Results 1 - 10
of
2,384
Table 2: Application level multicast systems
Table 2. Some properties of the different secure application-level multicast solutions Scheme Pnt2pnt Cryptographic operations Secure channels
2005
"... In PAGE 4: ... Key Agreement. In Table2 , for the key agreement column, a value of 2 (two) means that a new member needs to agree on two keys: one with parent and one with RP. For ESM with shared keys between neighbors, a secure channel with the RP is not needed.... ..."
Cited by 1
Table 1: Application-level mastery
2006
"... In PAGE 19: ... In the context of the literature review, application is most directly revealed by the two-step process of: a) identifying the major concepts germane to the study and b) placing the citation in the correct category. Table1 , adapted from Webster and Watson (2002), illustrates the activities necessary to demonstrate mastery at the application level following the concept-centric approach discussed previously. Table 1: Application-level mastery ... ..."
Cited by 2
Table 1: Application-level mastery
"... In PAGE 6: ... In the context of the literature review, application is most directly revealed by the two-step process of: a) identifying the major concepts germane to the study and b) placing the citation in the correct category. Table1 , adapted from Webster and Watson (2002), illustrates the activities necessary to demonstrate mastery at the application level following the concept-centric approach discussed previously. Table 1: Application-level mastery ... ..."
Table 1: Application-level mastery
"... In PAGE 26: ... In the context of the literature review, application is most directly revealed by the two-step process of: a) identifying the major concepts germane to the study and b) placing the citation in the correct category. Table1 , adapted from Webster and Watson (2002), illustrates the activities necessary to demonstrate mastery at the application level following the concept-centric approach discussed previously. Table 1: Application-level mastery ... ..."
Table 1: Application-Level Taxonomy
1996
Cited by 3
Table 4 Communication costs of fair exchange with application-level validation
2007
"... In PAGE 21: ...Table 4 Communication costs of fair exchange with application-level validation Table4 compares communication costs when the exchange includes application-level validation of the busines mesage. As shown, when time-stamping is required, the in-line TP/TSA fair exchange is now significantly cheaper than the off-line TP approach.... ..."
Cited by 1
Table 1. Generic application-level QoS parameters
2000
"... In PAGE 4: ... Finally, generic system-level parameters are translated into the system- specific parameters understood by each of the reservation protocols present in the underlying system. The sets of generic application-level and generic system-level parameters recognised by Quartz during the translation process are listed in Table1 and Table 2 respectively. Parameter names are suffixed by a tag that identifies the corresponding abstraction level.... In PAGE 7: ... Data packet QoS parameters Parameter Name Description DPkt::PacketSize Size of packets DPkt::DelayBwPackets Delay between two packets DPkt::EndToEndDelay Total delay for packet delivery DPkt::ErrorRatio Acceptable error ratio DPkt::Guarantee Guarantee level DPkt::SecurityLevel Security level Table 7. A clear mapping may be noticed between these parameters and the generic application-level parameters presented in Table1 . This mapping is implemented by the data packet application filter.... ..."
Cited by 15
Table 1. Generic application-level QoS parameters
2000
"... In PAGE 4: ... Finally, generic system-level parameters are translated into the system- specific parameters understood by each of the reservation protocols present in the underlying system. The sets of generic application-level and generic system-level parameters recognised by Quartz during the translation process are listed in Table1 and Table 2 respectively. Parameter names are suffixed by a tag that identifies the corresponding abstraction level.... In PAGE 7: ... Data packet QoS parameters Parameter Name Description DPkt::PacketSize Size of packets DPkt::DelayBwPackets Delay between two packets DPkt::EndToEndDelay Total delay for packet delivery DPkt::ErrorRatio Acceptable error ratio DPkt::Guarantee Guarantee level DPkt::SecurityLevel Security level Table 7. A clear mapping may be noticed between these parameters and the generic application-level parameters presented in Table1 . This mapping is implemented by the data packet application filter.... ..."
Cited by 15
Results 1 - 10
of
2,384