Results 11 - 20
of
7,742
Table 1 The collection has a state composed of a set of graphical entities. Its functions allows it to receive new entities (interpret); to traverse them and send the result to the feedback (trav_feed); to traverse them and send the result to the measure (trav_meas). The feedback has a state composed of a set of graphical entities (at a lower level with respect to the collection), and a function to update its state depending on the data received from the collection and to transmit the results to the underlying layers (output) and another to provide echoing of the new data received from the measure (highlight). Finally, the measure has a state composed of the last input data processed and a set of graphical entities received from the collection that are necessary to compute its function. Here the functions are: to update the measure when receiving new items from the collection (update); the measure function to apply its processing on the last received element when the input trigger is verified, and the echo function that is computed when new input data are received and it returns the current selected element to the feedback object for performing echoing to the user.
1992
Cited by 1
Table 1 The collection has a state composed of a set of graphical entities. Its functions allows it to receive new entities (interpret); to traverse them and send the result to the feedback (trav_feed); to traverse them and send the result to the measure (trav_meas). The feedback has a state composed of a set of graphical entities (at a lower level with respect to the collection), and a function to update its state depending on the data received from the collection and to transmit the results to the underlying layers (output) and another to provide echoing of the new data received from the measure (highlight). Finally, the measure has a state composed of the last input data processed and a set of graphical entities received from the collection that are necessary to compute its function. Here the functions are: to update the measure when receiving new items from the collection (update); the measure function to apply its processing on the last received element when the input trigger is verified, and the echo function that is computed when new input data are received and it returns the current selected element to the feedback object for performing echoing to the user.
Table 1: Security Mechanisms. Methods Label Description Protection
"... In PAGE 10: ....2.1 Preventive Cryptographic Countermeasures Computer security rests on confldentiality, integrity, and availability. Table1 enlists two pre- ventive cryptographic countermeasures that are described in the literature, including those... In PAGE 11: ... E2E means that the generation of an authentication code is performed only at the source; all the forwarding routers and termination routers are part of the end system, and they only perform veriflcation. In Table1 , we provide a summary of the two main preventive cryptographic countermeasures for link state routing protocols. In the link state routing protocol, pieces of routing information, link state advertisements (LSAs), are encapsulated in a link state update (LSU) packet.... In PAGE 12: ...2.2 Using Preventive Cryptographic Countermeasures to Guard Against At- tacks Next, we analyze how to use cryptographic countermeasures presented in Table1 to guard against threat actions illustrated in Fig. 2.... ..."
Table 4. Number of hops traversed by data packets (900 sec, pause time 0).
1999
"... In PAGE 9: ... The tables show the total number of update packets transmitted by the nodes and the total number of data packets delivered to the applications for the three simulated workloads. Table4 shows the number of hops traversed by data packets during 900 seconds of simulated time when nodes are in continuous motion. The total number of update packets transmit- ted by routers running STAR varies with the number of changes in link connectivity while DSR generates control packets based on both variation of changes in connectivity and the type of workload inserted in the network.... ..."
Cited by 50
Table 1: Partial list of update totals per ISP on February 1, 1997
"... In PAGE 6: ... On average, we observe between 500,000 to 6 million pathological withdrawals per day being exchanged at the Mae-East exchange point. As Table1 illustrates, many of the exchange point routers with- draw an order of magnitude more routes then they announce during a given day.For example, Table 1 shows that ISP- I announced 259 pren0cxes, but transmitted over 2.... In PAGE 6: ... As Table 1 illustrates, many of the exchange point routers with- draw an order of magnitude more routes then they announce during a given day.For example, Table1 shows that ISP- I announced 259 pren0cxes, but transmitted over 2.4 million withdrawals for just 14,112 din0berent pren0cxes.... ..."
Table 10: Deployment of Limited Transmit
2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28
Table 10: Deployment of Limited Transmit
2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28
Table 10: Deployment of Limited Transmit
2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28
Table 10: Deployment of Limited Transmit
2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28
Results 11 - 20
of
7,742