scispace - formally typeset
Search or ask a question

Showing papers by "Yan Chen published in 2001"


Journal ArticleDOI
TL;DR: In order to understand the geomagnetic evolution of the Guyana Shield, paleomagnetic and 40Ar/39Ar investigations were carried out on granitoids and volcano-sedimentary rocks from the Oyapok and Camopi rivers (French Guyana-Brazil frontier) as mentioned in this paper.

27 citations


Journal ArticleDOI
TL;DR: In this paper, the structural, metamorphic and magmatic evolution of the Cevennes area is characterized by three events, namely: (1) southward shearing coeval to a MP/MT metamorphism dated around 340 Ma; (2) post nappe anatexis (T 5 kb); (3) Namurian (ca 315 Ma) E-W extensional tectonics and plutonism.
Abstract: The Cevennes area belongs to the para-autochthonous domain of the Hercynian Belt of the French Massif Central. Three lithological series, namely: sandstone-pelite, black micaschist and gneiss-micaschist, are identified. They form an imbrication of five tectonic units which overthrust the unmetamorphosed Viganais Paleozoic units to the south and the gneissic Mamejean Unit to the north. The structural, metamorphic and magmatic evolution of the Cevennes area is characterized by three events, namely: (1) southward shearing coeval to a MP/MT metamorphism dated around 340 Ma; (2) post nappe anatexis (T 5 kb); (3) Namurian (ca 315 Ma) E-W extensional tectonics and plutonism. The structure of the Mt-Lozere-Borne granitic complex is constrained by new AMS and gravimetric data. The plutons are the driving power of the hydrothermal convective circulations responsible for an early deposition of diffuse arsenopyrite in the thermal aureole. Gold bearing sulfides are afterwards concentrated in quartz veins along brittle normal and wrench faults around the granite. Lastly, ore bearing quartz pebbles are sedimented in the Stephanian Ales coal basin.

26 citations


Book ChapterDOI
13 Nov 2001
TL;DR: This paper proposes a simulation-based methodology and applies it to attacks on object location services such as DNS, allowing it to contrast the DoS resilience of three distinct architectures for object location.
Abstract: Network Denial of Service (DoS) attacks are increasing in frequency, severity and sophistication, making it desirable to measure the resilience of systems to DoS attacks. In this paper, we propose a simulation-based methodology and apply it to attacks on object location services such as DNS. Our results allow us to contrast the DoS resilience of three distinct architectures for object location.

20 citations