• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 80,398
Next 10 →

Table 1: Security Mechanisms. Methods Label Description Protection

in Secure and Resilient Routing: A Framework for Resilient Network Architectures
by Deep Medhi, Dijiang Huang
"... In PAGE 10: ....2.1 Preventive Cryptographic Countermeasures Computer security rests on confldentiality, integrity, and availability. Table1 enlists two pre- ventive cryptographic countermeasures that are described in the literature, including those... In PAGE 11: ... E2E means that the generation of an authentication code is performed only at the source; all the forwarding routers and termination routers are part of the end system, and they only perform veriflcation. In Table1 , we provide a summary of the two main preventive cryptographic countermeasures for link state routing protocols. In the link state routing protocol, pieces of routing information, link state advertisements (LSAs), are encapsulated in a link state update (LSU) packet.... In PAGE 12: ...2.2 Using Preventive Cryptographic Countermeasures to Guard Against At- tacks Next, we analyze how to use cryptographic countermeasures presented in Table1 to guard against threat actions illustrated in Fig. 2.... ..."

Table 2: Security mechanisms mapped onto security management.

in Abstract Security Management in Computer Supported Cooperative Work
by Dr. Stephanie Teufel
"... In PAGE 16: ... Authenticity of communication partners is a requirement for the secure implementation of various artefacts such as decision making, participant management and collaborative writing (see Table 1). Table2 indicates some classical information security mechanisms which can be used for the implementation of CSCW information security management requirements. The security management criteria as shown on the horizontal axis of Table 2 corresponds with that of Table 1.... In PAGE 18: ...Table2 that current state-of-the-art security mechanisms can be used but are not sufficient to fully support the information security requirements of CSCW applications. The column, Group Security, in Table 2, indicates that some of the mechanisms provided by Open System Architecture apos;s such as DCE/OSF, ECMA, SESAME show potential for supporting the information security requirements of CSCW applications.... In PAGE 18: ...are not sufficient to fully support the information security requirements of CSCW applications. The column, Group Security, in Table2 , indicates that some of the mechanisms provided by Open System Architecture apos;s such as DCE/OSF, ECMA, SESAME show potential for supporting the information security requirements of CSCW applications. However, these environments are still modelled on a single user interacting with multiple objects in a computing environment.... ..."

Table 5. International Oil and Natural Gas Reserves as of December 31, 1996

in unknown title
by unknown authors
"... In PAGE 24: ... International Perspective International Reserves The EIA estimates domestic oil and gas reserves but does not systematically estimate worldwide reserves. As shown in Table5 , international reserves estimates are presented in two widely circulated trade publications. The world apos;s total reserves are estimated to be roughly 1 trillion barrels of oil and 5 quadrillion cubic feet of gas.... ..."

Table 9: Comparison of the Mean Scores on Information System Security Effectiveness Based on I.T. Training

in INFORMATION SYSTEM SECURITY: SELF-EFFICACY AND SECURITY EFFECTIVENESS IN FLORIDA LIBRARIES By
by Daniel C. Phelps, John N. Gathegi 2004
"... In PAGE 7: ...able 8: Descriptive Statistics Self-Efficacy and Effectiveness ...................................... 49 Table9 : Comparison of the Mean Scores on Information System Security Effectiveness Based on I.... In PAGE 60: ... Group 1 Hypothesis 1 Discriminating the subjects based on having received formal information technology training provides two groups, those with formal information technology training (25 respondents) and those without (31 respondents). A comparison of the mean scores on information system security effectiveness was examined ( Table9 ). A t-test comparison of means was performed.... ..."

Table 1: Research Coverage of the International Information Systems Domain Layer Technology Applications Social Issues

in A Definition of Research Focus for International Information Systems
by unknown authors
"... In PAGE 2: ... There is as yet no coherent theory of the specific nature of international information systems (or even consensus on whether such specificity indeed exists) which could be of sufficient practical value to address the difficulties experienced with international information systems. Table1 below sets out a summary illustration 3 of the literature review - the shading reflects the coverage of the issue class (darker indicates more research). 3 ) This is based on an architecture framework by Zachmann [26] Research seems to have concentrated on the one hand at the conceptual level as far as social/cross-cultural issues and government-policy issues are concerned.... ..."

