• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 41,070
Next 10 →

Table 5: Expressions for the primary key problem

in User Modelling for Conceptual Database Design Based on an Extended Entity Relationship Model: A Preliminary Study
by Series Professor, C. J. Rijsbergen, B Novikov, Margita Altus, Margita Altus

Table 4: Kernel IS on native PVM

in Performanceof the NAS Parallel Benchmarkson PVM Based Networks °
by S. White, A. _lund, V S. Sunderam

Table 8: Kernel CG on enhanced PVM

in Performanceof the NAS Parallel Benchmarkson PVM Based Networks °
by S. White, A. _lund, V S. Sunderam

Table 3-2. Key Problems with Existing 802.11 Wireless LAN Security

in Wireless Network Security Wireless Network Security Wireless Network Security Wireless Network Security
by Bluetooth And Handheld, Recommendations Of The National, Tom Karygiannis, Tom Karygiannis, Les Owens, Les Owens, Donald L. Evans, Phillip J. Bond, Under Secretary For Technology 2002
"... In PAGE 8: ...v List of Tables Table3 -1.... In PAGE 8: ...able 3-1. Key Characteristics of 802.11 Wireless LANs ....................................................... 3-8 Table3 -2.... In PAGE 8: ...able 3-2. Key Problems with Existing 802.11 Wireless LAN Security ................................. 3-18 Table3 -3.... In PAGE 8: ...able 3-3. Wireless LAN Security Checklist ......................................................................... 3-40 Table3 -4.... In PAGE 24: ...02.11 standard. As an introduction to the 802.11 and WLAN technology, Table3 -1 provides some key characteristics at a glance. Table 3-1.... In PAGE 24: ...02.11 standard. As an introduction to the 802.11 and WLAN technology, Table 3-1 provides some key characteristics at a glance. Table3 -1. Key Characteristics of 802.... In PAGE 56: ...3-40 3.8 Wireless LAN Security Checklist Table3 -3 provides a WLAN security checklist. The table presents guidelines and recommendations for creating and maintaining a secure 802.... In PAGE 56: ... For instance, an individual performing a wireless security audit in an 802.11 environment can quickly check off each recommendation for the agency, asking Have I done this? Table3 -3. Wireless LAN Security Checklist Checklist Security Recommendation Best Practice Should Consider Status Management Recommendations 1.... In PAGE 58: ... ! 3.9 Wireless LAN Risk and Security Summary Table3 -4 lists security recommendations for 802.11 wireless LANs.... In PAGE 59: ...3-43 Table3 -4. Wireless LAN Security Summary Security Recommendation Security Needs, Requirements, or Justification 1.... ..."

Table 5. Problems and rationale of the key stakeholder roles

in Describing and Communicating Software Architecture in Practice: Observations on Stakeholders and Rationale
by Kari Smolander, Tero Päivärinta 1994
Cited by 2

Table 5. Problems and rationale of the key stakeholder roles

in Describing and Communicating Software Architecture in Practice: Observations on Stakeholders and Rationale
by Kari Smolander, Tero Päivärinta 1994
Cited by 2

Table 2: Knowledge communication problems of experts Key Concept / Knowledge

in unknown title
by unknown authors

Table 1. A comparison of public-key cryptosystems [30]. Public-key system Examples Mathematical Problem Best known method for

in Speeding up Secure Web Transactions Using Elliptic Curve Cryptography
by unknown authors
"... In PAGE 2: ... The relative difficulty of solving that problem de- termines the security strength of the corresponding system. Table1 summarizes three types of well known public-key cryptosystems. As shown in the last column, RSA, Diffie- Hellman and DSA can all be attacked using sub-exponential algorithms, but the best known attack on ECC requires ex- ponential time.... ..."

Table 20.4 Key Parameters used to Solve the List Problem. Other parameters are as [Koza 1994, page 655]

in Data Structures and Genetic Programming
by William Langdon In 1996
Cited by 29

Table 20.4 Key Parameters used to Solve the List Problem. Other parameters are as [Koza 1994, page 655]

in Data Structures and Genetic Programming
by William B. Langdon
Next 10 →
Results 1 - 10 of 41,070
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University