• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,201
Next 10 →

TABLES 2-1. Potential roles agencies may undertake 22

in unknown title
by unknown authors

Table 1: Several known authentication protocols. An authentication protocol is a sequence of mes- sages that two principals undertake to perform mu- tual authentication. The rst signi cant such pro- tocol was due to Needham and Schroeder [18], which gained added notoriety when it was shown to be awed. Table 1 lists several known authentication protocols [14], where PK, SK and OF refer to public key, private key and one-way functions respectively. There are several implementations of authen- tication systems available, with Kerberos [16] be- ing the most popular. Kerberos was developed at MIT with DEC during their joint Project Athena, 3

in Security Issues in Distributed Computing
by Luke O'Connor, Gary Gaskell, William J. Caelli

Table 1: quot;All university lecturers should also undertake research quot;

in EXPERIENCE AND OPINIONS OF ACCOUNTING SPANISH ACADEMICS
by Ester Oliveras
"... In PAGE 12: ... This percentage is only 28,6 of in the Spanish case, which is in line with the perception that UK lecturers are closer to their students than the Spanish ones. Finally, in Table1 it can be seen that above 50% of both, Spanish and UK accounting academics, agree in that all lecturers should also undertake research. These results support the idea presented by Dopuch (1989) and Patten (1996) that research is a way of ensuring that the lecturer is to maintain and update knowledge in their field.... ..."

Table 1: Table showing the procedure for the two groups of participant undertaking the spatial vs. non-spatial experiment.

in Space, The Final Frontearcon: The Identification Of Concurrently Presented Earcons In . . .
by David K. McGookin, Stephen A. Brewster
"... In PAGE 2: ... Each condition consisted of a training and a test- ing phase. The order of conditions for each group is shown in Table1 . The main hypothesis investigated was that concurrently presented earcons complying only with the guidelines of BWE in a spatial audio environment would be significantly easier to identify than earcons which also incorporated the CEG from McGookin and Brewster [2, 7] on concurrent earcon presentation, but were presented in a common spatial location.... ..."
Cited by 3

Table 5.2: Principal subsidiary undertakings and associates Company Country % holding Principal Activity

in unknown title
by unknown authors 2005

TABLE II PERCENTAGE OF COMPANIES THAT ARE UNDERTAKING SECURITY MEASURES FOR E-MAIL PROTECTION [7]

in Researching and Structuring e-mail Security Criteria
by Mario Sajko, Miroslav Bača

Table 3: Task 2 participants. The table shows the overview of the participants undertaking task 2.

in unknown title
by unknown authors 2005

Table 2. Some car manufacturers undertaking the development of fuel-cell vehiclesa.

in Development of Hybrid Electric Vehicles in Australia
by Lovatt Rand And, H. C. Lovatt, A. M. Vassallo C
"... In PAGE 6: ...infrastructure for the supply and production of hydrogen (the move towards the so-called apos;Hydrogen Economy apos;). Some manufacturers (mainly automotive) who have produced prototype FCVs over the past six years are listed in Table2 . Clearly, most of these companies are favouring the fuel- cell-battery hybrid.... ..."

Table 1 | Centres that are undertaking structural genomics projects Centre Leader Key ideas Website Reference

in compbio.berkeley.edu A TOUR OF STRUCTURAL
by Steven E. Brenner

Table A.2. Coefficient Hip Joint Knee Joint Ankle Joint

in Determinants of Increased Energy Cost in Prosthetic Gait
by Michael E. J. Peasgood, Michael E
Next 10 →
Results 1 - 10 of 3,201
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University