Results 1 - 10
of
20,758
Table 18. The s t of available resources
Table 1. Comparison of Attack Classification with Available Resources.
"... In PAGE 4: ... They may use Class II adversaries as part of the attack team. Table1 compares each attack classification against available resources, based on Kocher apos;s Crypto Due Diligence [23]. The majority of practical design examples presented in this paper are targeted towards thwarting Class I and a portion of Class II attackers.... ..."
Table 1: System Behavior with Varying Available Resources
1999
"... In PAGE 6: ... We use two metrics for our evaluation: utilization is computed from the number of requests served by the server within a history unit, and server load measures all open requests (see [HA98]). Table1 shows the average utilization u, the variance of utilization (var. of u), the average server load l, the variance in server load (var.... In PAGE 7: ...lower the resources, the worse the QoS. Table1 shows that for non-uniform clients the QoS and the utilization is lower (left side) than for uniform clients with the same available resources (right side).... In PAGE 7: ...10 for 1000 simulation periods. The values in Table1 are computed with the parameter r h . We employed the stochastic approach to evaluate situations in which the server has to deal with excessively high variations in data rates.... ..."
Cited by 4
Table 4. Type of contribution and size of available resources
"... In PAGE 11: ... In Table 3, we summarize the type of contribution that available techniques can provide. In Table4 , we assess the size of lexical and structural data sources that we propose to exploit. While the mere size of a resource is not always and advantage, we assume that in here, a large size makes a resource more attractive for our approach.... ..."
Cited by 3
Table 4: Maximum numbers of resources available Resources Numbers
Table 8: Maximum numbers of resources available Resources Values
Results 1 - 10
of
20,758