Results 1 - 10
of
9,254
Table 1 The four regular expression operators that symbolize events in an attack path Operator
2006
Table 9. Application Data
1997
"... In PAGE 32: ... There are three different lists: for the application, session and flow data. The contents of the application data is given in Table9 . Similarly, the contents of the session data in Table 9, and finally, the contents of the flow data in Table 10 and Table 11.... ..."
Cited by 1
Table 9. Application Data
1997
"... In PAGE 32: ... There are three different lists: for the application, session and flow data. The contents of the application data is given in Table9 . Similarly, the contents of the session data in Table 9, and finally, the contents of the flow data in Table 10 and Table 11.... ..."
Cited by 1
Table 5.2 Summary of transport protocols
2007
Table 1: Events and event loci
2002
"... In PAGE 2: ... The strategy we adopt is to argue that most dynamic events, while not necessarily local to a particular spot in the source code, are nevertheless tied to places in the source code. Table1 illustrates some primitive events and their associated code loci. Users are likely to want to express more than just primitive events.... ..."
Cited by 13
Table 1: Events and event loci
"... In PAGE 2: ... The strategy we adopt is to argue that most dynamic events, while not necessarily localized to a particular spot in the source code, are nevertheless tied to places in the source code. Table1 illustrates some primitive events and their associated code loci. Users are likely to want to express more than just primitive events.... ..."
Table of Events
2006
Table 4, the baseline case column summarizes the number of main events generated during the simulation interval. Table 4 also shows that although about one quarter of customer orders (135 out of 500) occur in stock out situations, yet most of them (84 out of 135) can still be successfully fulfilled through rush supply orders. In addition, about 10% of customer orders (48 out of 500) are fulfilled by alternative sourcing, which shows that alternative sourcing is important.
"... In PAGE 24: ... Table4 : Comparing different strategies in terms of events ... In PAGE 25: ... Moreover, the manager can adjust Rule 13 to further reduce this number suitably. Products A B C Total Out-of-stock events 53 66 63 182 Notify supply chain manager of out-of-stock events 24 29 27 80 Table 5: Numbers of out-of-stock events In addition, the events in Table4 can be used to calculate key performance indexes of the supply chain. As Table 4 shows, the fill rate of customer orders is 89% and the average time between an order arrival and the shipment of the order is 28 time units.... In PAGE 25: ... Products A B C Total Out-of-stock events 53 66 63 182 Notify supply chain manager of out-of-stock events 24 29 27 80 Table 5: Numbers of out-of-stock events In addition, the events in Table 4 can be used to calculate key performance indexes of the supply chain. As Table4 shows, the fill rate of customer orders is 89% and the average time between an order arrival and the shipment of the order is 28 time units. In addition, on average, it takes 54 time units for the main vendor to replenish rush supply orders, because production delays occur frequently (35 delay events) and they last a while before being resolved.... In PAGE 25: ...7. The simulation results of these two strategies are also shown in Table4 . Using Strategy 1, although there is a large number of back orders, more than a half of them (77 out of 135) are still delivered through successful rush supply orders from the main vendor (only 34 back orders are replenished by alternative vendors).... ..."
Results 1 - 10
of
9,254