Results 1 - 10
of
2,001
Table 1: Well-known Ciphers
"... In PAGE 7: ...llustration 17: OpenPGP Features................................................................................85 Index of Tables Table1 : Well-known Ciphers.... ..."
Table 1: Recent well-known pathogens.
2005
"... In PAGE 4: ... Consequently, H1 is present in both cores. To make our argument more concrete, consider the worms in Table1 , which are well-known worms unleashed in the past few years. For each worm, given two hosts with one not run- ning Windows or not running a specific server such as a Web server or a database, at least one survives the attack.... In PAGE 10: ... We do so based on information about past worms to support our choices and assumptions. Worms such as the ones in Table1 used services that have vulnerabilities as vectors for propagation. Code Red, for ex- ample, used a vulnerability in the IIS Web server to infect hosts.... In PAGE 14: ... Note that this scenario is far more catastrophic than what we have experienced with worms to date. The worms listed in Table1 , for example, exploit only particular services on Windows. The simulation proceeded as follows.... ..."
Cited by 17
Table 1: Recent well-known pathogens.
2005
"... In PAGE 4: ... Consequently, H1 is present in both cores. To make our argument more concrete, consider the worms summarized in Table1 , which are well-known worms unleashed in the past three years. For each worm, given two hosts with one not running Windows or not running a specific server such as a Web server or a database, at least one survives the attack.... In PAGE 10: ... We do so based on information about past worms to support our choices and assumptions. Worms such as the ones in Table1 used services that 0 2 4 6 8 10 2 3 4 5 6 7 8 9 10 Variance Load limit RandomUniform Weighted DWeighted Figure 7: Average load variance. have vulnerabilities as vectors for propagation.... In PAGE 14: ... Note that this scenario is far more catastrophic than what we have experienced with worms to date. The worms listed in Table1 , for example, exploit only particular services on Windows. The simulation proceeded as follows.... ..."
Cited by 17
Table 3: Well-known learning algorithms.
1996
"... In PAGE 27: ...3.5 Summary of Learning Algorithms Various learning algorithms and their associated network architectures are summarized in Table3 . However, this is by no means an exhaustive list of the learning algorithms available in the literature.... ..."
Cited by 40
Table 3: Well-known Fields in Distinguished Names
"... In PAGE 7: ...able 2: Message Digests............................................................................................18 Table3 : Well-known Fields in Distinguished Names.... ..."
Table 1: Description of well-known climate indices.
2002
"... In PAGE 3: ... For example, various El Nino related indices, such as NINO 1+2 and NINO 4, have been established to measure sea surface temperature anomalies across different regions of the Pacific Ocean. Some of the well-known climate indices are shown in Table1 [IND1, IND2]. Figure 2 shows the time series for the SOI index.... In PAGE 8: ...nterest, 0.11, are shown. The following index labels are for the x-axis of the plots. For more information see Table1 or [ IND1, IND2]. Note that 1, 6, and 8-11 are all El Nino related indices.... ..."
Cited by 6
Table 1: Description of well-known climate indices. Index Description
2003
"... In PAGE 2: ...utions, e.g., land temperature, which is available at a reso- lution of 0:5 0:5 , and SST, which is available for a 1 1 grid, and SLP, which is available for a 2:5 2:5 grid. Most of the well-known climate indices [6, 7] based upon SST and SLP are shown in Table1 . Many of the indices rep- resent the El Nino phenomenon and are highly correlated, as shown in Table 2.... In PAGE 8: ... Since pressure di erences are important in weather and climate, negative correlations between pairs of clusters are also im- portant. Indeed, most of the well-known pressure-based in- dices ( Table1 ) are de ned as the di erence of two pressure time series. Therefore, for the SLP clusters, we generated 1 5 10 15 20 25 30 0 0.... ..."
Cited by 3
Table 7-2: Well-Known Port Numbers
"... In PAGE 68: ... These interfaces are previously defined in the Network Services Library portion of this chapter. Additional Interfaces The interfaces listed below in Table7 -1 show the additional commands, protocols, and service daemons that are included to ensure inter-operability between SCD conforming systems. The table includes three columns, the command name which is invoked, the RFC number for the protocol specification as maintained by the Internet Engineering Task Force, and a short description of the feature provided.... In PAGE 68: ... The table includes three columns, the command name which is invoked, the RFC number for the protocol specification as maintained by the Internet Engineering Task Force, and a short description of the feature provided. Table7 -2 shows the well-known port numbers as derived from RFC 1700 that SCD conforming systems are... In PAGE 69: ...7-2 SPARC Compliance Definition 2.3 8/16/95 Table7 -1: Required Commands Command RFC Description rlogin BSDNET Remote terminal services (BSD) rsh BSDNET Remote user shell (BSD) rcp BSDNET Remote file copy (BSD) rwho BSDNET Remote user information service (BSD) rdate BSDNET Remote uptime statistics (BSD) talk BSDNET Remote chat utility (BSD) finger rfc1288 Information server for logged on users telnet lt;many gt; Interactive terminal services ftp rfc959 File transfer protocol arp rfc826... ..."
Table 1 lists the categorization of some well-known examples of dependencies.
1998
"... In PAGE 6: ... Table1 . Some dependencies and their classi cation precedence type weak-causal type strong-causal type commit strong commit begin-on-commit weak begin-on-commit force-commit-on-abort begin-on-abort weak abort exclusion begin abort weak-causal type speci es the su cient condition to enforce the dependency.... ..."
Cited by 57
Results 1 - 10
of
2,001