### Table 2. Radio profiles obtained via measurements.

2006

"... In PAGE 1: ... For three commonly-used sensor radios, we illustrate how many compute cycles can be performed for the same energy us- age as transmitting a single byte over the radio. (This graph is based on real measurements of the three radios, summa- rized in Table2 later in the paper, and the TI MSP430 [35] processor, which has emerged as a popular sensor proces- sor choice.) The takeaway message from this graph is that... In PAGE 4: ... The CC2420 is more likely to be used in stationary systems, while the XTend is more appropriate for mobile systems since the mobility creates a need for increased range. Table2 shows the listed range and measured power data for each radio. To measure power, we connected a low ohmage, current sense resistor in series with the load to be measured and used a DAQ to measure the voltage drop over that resistor.... ..."

Cited by 14

### Table 2. Radio profiles obtained via measurements.

2006

"... In PAGE 1: ... For three commonly-used sensor radios, we illustrate how many compute cycles can be performed for the same energy us- age as transmitting a single byte over the radio. (This graph is based on real measurements of the three radios, summa- rized in Table2 later in the paper, and the TI MSP430 [35] processor, which has emerged as a popular sensor proces- sor choice.) The takeaway message from this graph is that if a compression computation can result in even just one 265... In PAGE 4: ... The CC2420 is more likely to be used in stationary systems, while the XTend is more appropriate for mobile systems since the mobility creates a need for increased range. Table2 shows the listed range and measured power data for each radio. To measure power, we connected a low ohmage, current sense resistor in series with the load to be measured and used a DAQ to measure the voltage drop over that resistor.... ..."

Cited by 14

### Table 1: Multiplications obtained via computer.

1996

"... In PAGE 9: ... The rst class of equivalences is shown in Example 2. For the second class let A1 = A; B1 = B: NowP1 = 1 2(A1 + B1) = 1 2(A ? B) = Q; Q1 = 12(A1 ? B1) = 1 2(A + B) = P: 2 Results: Table1 shows some results obtained. Shorter multiplications (m = 3; 4) were a matter of seconds or minutes on the computer while longer multiplications (m = 7) took several CPU{days of computer{time.... In PAGE 9: ... Clearly, the growth of the search{space is exponential in m. Table1 gives rise to many new TCP apos;s. These multiplications can be applied to any BCP or TCP A, B with zeros in the same positions.... ..."

Cited by 3

### Table 3: Computing power to compute elliptic curve

"... In PAGE 8: ... #5B34#5D on a SPARC IPC #28rated at 25 MIPS#29 performs 2,000 elliptic curve additions per second. Then, the number of elliptic curve additions that can be performed by a 1 MIPS machine in one year is #284 #02 10 4 #29 #01 #2860 #02 60 #02 24 #02 365#29 #19 2 40 : Table3 shows, for various values of n, the comput- ing power required to compute a single elliptic curve discrete logarithm using the Pollard rho-method. A MIPS year is equivalent to the computational power of a computer that is rated at 1 MIPS and utilized... In PAGE 8: ...1#25 of the world apos;s com- puting power were available for one year to work on a collaborative e#0Bort to break some challenge cipher, then the computing power available would be 10 8 MIPS years in 2004 and 10 10 to 10 11 MIPS years in 2014. To put the numbers in Table3 into some per- spective, Table 4 #28due to Odlyzko #5B26#5D#29 shows the estimated computing power required to factor in- tegers with current versions of the general number #0Celd sieve. #28This is also roughly equal to the time it takes to compute discrete logarithms modulo a 1024-bit prime p.... ..."

### Table 1: Energy percentage distribution among resolution levels for sub-sampled residual 5m series transformed via WPT and computed via MP algorithm at di erent degrees of approxi- mation power, i.e. with 50, 100, 200 and 500 atoms. MP runs with the original (left part of the table) and de-noised crystals.

2003

"... In PAGE 21: ... When no structure is found in the residue it means that the MP worked e ciently; this fact should also be interpreted as the evidence that only pure volatility aspects are left in the residual series. We observe from Table1 that in the rst sub-sample of the WP table level 0 increases with T (the number of approximating structures or atoms in the dictionary) and level 6 becomes dominant with de-noised crystals; the latter is followed by level 4, with both the levels decreasing in energy percentage with T, and by level 2, increasing instead with T. The second sub-sample has still level 0, which increases with T, followed by level 3, decreasing with T; this segment concentrates most of the energy from the MP runs on the original noisy WP table, while the waveshrunken crystals indicate level 3 as the one with the largest energy, decreasing with T, followed by level 2, 4 and 6, all pretty much stable in their energy distribution, according to the approximation power employed by the MP algorithm.... ..."

Cited by 2

### Table 1 Desired Level of Utilization of DSR - Dependence on Comppter Power

### TABLE III COMPUTATION POWER BREAKDOWN

### Table II. Computational settings for GP in Time Series Modelling.

### Table 1: UDT increase parameter computation example. The first column represents the estimated available bandwidth and the second column represents the increase in packets per SYN. While the available bandwidth increases to the next scope of 10 apos;s integral power, the increase parameter also increases by 10 times.

"... In PAGE 5: ... UDT treats 1500 bytes as a standard packet size. Table1 gives an example on how UDT increases its sending rate under different situations. In this example, we assume all packets are in 1500 bytes.... ..."

### Table 1: UDT increase parameter computation example. The first column represents the estimated available bandwidth and the second column represents the increase in packets per SYN. While the available bandwidth increases to the next scope of 10 apos;s integral power, the increase parameter also increases by 10 times.

"... In PAGE 5: ... UDT treats 1500 bytes as a standard packet size. Table1 gives an example of how UDT increases its sending rate under different situations. In this example, we assume all packets are in 1500 bytes.... ..."