scispace - formally typeset
Search or ask a question

Showing papers on "Trojan published in 1988"


Journal ArticleDOI
01 Mar 1988-Icarus
TL;DR: A comparison of the available sample of lightcurves for 26 Trojan and Hilda asteroids with belt asteroid lightcurve shows the former to be distinguished by a higher incidence of high amplitudes rgan belt asteroids of comparable size, suggesting more elongated shapes; they currently have only a few percent of the main-belt asteroids' collision frequency.

43 citations


Book ChapterDOI
TL;DR: In this paper, the motion of the Trojan asteroids is studied in the elliptic restricted three-body problem of the Sun-Jupiter-asteroid system, and relations between dynamical parameters are considered and comparisons are made with Bien's and Schubart's results.
Abstract: The motion of the Trojan asteroids is studied in the elliptic restricted three-body problem of the Sun-Jupiter-asteroid system. Long periodic perturbations of the orbital elements are discussed. Relations between dynamical parameters are considered and comparisons are made with Bien’s and Schubart’s results.

40 citations



Journal ArticleDOI
TL;DR: In this paper, Biegens Theorie über den trojanischen Krieg is not mehr haltbar is discussed, i.e. the jüngsten Ausgrabungen in Mykene and in Tiryns.
Abstract: Seit Biegens Theorie über den trojanischen Krieg ist zu dieser frage keine umfassend überzeugende Untersuchung erschienen. Das ist im Grunde nicht verwunderlich, da seither keine bedeutenden neuen Quellen zutage kamen. Nun Lassen aber die jüngsten Ausgrabungen in Mykene und besonders in Tiryns es als angebracht erscheinen, das Thema neu aufzurollen. Eine eingehende Untersuchung des Matenah von Troja im Hinblick auf diese Ausgrabungen zeigt, daß Biegens Auffassung nicht mehr haltbar ist. Das bedeutet aber nicht, daß man das Kind mit dem Bad ausschütten muß. Im Gegenteil! Die folgenden Tatsachen weisen auf einen Zusammenstoß zwischen Mykenern und Trojanern hin: 1.) Auf dem griechischen Festland herrschte Mangel an Kupfer, und zwar gerade an Kupfer der besten Qualität; 2.) die Mykener verschafften sich das Kupfer nicht mehr von Zypern, wie bisher angenommen wurde, und 3.) wir müssen daher ein anderes Vorkommen suchen; 4.) mykenische Vasen aus der Zeit von Troja VI wurden vor kurzem im pontischen Gebiet gefunden, d. h. in der Nähe eines der wichtigsten Abbaugebiete von gutem Kupfer; 5.) Troja hatte bereits lange vorher begonnen, Kupfer aus dieser Gegend zu beziehen; und 6.) schließlich muß Trojas strategisch äußerst wichtige Lage in Betracht gezogen werden. Obwohl man in letzter Zeit mehr und mehr dazu neigt, Troja VI als die homerische Stadt anzusehen, sind alle Versuche, das zu beweisen, daran gescheiten, daß man keine zwingenden Gründe für den Ausbruch eines großangelegten Kampfes an der Propontis beibringen konnte. Ein Konflikt wegen eines damals so begehrten Metalls wie Kupfer macht aber nicht nur den „trojanischen Krieg\" verständlich, sondern ermöglicht es auch, die berühmteste Sage der alten Griechen wenigstens im Kern ernst zu nehmen.

8 citations


01 Jan 1988
TL;DR: A technique that will remove Trojan horses when used in conjunction with high-order language source code analysis is described, which is important for trusted systems.
Abstract: : In his 1984 Turing Award Lecture, Ken Thompson described a sophisticated Trojan horse attack on a compiler that is undetectable by any search of the compiler source code. The object of the compiler Trojan horse is to modify the semantics of the high-order language in a way that breaks the security of a trusted system generated by the compiler. The Trojan horse Thompson described is a form of virus (i.e., it is self-reproducing), but it has other characteristics that differentiate it from viruses that exploit the implementation details of a computer system. First, the self-reproduction is symbiotic -- the Trojan horse depends on the source text of the legitimate compiler for its continued existence. The virus only reproduces itself in the output stream of the compiler, when the compiler is compiling itself (thus destroying the original virus). A second difference is the relative portability of the virus to different systems. The Trojan horse Thompson described is less dependent on the design details of a particular machine because it exploits the portability of high-order languages. A final difference is the location of the virus in the executable file. The compiler Trojan horse is inserted in a place that is hard to search -- in mid-file. While this is possible for any form of virus, it is more difficult for viruses that do not have the compiler's functions at their disposal. In his lecture, Thompson asserted that "no amount of source-level verification or scrutiny will protect you from using untrusted code." However, this paper describes a technique that will remove such Trojan horses when used in conjunction with high-order language source code analysis. The remainder of the paper explains why this class of Trojan horse virus is important for trusted systems, describes the defense against it in detail, gives a brief sketch of some countermeasures, and concludes with some applications of the techniques described to building trusted systems.

7 citations


Book ChapterDOI
01 Jan 1988
TL;DR: In this article, the authors show that there may exist stable 1-1 resonance orbits of minor planets for each of the outer planets from Jupiter to Neptune, for at least a million years, and preliminary evidence for similar stability for the Trojan analogues of the inner planets.
Abstract: Numerical N-body integrations show that there may exist stable 1–1 resonance orbits of minor planets for each of the outer planets from Jupiter to Neptune. Such orbits show no sign of instability, for at least a million years. For Saturn the existence of such orbits is surprising because of the periodic proximity of Jupiter. We discuss the results of our numerical study, and consider the possibilities of observational confirmation of our conclusions. There is preliminary evidence for similar stability for the Trojan analogues of the inner planets.

1 citations


Journal Article
TL;DR: A la date de Mars 1988, 3774 asteroides ont ete repertories and 49 font partie d'une categorie speciale puisqu'ils sont a distance du Soleil semblable a celle de Jupiter and a longitude heliocentrique d'environ 60°: les asteroide Troyens as discussed by the authors.
Abstract: A la date de Mars 1988, 3774 asteroides ont ete repertories dont 49 font partie d'une categorie speciale puisqu'ils sont a une distance du Soleil semblable a celle de Jupiter et a une longitude heliocentrique d'environ 60°: les asteroides Troyens. On passe en revue les differentes caracteristiques de ces asteroides qui occupent les points de Lagrange precedent et succedant Jupiter

1 citations