Results 11 - 20
of
104,175
Table 2. Cryptanalytic results on SAFER K/SK.
"... In PAGE 17: ... When studying the average complexity of our attack, we further assume that these subkeys are randomly picked with uniform distribution. Previous Cryptanalysis (see Table2 ). Known attacks against SAFER are summarized in Table 2.... In PAGE 17: ... Previous Cryptanalysis (see Table 2). Known attacks against SAFER are summarized in Table2 . The resistance of SAFER against differential cryptanaly- sis [5] was extensively studied by Massey in [32], where it is argued that 5 rounds are sufficient to resist to this attack.... ..."
Table 1. Performance Characteristics of Different AM Implementations
1997
"... In PAGE 7: ...ficient, buffered writes in the SCI DSM only. Performance measurements on the UCSB SCI cluster show competitive performance behavior of the SCI AM system ( Table1 ). Our own implementation, depicted in the first row of Table 1, adds little over- head to the raw latency of 9.... ..."
Cited by 13
Table 3: The results of a comparative study showing the importance of integrating the two techniques of linearization and con uent inference
"... In PAGE 9: ... Three prototype parsers were constructed. They are derivatives of CPP but omitting one or both of the two techniques (see Table3 ). They were trained separately on parsing the same set of 80 complete sentences used in Section 4.... In PAGE 10: ...1. The results are then compared against those obtained by CPP1 and CPP2, as summarized in Table3 . Also shown are the lengths of the coding used to represent the various types of data structures.... In PAGE 10: ... They are in fact determined by trial-and-error. For each model, di erent lengths of representations were tried and the optimal result (that is, best generalization) is shown in Table3 . As revealed by the results, linearization plays a more e ective role in promoting the generalization performance.... ..."
Table 3: The results of a comparative study showing the importance of integrating the two techniques of linearization and con uent inference
"... In PAGE 9: ... Three prototype parsers were constructed. They are derivatives of CPP but omitting one or both of the two techniques (see Table3 ). They were trained separately on parsing the same set of 80 complete sentences used in Section 4.... In PAGE 10: ...1. The results are then compared against those obtained by CPP1 and CPP2, as summarized in Table3 . Also shown are the lengths of the coding used to represent the various types of data structures.... In PAGE 10: ... They are in fact determined by trial-and-error. For each model, di erent lengths of representations were tried and the optimal result (that is, best generalization) is shown in Table3 . As revealed by the results, linearization plays a more e ective role in promoting the generalization performance.... ..."
Table 8: Comparison of the four procedures.
"... In PAGE 21: ... The run times (in seconds) for obtaining IP optimal solutions are also shown. Table8... In PAGE 22: ...developed by Wilhelm and Srinivasa (1994) and with the OSL branch and bound solver applied directly to each problem. The run times in Table8 are all in seconds. Results show that the aggregation scheme is successful, not only in improving bounds from the LP relaxation, but also in finding optimal integral solutions within reasonable times.... ..."
Table 3: Overheads of primitive operations in TinyOS
2000
"... In PAGE 11: ... In this context, an important baseline characteristic of a network sensor is its context switch speed. Table3 shows this aspect calibrated against the intrinsic hardware cost for moving bytes in memory. The cost of propagating an event is roughly equivalent to that of copying one byte of data.... In PAGE 11: ... Projects such as paths, in Scout [36], and stackable systems [29, 25, 24] have had similar goals in other regimes. Table3 gives the cost of individual component crossing, while Figure 4 shows the dynamic composition of these crossings. It contains a timing diagram from a logic analyzer of an event chain that ows through the system at the completion of a radio transmission.... ..."
Cited by 998
Table 3: Overhead of primitive operations in TinyOS
2000
"... In PAGE 7: ... In this context, an important baseline characteristic of a network sensor is its context switch speed. Table3 shows this aspect calibrated against the intrinsic hardware cost for moving bytes in memory. The cost of propagating an event is roughly equivalent to that of copying one byte of data.... In PAGE 9: ... Projects such as paths, in Scout [35], and stackable systems [29, 25, 24] have had similar goals in other regimes. Table3 gives the cost of individual compo- nent crossing, while Figure 4 shows the dynamic composition of these crossings. It contains a timing diagram from a logic analyzer of an event chain that ows through the system at the completion of a radio transmission.... ..."
Cited by 998
Table 3: Overheads of primitive operations in TinyOS
2000
"... In PAGE 11: ... In this context, an important baseline characteristic of a network sensor is its context switch speed. Table3 shows this aspect calibrated against the intrinsic hardware cost for moving bytes in memory. The cost of propagating an event is roughly equivalent to that of copying one byte of data.... In PAGE 11: ... Projects such as paths, in Scout [36], and stackable systems [29, 25, 24] have had similar goals in other regimes. Table3 gives the cost of individual component crossing, while Figure 4 shows the dynamic composition of these crossings. It contains a timing diagram from a logic analyzer of an event chain that ows through the system at the completion of a radio transmission.... ..."
Cited by 998
TABLE III SIX AND TEN SOURCE DEMIXING PERFORMANCE. PERFORMANCE OF THE BLIND TECHNIQUE IS COMPARED AGAINST THE OPTIMAL
2004
Cited by 52
Table 2. Proof System
2004
"... In PAGE 8: ... We now see that it also forms the basis of a sound and complete proof theory, and a decision procedure based on proof-search. The rules of the proof system are shown in Table2 . Since there is no Cut rule, the rules have a rather odd form.... ..."
Cited by 34
Results 11 - 20
of
104,175