 90% to do with
design errors at level 10 (human, not policitcal, economic,
application, transport etc)
Explorers of any kind oftentimes are led to believe in monsters at the
"end of the sea", but not all of them
"Steven M. Bellovin" wrote:
In message [EMAIL PROTECTED], Jon Crowcroft writes:
the bggest problems with security ssytems are generally 90% to do with
design errors at level 10 (human, not policitcal, economic,
application, transport etc)
Mostly right, though one shouldn't rule out
In message [EMAIL PROTECTED], Ed Gerck writes:
Bugs, however, can be either fixed or avoided.
This is the fundamental point where we differ -- the former is
difficult and itself bug-prone, and the latter is impossible in a
system of any realistic size.
--Steve Bellovin,
"Steven M. Bellovin" wrote:
In message [EMAIL PROTECTED], Ed Gerck writes:
Bugs, however, can be either fixed or avoided.
This is the fundamental point where we differ -- the former is
difficult and itself bug-prone, and the latter is impossible in a
system of any realistic size.
The IETF (anounce) mailing list archive has several problems
that should be fixed:
- The most recent page is
http://www.ietf.org/mail-archive/ietf-announce/Current/maillist.html
older pages are
http://www.ietf.org/mail-archive/ietf-announce/Current/mail2.html
I suggest trying ftp to ftp://ftp.ietf.org/ietf-mail-archive/ietf or
ftp://ftp.ietf.org/ietf-mail-archive/ietf-announce. In general,
when looking for stuff at organizations that predate the web, trying
ftp is a good idea.
Donald
From: "Martin J. Duerst" [EMAIL PROTECTED]
Message-Id: [EMAIL
What is it about the IETF list that draws people who demonstrate
disinterest in the common meanings of our jargon (e.g. "bug," "denial
of service," "digital," and "analog") but nevertheless try to sell us
technology** using those words?
For example, if Mr. Gerck understood "bug" or "database" as
"Donald E. Eastlake 3rd" wrote:
I suggest trying ftp to ftp://ftp.ietf.org/ietf-mail-archive/ietf or
ftp://ftp.ietf.org/ietf-mail-archive/ietf-announce. In general,
when looking for stuff at organizations that predate the web, trying
ftp is a good idea.
Yet other alternate archives:
Vernon Schryver wrote:
For example, if Mr. Gerck understood "bug" or "database" as most of us
do, he wouldn't talk about a "database paradigm" as a panacea against
bugs. He would know that the phrase "database paradigm" is quite
evocative, but not in a good way. If he meant familiar
From: Ed Gerck [EMAIL PROTECTED]
For example, if Mr. Gerck understood "bug" or "database" as most of us
do, he wouldn't talk about a "database paradigm" as a panacea against
bugs. He would know that the phrase "database paradigm" is quite
evocative, but not in a good way. If he meant
In message [EMAIL PROTECTED], Ed Gerck writes:
Handling bugs is the major problem IMO (looks like we also agree here)
after DDoS, privacy, security, integrity, etc are handled (which are
not a small task, either). But this might not be so hard after all. Yes,
an election is a
"Steven M. Bellovin" wrote:
In message [EMAIL PROTECTED], Ed Gerck writes:
Handling bugs is the major problem IMO (looks like we also agree here)
after DDoS, privacy, security, integrity, etc are handled (which are
not a small task, either). But this might not be so hard after all.
15 matches
Mail list logo