Results 1 - 10
of
304,560
Table 2. Secure SGI/CRAY Computing System Model Quan #
"... In PAGE 1: ... As shown in Table 1, the open Advanced Computing Laboratory system is configured into nodes of n x 32 MIPS R10K processors, where n=1-4, for a total of 768 processors and 192 GB of memory. As shown in Table2 , the secure ASCI Blue Mountain system is configured into 48 nodes of 128 MIPS R10K processors each for a total of 6,144 proces- sors and 1.5 TB of memory.... ..."
Table 2. SECURE SGI/CRAY HIGH PERFORMANCE COMPUTING SYSTEM
"... In PAGE 5: ... As shown in Table 1, the open SGI/Crays are configured as nodes with n x 32 MIPS R10K processors, where n=1-4, for a total of 768 processors and 192 GB of memory. As shown in Table2 , the secure SGI/Crays are configured as nodes with 64 MIPS R10K processors for a total of 1024 processors and 256 GB of memory. These configurations are periodically changed by splitting or merging nodes.... ..."
Table 1: Security Mechanisms Methods Label Description
"... In PAGE 3: ... Another validation type is the cryptography based method, such as au- thentication and con dentiality, which imbeds cryptography into network routing protocols. Table1 lists two cryptographic schemes that are de- scribed in the literature, including those that have found a place in protocol standards. The two main cryptographic countermeasures that have been suggested for routing protocols are authentication and con dentiality.... In PAGE 3: ... We analyze the combinations between PA, IA and HBH and ETE. For brevity, we identify each mechanism with a label; this is noted in Table1 . From a trust point of view, the HBH needs to... In PAGE 4: ... OSPF with digital signatures [6] is an example of IAE, while the double authentication scheme [2] is an example of IAH. For con dentiality too, we di erentiate between packet level and infor- mation level, which is shown in Table1 . OSPF running over IPsec [1] is an example of providing CP , which provides con dentiality for IP payload.... In PAGE 6: ...Table1 . We assume there are mul- tiple communication channels between any communication pair (the sub- verted router cannot partition the network) and the strongest authentication scheme (IAE) is employed.... ..."
Table 1: Performance on Exam after Exposure to the Visual Computer
2004
"... In PAGE 33: ... To examine the exposure apos;s impact, instructors added questions to the exams in all four classes. Results Table1 summarizes the questions and correct student responses from classes that were and were not exposed to the VC. Initial inspection suggests that the VC had limited impact upon learning, as only a few statistically significant differences were detected using a test of proportions.... In PAGE 34: ... Only six questions were added to the exam that related to the VC use. As noted in Table1 , student scores, regardless of treatment, were consistently high on all questions. Perhaps the questions were not sufficiently difficult to differentiate between different knowledge levels.... In PAGE 34: ... Perhaps the questions were not sufficiently difficult to differentiate between different knowledge levels. Table1 : Performance on Exam after Exposure to the Visual Computer Question Correct Responses Correct Responses (Instructor One) (Instructor Two) Exposure No Exposure Exposure No Exposure Diskettes provide a form of storage (a) temporary (b) permanent (c) secure (d) expensive 53% 64% 75% 85% Electronic interfaces through which devices like the keyboard, monitor, mouse, and printer are connected to the computer are called (a) docks (b) ports (c) peripheral replicators (d) passages 95% 93% 87% 97% The bus is (a) a collection of wires through which data is transmitted from one part of a computer to another (b) a mass transit vehicle (c) an internet system for moving large amounts of data (d) a collection of wires used to move data from one computer to another 95% 89% 79% 75% _____ is an opening in a computer where a circuit board can be inserted to add new capabilities to the computer. (a) expansion board (b) expansion slot (c) expansion card (d) expansion opening 98% 100% 70%**... In PAGE 50: ... These different behaviors are described in Table 1. Table1 . Behavior of Strategic Factors Factor Interpretation Comparative Advantage Focus on retaining comparative advantage on diverse fields such as product, cost, price, and human resource Expansion Focus on distribution channel and marketing effort to establish reputation within an e-business industry and to enhance customer service Process Focus on business process by investing research on business process, innovating the process, utilizing material effectively, and applying strict quality control Concentration Concentrate on a certain geographic area, a limited number of product, and inventory control Low Price Focus on low price to defeat competitors in e-business market Product Improvement Focus on continuous product improvement Using the cluster analysis introduced by Hambrick (1983), 5 e-business models with various emphases on strategic factors were developed.... ..."
