• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,384
Next 10 →

Table 2: Application level multicast systems

in Scalable Multilateral Autonomous Decentralized . . .
by Khaled Ragab

Table 2. Some properties of the different secure application-level multicast solutions Scheme Pnt2pnt Cryptographic operations Secure channels

in Adding Confidentiality to Application-Level Multicast
by Leveraging The Multicast, Cristina Abad 2005
"... In PAGE 4: ... Key Agreement. In Table2 , for the key agreement column, a value of 2 (two) means that a new member needs to agree on two keys: one with parent and one with RP. For ESM with shared keys between neighbors, a secure channel with the RP is not needed.... ..."
Cited by 1

Table 1: Application-level mastery

in A Systems Approach to Conduct an Effective Literature Review in Support of
by Yair Levy, Timothy J. Ellis 2006
"... In PAGE 19: ... In the context of the literature review, application is most directly revealed by the two-step process of: a) identifying the major concepts germane to the study and b) placing the citation in the correct category. Table1 , adapted from Webster and Watson (2002), illustrates the activities necessary to demonstrate mastery at the application level following the concept-centric approach discussed previously. Table 1: Application-level mastery ... ..."
Cited by 2

Table 1: Application-level mastery

in Information Systems Research
by Yair Levy, Timothy J. Ellis
"... In PAGE 6: ... In the context of the literature review, application is most directly revealed by the two-step process of: a) identifying the major concepts germane to the study and b) placing the citation in the correct category. Table1 , adapted from Webster and Watson (2002), illustrates the activities necessary to demonstrate mastery at the application level following the concept-centric approach discussed previously. Table 1: Application-level mastery ... ..."

Table 1: Application-level mastery

in �Approach and Methodology
by Timothy J. Ellis, Yair Levy, Timothy J. Ellis, Yair Levy, Timothy J. Ellis, Yair Levy, Timothy J. Ellis, Yair Levy, Timothy J. Ellis
"... In PAGE 26: ... In the context of the literature review, application is most directly revealed by the two-step process of: a) identifying the major concepts germane to the study and b) placing the citation in the correct category. Table1 , adapted from Webster and Watson (2002), illustrates the activities necessary to demonstrate mastery at the application level following the concept-centric approach discussed previously. Table 1: Application-level mastery ... ..."

Table 1: Application-Level Taxonomy

in Beyond Automation: A Framework For Supporting Cooperation
by Juergen Englert, Torsten Eymann, Soenke Gold, Sönke Gold, Thomas Hummel, Detlef Schoder 1996
Cited by 3

Table 9 Characteristics for application-level requirements

in
by unknown authors

Table 4 Communication costs of fair exchange with application-level validation

in Highvalue B2B interactions, non-repudiation and Web Services
by Nick Cook, Paul Robinson, Santosh K. Shrivastava 2007
"... In PAGE 21: ...Table 4 Communication costs of fair exchange with application-level validation Table4 compares communication costs when the exchange includes application-level validation of the busines mesage. As shown, when time-stamping is required, the in-line TP/TSA fair exchange is now significantly cheaper than the off-line TP approach.... ..."
Cited by 1

Table 1. Generic application-level QoS parameters

in Quartz: A QoS Architecture for Open Systems
by Frank Siqueira, Vinny Cahill 2000
"... In PAGE 4: ... Finally, generic system-level parameters are translated into the system- specific parameters understood by each of the reservation protocols present in the underlying system. The sets of generic application-level and generic system-level parameters recognised by Quartz during the translation process are listed in Table1 and Table 2 respectively. Parameter names are suffixed by a tag that identifies the corresponding abstraction level.... In PAGE 7: ... Data packet QoS parameters Parameter Name Description DPkt::PacketSize Size of packets DPkt::DelayBwPackets Delay between two packets DPkt::EndToEndDelay Total delay for packet delivery DPkt::ErrorRatio Acceptable error ratio DPkt::Guarantee Guarantee level DPkt::SecurityLevel Security level Table 7. A clear mapping may be noticed between these parameters and the generic application-level parameters presented in Table1 . This mapping is implemented by the data packet application filter.... ..."
Cited by 15

Table 1. Generic application-level QoS parameters

in Quartz: A QoS Architecture for Open Systems
by Frank Siqueira And, Frank Siqueira, Vinny Cahill 2000
"... In PAGE 4: ... Finally, generic system-level parameters are translated into the system- specific parameters understood by each of the reservation protocols present in the underlying system. The sets of generic application-level and generic system-level parameters recognised by Quartz during the translation process are listed in Table1 and Table 2 respectively. Parameter names are suffixed by a tag that identifies the corresponding abstraction level.... In PAGE 7: ... Data packet QoS parameters Parameter Name Description DPkt::PacketSize Size of packets DPkt::DelayBwPackets Delay between two packets DPkt::EndToEndDelay Total delay for packet delivery DPkt::ErrorRatio Acceptable error ratio DPkt::Guarantee Guarantee level DPkt::SecurityLevel Security level Table 7. A clear mapping may be noticed between these parameters and the generic application-level parameters presented in Table1 . This mapping is implemented by the data packet application filter.... ..."
Cited by 15
Next 10 →
Results 1 - 10 of 2,384
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University