• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,001
Next 10 →

Table 1: Well-known Ciphers

in unknown title
by unknown authors
"... In PAGE 7: ...llustration 17: OpenPGP Features................................................................................85 Index of Tables Table1 : Well-known Ciphers.... ..."

Table 1: Recent well-known pathogens.

in Surviving internet catastrophes
by Flavio Junqueira, Ranjita Bhagwan, Ro Hevia, Keith Marzullo, Geoffrey M. Voelker 2005
"... In PAGE 4: ... Consequently, H1 is present in both cores. To make our argument more concrete, consider the worms in Table1 , which are well-known worms unleashed in the past few years. For each worm, given two hosts with one not run- ning Windows or not running a specific server such as a Web server or a database, at least one survives the attack.... In PAGE 10: ... We do so based on information about past worms to support our choices and assumptions. Worms such as the ones in Table1 used services that have vulnerabilities as vectors for propagation. Code Red, for ex- ample, used a vulnerability in the IIS Web server to infect hosts.... In PAGE 14: ... Note that this scenario is far more catastrophic than what we have experienced with worms to date. The worms listed in Table1 , for example, exploit only particular services on Windows. The simulation proceeded as follows.... ..."
Cited by 17

Table 1: Recent well-known pathogens.

in Surviving Internet Catastrophes
by Flavio Junqueira, Ranjita Bhagwan, Alejandro Hevia, Ro Hevia, Keith Marzullo, Geoffrey M. Voelker 2005
"... In PAGE 4: ... Consequently, H1 is present in both cores. To make our argument more concrete, consider the worms summarized in Table1 , which are well-known worms unleashed in the past three years. For each worm, given two hosts with one not running Windows or not running a specific server such as a Web server or a database, at least one survives the attack.... In PAGE 10: ... We do so based on information about past worms to support our choices and assumptions. Worms such as the ones in Table1 used services that 0 2 4 6 8 10 2 3 4 5 6 7 8 9 10 Variance Load limit RandomUniform Weighted DWeighted Figure 7: Average load variance. have vulnerabilities as vectors for propagation.... In PAGE 14: ... Note that this scenario is far more catastrophic than what we have experienced with worms to date. The worms listed in Table1 , for example, exploit only particular services on Windows. The simulation proceeded as follows.... ..."
Cited by 17

Table 3: Well-known learning algorithms.

in Artificial Neural Networks: A Tutorial
by Anil K. Jain, Jianchang Mao, K. Mohiuddin 1996
"... In PAGE 27: ...3.5 Summary of Learning Algorithms Various learning algorithms and their associated network architectures are summarized in Table3 . However, this is by no means an exhaustive list of the learning algorithms available in the literature.... ..."
Cited by 40

Table 4: Well-known implicators

in Fuzzy Association Rules: A Two-Sided Approach
by M. De Cock, C. Cornelis, M. De, Cock C. Cornelis, E. E. Kerre

Table 3: Well-known Fields in Distinguished Names

in unknown title
by unknown authors
"... In PAGE 7: ...able 2: Message Digests............................................................................................18 Table3 : Well-known Fields in Distinguished Names.... ..."

Table 1: Description of well-known climate indices.

in Temporal Data Mining for the Discovery and Analysis of Ocean Climate Indices
by Michael Steinbach, Steven Klooster, Pang-ning Tan, Christopher Potter, Vipin Kumar 2002
"... In PAGE 3: ... For example, various El Nino related indices, such as NINO 1+2 and NINO 4, have been established to measure sea surface temperature anomalies across different regions of the Pacific Ocean. Some of the well-known climate indices are shown in Table1 [IND1, IND2]. Figure 2 shows the time series for the SOI index.... In PAGE 8: ...nterest, 0.11, are shown. The following index labels are for the x-axis of the plots. For more information see Table1 or [ IND1, IND2]. Note that 1, 6, and 8-11 are all El Nino related indices.... ..."
Cited by 6

Table 1: Description of well-known climate indices. Index Description

in Discovery of Climate Indices Using Clustering
by Michael Steinbach, Pang-ning Tan 2003
"... In PAGE 2: ...utions, e.g., land temperature, which is available at a reso- lution of 0:5 0:5 , and SST, which is available for a 1 1 grid, and SLP, which is available for a 2:5 2:5 grid. Most of the well-known climate indices [6, 7] based upon SST and SLP are shown in Table1 . Many of the indices rep- resent the El Nino phenomenon and are highly correlated, as shown in Table 2.... In PAGE 8: ... Since pressure di erences are important in weather and climate, negative correlations between pairs of clusters are also im- portant. Indeed, most of the well-known pressure-based in- dices ( Table1 ) are de ned as the di erence of two pressure time series. Therefore, for the SLP clusters, we generated 1 5 10 15 20 25 30 0 0.... ..."
Cited by 3

Table 7-2: Well-Known Port Numbers

in unknown title
by unknown authors
"... In PAGE 68: ... These interfaces are previously defined in the Network Services Library portion of this chapter. Additional Interfaces The interfaces listed below in Table7 -1 show the additional commands, protocols, and service daemons that are included to ensure inter-operability between SCD conforming systems. The table includes three columns, the command name which is invoked, the RFC number for the protocol specification as maintained by the Internet Engineering Task Force, and a short description of the feature provided.... In PAGE 68: ... The table includes three columns, the command name which is invoked, the RFC number for the protocol specification as maintained by the Internet Engineering Task Force, and a short description of the feature provided. Table7 -2 shows the well-known port numbers as derived from RFC 1700 that SCD conforming systems are... In PAGE 69: ...7-2 SPARC Compliance Definition 2.3 8/16/95 Table7 -1: Required Commands Command RFC Description rlogin BSDNET Remote terminal services (BSD) rsh BSDNET Remote user shell (BSD) rcp BSDNET Remote file copy (BSD) rwho BSDNET Remote user information service (BSD) rdate BSDNET Remote uptime statistics (BSD) talk BSDNET Remote chat utility (BSD) finger rfc1288 Information server for logged on users telnet lt;many gt; Interactive terminal services ftp rfc959 File transfer protocol arp rfc826... ..."

Table 1 lists the categorization of some well-known examples of dependencies.

in Modeling and Analysis of Workflows using Petri Nets
by Nabil R. Adam, Vijayalakshmi Atluri, Wei-kuang Huang 1998
"... In PAGE 6: ... Table1 . Some dependencies and their classi cation precedence type weak-causal type strong-causal type commit strong commit begin-on-commit weak begin-on-commit force-commit-on-abort begin-on-abort weak abort exclusion begin abort weak-causal type speci es the su cient condition to enforce the dependency.... ..."
Cited by 57
Next 10 →
Results 1 - 10 of 2,001
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University