Results 1 - 10
of
34,758
Table 1: Protocols and standards
in Contents
"... In PAGE 5: ... If this architecture is going to be accepted by others it will have to implement and adhere to existing protocols and standards. Table1 shows the protocols and standards that were evaluated and table 2 gives a summary of the requirements that were identified while reviewing. NetFlow and sFlow are two methods for passive monitoring of network traffic.... In PAGE 14: ... 78 Ntop Passive network monitoring application based on libpcap but that also supports NetFlow and sFlow. 93 Table1 0: NetFlow and RTFM related products Review Requirements Billing software so- lutions The SCAMPI platform SHOULD be able to store data gathered in a standard or easy to use format (e.g XML) The SCAMPI platform SHOULD be able to measure SLA pa- rameters (eg packet loss, inter-packet delay variance etc) The SCAMPI platform SHOULD be able to parse and aggregate monitoring data The SCAMPI platform MAY include procedures to eliminate information duplication The SCAMPI platform MAY be able to do data correlation based on predefined rules Flowscan The SCAMPI MAPI SHOULD be able to integrate with appli- cations for data storage in databases.... In PAGE 14: ...e.g. sFlow/NetFlow). Table1 1: NetFlow and RTFM related products requirements... In PAGE 15: ...Description Page CoralReef Traffic monitoring suite 38 Cricket Time series visualization tool 40 Ethereal libpcap based packet capturing tool with graphical user interface 43 GTDMS II Network measurement system mainly based on SNMP. 51 HP OpenView Network management suite 52 Ipanema QoSmart Network management system 56 Nettimer Passive bottleneck bandwidth measurement tool 80 snort Intrusion detection system based on libpcap 121 Windmill Passive performance measurement tool 128 Table1 2: Other passive monitoring tools CFlowd and Flow-tools are both tools for receiving and analyzing NetFlow data. Raw NetFlow data is stored on disk and both come with tools for generating various network usage reports.... In PAGE 16: ... The SCAMPI platform SHOULD classify packets into streams as soon as the filtering process ends. Table1 3: Passive monitoring requirements... In PAGE 18: ... 118 Sting A TCP-based tool to measure loss rate along both forward and reverse paths. 123 Table1 4: Active measurement tools and initiatives PingER and Skitter have a simpler approach, collecting round-trip data with ICMP based tools. The advantage is that it easy for a site to participate by installing the software on a convenient machine, which means that the initiative can scale to a larger number of hosts.... In PAGE 19: ... Skitter The SCAMPI project MAY implement skitter-like measure- ments. Table1 5: Active measurement requirements... ..."
Table 2. Official US Standards for Grain. Maximum Limits of
2007
"... In PAGE 26: ... Good-quality straw is a consistent (but low) source of nutrients, although its composition still can be variable (NRC, 2001). Table2 shows means, standard deviations, and ranges for straw samples over two years during two recent experiments from our group (Dann et al., 2006; Janovick Guretzky et al.... In PAGE 28: ... e Calculated using NEM values for individual ingredients as specified by Dairy One Laboratory. Table2 . Chemical composition of wheat straw in University of Illinois experiments.... In PAGE 30: ...Table2 ). The conception rates are sometimes reported for first insemination or for accumulated inseminations.... In PAGE 30: ...he average response was 44.6 vs. 41.8% for control and test-fat treatment groups. From the studies listed in Table2 , it is very difficult to determine which fat supplements or which fatty acid(s) may be most efficacious. When cows fed fats containing mainly palmitic and oleic acids (tallow, Energy Booster, and Ca salts of palm oil distillate) were compared against a no supplemental fat control, the fat-supplemented cows had better conception rates.... In PAGE 36: ...Table2 . Studies Reporting Improved Conception Rates (first service or cumulative services) of Lactating Dairy Cows Fed Supplemental Fatty Acids (P lt; 0.... In PAGE 63: ... These groups have done an excellent job of convincing the public and media that they are legitimate scientists and actual health care professionals with a genuine concern for the public health. Table2 . Health organizations that recommend decreasing animal food product consumption Organization Website Center for Food Safety www.... In PAGE 72: ... As a result, under typical US situations linoleic acid is the