• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 7,742
Next 10 →

Table 1 The collection has a state composed of a set of graphical entities. Its functions allows it to receive new entities (interpret); to traverse them and send the result to the feedback (trav_feed); to traverse them and send the result to the measure (trav_meas). The feedback has a state composed of a set of graphical entities (at a lower level with respect to the collection), and a function to update its state depending on the data received from the collection and to transmit the results to the underlying layers (output) and another to provide echoing of the new data received from the measure (highlight). Finally, the measure has a state composed of the last input data processed and a set of graphical entities received from the collection that are necessary to compute its function. Here the functions are: to update the measure when receiving new items from the collection (update); the measure function to apply its processing on the last received element when the input trigger is verified, and the echo function that is computed when new input data are received and it returns the current selected element to the feedback object for performing echoing to the user.

in An Object-Oriented Approach to the Design of Graphical User Interface Systems
by Fabio Paterno 1992
Cited by 1

Table 1 The collection has a state composed of a set of graphical entities. Its functions allows it to receive new entities (interpret); to traverse them and send the result to the feedback (trav_feed); to traverse them and send the result to the measure (trav_meas). The feedback has a state composed of a set of graphical entities (at a lower level with respect to the collection), and a function to update its state depending on the data received from the collection and to transmit the results to the underlying layers (output) and another to provide echoing of the new data received from the measure (highlight). Finally, the measure has a state composed of the last input data processed and a set of graphical entities received from the collection that are necessary to compute its function. Here the functions are: to update the measure when receiving new items from the collection (update); the measure function to apply its processing on the last received element when the input trigger is verified, and the echo function that is computed when new input data are received and it returns the current selected element to the feedback object for performing echoing to the user.

in Interaction". Proceedings Eurographics ’90. Montreaux. pp.481-494. [FLM91] J.A.Feldman, C.C.Lim, F.Mazzanti. "pSather Monitors: Design, Tutorial, Rationale and
by Sw R. Swick

Table 1: Security Mechanisms. Methods Label Description Protection

in Secure and Resilient Routing: A Framework for Resilient Network Architectures
by Deep Medhi, Dijiang Huang
"... In PAGE 10: ....2.1 Preventive Cryptographic Countermeasures Computer security rests on confldentiality, integrity, and availability. Table1 enlists two pre- ventive cryptographic countermeasures that are described in the literature, including those... In PAGE 11: ... E2E means that the generation of an authentication code is performed only at the source; all the forwarding routers and termination routers are part of the end system, and they only perform veriflcation. In Table1 , we provide a summary of the two main preventive cryptographic countermeasures for link state routing protocols. In the link state routing protocol, pieces of routing information, link state advertisements (LSAs), are encapsulated in a link state update (LSU) packet.... In PAGE 12: ...2.2 Using Preventive Cryptographic Countermeasures to Guard Against At- tacks Next, we analyze how to use cryptographic countermeasures presented in Table1 to guard against threat actions illustrated in Fig. 2.... ..."

Table 4. Number of hops traversed by data packets (900 sec, pause time 0).

in Source-Tree Routing in Wireless Networks
by J.J. Garcia-Luna-Aceves, Marcelo Spohn 1999
"... In PAGE 9: ... The tables show the total number of update packets transmitted by the nodes and the total number of data packets delivered to the applications for the three simulated workloads. Table4 shows the number of hops traversed by data packets during 900 seconds of simulated time when nodes are in continuous motion. The total number of update packets transmit- ted by routers running STAR varies with the number of changes in link connectivity while DSR generates control packets based on both variation of changes in connectivity and the type of workload inserted in the network.... ..."
Cited by 50

Table 1 Transmitted

in Motion Detection on Distributed-Memory Machines: a Case Study
by P. Cremonesi, M. Pugassi, N. Scarabottolo

Table 1: Partial list of update totals per ISP on February 1, 1997

in Internet Routing Instability
by Craig Labovitz, G. Robert Malan, Farnam Jahanian
"... In PAGE 6: ... On average, we observe between 500,000 to 6 million pathological withdrawals per day being exchanged at the Mae-East exchange point. As Table1 illustrates, many of the exchange point routers with- draw an order of magnitude more routes then they announce during a given day.For example, Table 1 shows that ISP- I announced 259 pren0cxes, but transmitted over 2.... In PAGE 6: ... As Table 1 illustrates, many of the exchange point routers with- draw an order of magnitude more routes then they announce during a given day.For example, Table1 shows that ISP- I announced 259 pren0cxes, but transmitted over 2.4 million withdrawals for just 14,112 din0berent pren0cxes.... ..."

Table 10: Deployment of Limited Transmit

in Measuring the Evolution of Transport Protocols in the Internet
by Alberto Medina, Mark Allman, Sally Floyd 2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28

Table 10: Deployment of Limited Transmit

in Measuring the Evolution of Transport Protocols in the Internet
by Alberto Medina, Mark Allman, Sally Floyd 2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28

Table 10: Deployment of Limited Transmit

in Measuring the Evolution of Transport Protocols in the Internet
by Alberto Medina, Mark Allman, Sally Floyd 2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28

Table 10: Deployment of Limited Transmit

in Measuring the Evolution of Transport Protocols in the Internet
by Alberto Medina 2005
"... In PAGE 10: ... Greater accuracy could be gained by running the test sev- eral times for each web server, as done with the TBIT tests in [41]. Table10 shows the results from our tests. The table shows that Limited Transmit is deployed in at least a fifth of the web servers in our dataset.... ..."
Cited by 28
Next 10 →
Results 11 - 20 of 7,742
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University