Table 4. Mapping of security objectives to the TOE security environment
2001
"... In PAGE 53: ... These objectives are suitable to cover all aspects of the identified environment. Table4 below summarises the mapping from the security objectives to each of the identified threats, OSPs and assumptions, in tabular form. This is then followed by a rationale which justifies the suitability of the security objectives.... In PAGE 54: ...Biometric Device Protection Profile Table4 . Mapping of security objectives to the TOE security environment 6.... In PAGE 62: ....1.3 Assumptions are upheld by the security objectives A.PORTAL rationale 233 Table4 does not map any security objectives explicitly to this assumption, since it is a general assumption regarding the intended method of use of the Biometric Device. All security objectives for the TOE and for the environment are based on, and thus can be regarded as being consistent with or upholding, the A.... ..."
Table 4. Classification of devices based on device modality.
2000
"... In PAGE 8: ... Architecture So now when we try to put all this together into a feasible and practical architecture, we have an MPEG-7 server that contains the database of multimedia data. The server will also contain Table 3 and Table4 . The server will be able to ascertain the class of network and client device, and will accordingly use the matrix in Table 5 to decide the appropriate reductions needed to be performed.... ..."
Cited by 1
Table 4. Mapping of security objectives to the TOE security environment
2001
"... In PAGE 53: ... These objectives are suitable to cover all aspects of the identified environment. Table4 below summarises the mapping from the security objectives to each of the identified threats, OSPs and assumptions, in tabular form. This is then followed by a rationale which justifies the suitability of the security objectives.... In PAGE 53: ... This is then followed by a rationale which justifies the suitability of the security objectives. Table4 . Mapping of security objectives to the TOE security environment Security Environment TOE Security Objectives Environment Security Objectives Threats T.... In PAGE 62: ....1.3 Assumptions are upheld by the security objectives A.PORTAL rationale 233 Table4 does not map any security objectives explicitly to this assumption, since it is a general assumption regarding the intended method of use of the Biometric Device. All security objectives for the TOE and for the environment are based on, and thus can be regarded as being consistent with or upholding, the A.... ..."
Table 1. Devices in the environment simulator.
2006
"... In PAGE 16: ... Finally, the task-device pairs are composed selecting the tasks with the best rank and the devices, which provide the tasks, also with the best rank. 7 Experimental Evaluation Our work is based on an environment simulator in which we are testing the proposed approach considering a set of common home devices, described in Table1 , that are normally present in the kitchen. Table 1.... ..."
Cited by 1
Table 1. Devices in the environment simulator
2006
"... In PAGE 16: ... Finally, the task-device pairs are composed selecting the tasks with the best rank and the devices, which provide the tasks, also with the best rank. 7 Experimental Evaluation Our work is based on an environment simulator in which we are testing the proposed approach considering a set of common home devices, described in Table1 , that are normally present in the kitchen. Table 1.... ..."
Cited by 1
Table 1. The correlation coefficients of all pairs of primary color channels. crg is the correlation coefficient of green and red channels; cbg is the correlation coefficient of green and blue channels; and crb is the correlation coefficient of red and blue channels.
2005
"... In PAGE 5: ...ensor design. Second, the sensitivity of the human visual system peaks at the green wavelength. Third, the green is closer to red and to blue than the difference between red and blue in wavelength. Table1 lists the average correlation coefficients between all pairs of primary color channels measured over a set of 18 color test images shown in Fig.2.... ..."
Cited by 5
Results 1 - 10
of
304,560