major dietary fatty acid, particularly when corn silage comprises the majority of the forage base in the ration and oilseeds are the major source of added dietary fat. Estimates of linoleic acid intake using CPM-Dairy indicates that in these situations linoleic acid intake can approach and even exceed 400 to 500 g/d ( Table2 ). Therefore, it would appear that typical rations have more than enough substrate as linoleic acid to meet the required presence of PUFA for MFD to occur if rumen fermentation is altered.... In PAGE 76: ... (2006). Table2 . Modified CPM Dairy lipid submodel output showing the sources of dietary fatty acids from a diet formulated for a cow producing 100 lbs milk/d.... In PAGE 84: ... Grain grading standards developed by the USDA to classify corn grain were designed primarily to enhance grain preservation and avoid grain storage problems. As noted in Table2 , higher concentrations of moisture and foreign matter cause discounts in the USDA grade. Lower test weight has been associated with generation of more fine particles during grain handling that, combined with presence of foreign matter, retard air movement through grain.... In PAGE 91: ...echnology, P.J. White and L.A. Johnson, second edition, 2003 Table2 : This shows the theoretical results of removing starch from the grain or from the pure endosperm, and also removing oil from the pure germ. In actual milled products the starch removal by milling is not likely to be complete but removal by fermentation will be very high.... In PAGE 98: ...9 40.0 lb/yr per farm 23,793 251,123 Table2 . Chemical composition for control and treated diets (Harrison et al.... In PAGE 101: ..., 2005; Reynal and Broderick, 2005). Table2 . The effects of lowering dietary crude protein on milk yield, milk components, and nitrogen efficiency (Kalscheur et al.... In PAGE 104: ... Table 1 lists the energy values of corn with different processed corn grain (NRC 1989). Table2 illustrates the impact of three different particle sizes of corn grain milk performance and rumen parameters. Finely processed corn (900 to 1100 microns), stream flaking (26 pound bushel weight), and high moisture corn (over 25 percent moisture at 1500 to 2000 microns) can increase energy content and rumen fermentation.... In PAGE 105: ...11 (0.96) Table2 . Impact of corn degradation rate on milk production and rumen characteristics (Hutjens, 2000).... In PAGE 110: ...cause concern over the practice of using NIRS ash data to calculate non-fiber carbohydrate (NFC) content and energy value of corn silage (NRC, 2001). Presented in Table2 , are particle size data and results from assays to assess starch digestibility for dry corn and HMC samples. Mean particle size (MPS) was lower and percentage passing a coarse sieve (#16; 1180 microns) was higher for dry corn than HMC.... In PAGE 112: ... Table2 . Particle size data and results from assays to assess starch digestibility for dry and high-moisture corn samples.... ..."
Table 2: Iabs: Rules for absolute key implication
"... In PAGE 13: ... We therefore start by giving a discussion on the rules for absolute key implication. The set of rules, denoted as Iabs, is shown in Table2 and is subsequently extended as rules for relative key implication. superkey.... In PAGE 16: ....3. Axiomatization for Key Implication We now turn to the nite implication problem for K, and start by giving in Table 3 a set of inference rules, denoted by I. Most rules are generalizations of rules shown in Table2 except for rules that deal with the context path in the setting of relative keys: context-path-containment, context-target and interaction. We brie y illustrate these rules below.... ..."
Table 1 shows the results of our 7 official runs. a32 -
"... In PAGE 4: ... Our first division method put the first NTCIR-1 request into a subset a68 a29 , the second into a68a70a69 , and so on. Then, firstly a68a70a69 was used as the training set, and a68 a29 was Table1 . Official NTCIR-2 test results.... In PAGE 4: ... However, recall that these results are based on pre- submission experiments which did not use standard TREC average precision. ( Table1 also shows the av- erage precision values based on S-relevant, A-relevant... ..."
Table 2: Supported functionality of standard protocols
2006
"... In PAGE 8: ...6 Authentication Mechanisms Com- parison After we introduce the four standard protocols. We fur- ther compare them with their features in Table2 . EAP- MD5 is easy to implement but it is not secure enough.... ..."
Cited by 1
Results 1 - 10
of
34,758