Table 1.). In terms of the information-based perspective,

in Knowledge Management Systems: Emerging Views and Practices from the Field
by Maryam Alavi 1999
"... In PAGE 9: ...36% gt; $1,000,000 37% Proceedings of the 32nd Hawaii International Conference on System Sciences - 1999 Proceedings of the 32nd Hawaii International Conference on System Sciences - 1999 $100,000 - $500,000 9% $500,000 - $1,000,000 18% Figure 1: Initiators of KMS with or developing KMS Senior General Manager 60% Senior Functional Manager 25% Senior IS Manager (CIO) 15% Staff 0% Figure 2: Estimated average budgets of KMS in organizations with KMS Information-based Technology-based Culture-based Actionable information Data mining Collective learning Categorizing of data Data warehouses Continuous learning Corporate yellow pages Executive information systems Intellectual property cultivation Filtered information Expert systems Learning organization Free text and concepts Intelligent agents People information archive Intranet Readily accessible information Multimedia Search engines Smart systems Table1 : Perspectives on the meaning of knowledge management 0-7695-0001-3/99 $10.00 (c) 1999 IEEE ... ..."
Cited by 21

Table 1. E-Learning vs. Security Awareness System

in Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System
by Charlie C. Chen, R. S. Shaw, Samuel C. Yang
"... In PAGE 5: ... Based on the discussions thus far, Table 1 depicts a framework of high-level requirements for an ISAS. In addition, Table1 also shows the commonalities and differences between e-learning systems and an ISAS. In terms of similarities, an intranet and the Internet can be vehicles for both systems to deliver information.... ..."

Table 3. WAM code and internal representation without and with external types information. Underlined instruction changed due to additional information.

in Improved Compilation of Prolog to C Using Moded Types and Determinism Information
by J. Morales, M. Carro, M. Hermenegildo 2004
"... In PAGE 5: ... Representation of some WAM uniflcation instructions with types. Generation of the Intermediate Low Level Language: WAM-like control and data instructions (Table 2) are then split into simpler ones ( Table3 ) (of a level similar to that of the BAM [27]) which are more suitable for optimizations, and which simplify the flnal code generation. The Type argument in the uniflcation instruc- tions re ects the type of the their arguments: for example, in the instruction bind, Type is used to specify if the arguments contain a variable or not.... In PAGE 10: ...ig. 7. Annotated factorial (using type information). The WAM code generated for this example is shown in the rightmost column of Table3 . Underlined instructions were made more speciflc due to improved information | but note that the representation is homogeneous with respect to 7 This is currently known only for internal predicates written in C, and which are available by default in the system, but the scheme is general and can be extended to Prolog predicates.... ..."
Cited by 7

Table 1: Prediction Modes for Lossless JPEG (a is left-neighboring pixel, b is upper- neighboring pixel, c is upper-left-neighboring pixel) [11] Rice, R.F., Yeh, P.S., and Miller, W.H. \Algorithms for a Very High Speed Univer- sal Noiseless Coding Module. quot; JPL Publication 91-1. Pasadena, CA: JPL Publication O ce. February 15, 1991. [12] Venbrux, Jack, Yeh, Pen-Shu, and Liu, Muye N. \A VLSI Chip Set for High-Speed Lossless Data Compression. quot; IEEE Transactions on Circuits and Systems for Video Technology. Vol. 2. No. 4. December, 1992. pp. 381-391. [13] Arps, R.B. and Truong, T.K. \Comparison of International Standards for Lossless Still Image Compression. quot; Proceedings of the IEEE. Vol. 82. No. 6. June, 1994. pp. 889-899. [14] Memon, N.D. and Sayood, K. \Lossless Image Compression: A Comparative Study. quot; IS amp;T/SPIE Electronic Imaging Conference. San Jose, CA. February, 1995.

in Lossless Image Compression using the Discrete Cosine Transform
by Nasir Ahmed, Neeraj Magotra, Giridhar Mandyam, Giridhar Mandyam
"... In PAGE 6: ...recision of these coe cients could be reduced by a factor of 1000 (i.e. three decimal digits) without a ecting the rst-order entropy of the error residuals; the advantage of this is a reduction in rst-order entropy of the DCT coe cients. The proposed method was compared to seven xed lters for the present lossless JPEG standard (given in Table1 ) [10], with the rst-order entropy of the error residuals for both methods given Table 2, where the proposed... ..."

Table 2. Systems 1 and 2 compared System 1 System 2

in Asynchronous Computer Conferencing in the MBA Classroom
by Catherine A. Middleton
"... In PAGE 8: ...Table2 compares the two systems on the four factors Proceedings of the 32nd Hawaii International Conference on System Sciences - 1999 Proceedings of the 32nd Hawaii International Conference on System Sciences - 1999 (rungs) proposed as determinants of successful technological innovation. Table 2.... In PAGE 8: ...and time consuming, but qualitative data suggest that many users found System 1 easy to use. Table2 also provides a basis for future research in this area, by outlining specific aspects of the model that can be tested in other contexts. Systems can be compared, or assessed individually, by considering how well they meet or deliver each criteria or feature listed in the table.... ..."
Next 10 →
Results 11 - 20 of 80,398
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University