• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 19,438
Next 10 →

Table 2. Resemblance between IBROW, on the one hand, and the Semantic Enabled Web Services project and the Semantic Web in general, on the other hand. IBROW3 (Esprit FP4); IBROW (IST, FP5) The SWWS project, Semantic Web Comments The Web is changing the nature of software Web services are orchestrated into In IBROW, problem-solving methods development to a distributive plug-and-play process. complex services. (PSMs) and ontologies were the The components concerned are problem-solving components being configured, versus methods (generic algorithms) and ontologies. Web services today.

in unknown title
by unknown authors

Table 4-1, shows the complete list of objects that can be protected by Windows 2000.

in Deficiencies in Current Software Protection Mechanisms and Alternatives for Securing Computer Integrity
by Fausi Qattan, Fredrik Thernelius 2004
"... In PAGE 7: ...able 3-7 Autostart locations for Optix Pro as observed by Autostart Viewer.............. 24 Table4 -1 Objects that can be protected by Windows 2000.... In PAGE 7: ...able 4-1 Objects that can be protected by Windows 2000........................................... 31 Table4 -2 Listing the hives, description, and if it is a link or not.... In PAGE 7: ...able 4-2 Listing the hives, description, and if it is a link or not................................... 34 Table4 -3 The hives and their supporting files.... In PAGE 31: ... Table4 -1 Objects that can be protected by Windows 2000 The entries in the DACL and the SACL contain the Security Identifications (SID) of the principal associated with the entries. The SIDs are created by the LSA for the users and groups on the local computer and it is used to uniquely identify them.... In PAGE 33: ... Applications use the registry API to retrieve, modify, or delete registry data [2]. The structure of the registry The registry is divided into five sub-trees (known as hives) as shown in Table4 -2 and Figure 4-5. Worth noting is that the hives Hkey_Classes_Root, Hkey_Current_User, and Current_Config really point to other parts of the registry.... In PAGE 34: ...Root key Abbreviation Description Link HKey_Classes_Root HKCR Contains file associations and COM registration information HKLM\SOFTWARE\ Classes HKey_Current_User HKCU Points to the user profile of the currently logged on user Subkey under HKU corresponding to the currently logged on user HKey_Local_Machine HKLM Placeholder-contains other keys Not a link HKey_Users HKU Contains sub-keys for all loaded user profiles Not a link HKey_Current_Config HKCC Current hardware profile HKLM\SYSTEM\ CurrentControlSet\Hardware Profiles\Current Table4 -2 Listing the hives, description, and if it is a link or not Figure 4-5 The main parts of the Registry [25] As the system starts, the registry database is loaded into memory from three sources: (1) files stored on disk, (2) drivers for plug-and-play equipment, and (3) the NTDetect.com program [25].... In PAGE 34: ... NTDetect is used to find out what hardware is installed. Table4 -3, shows which parts of the registry that is stored in which file. Registry hive Supporting files HKEY_LOCAL_MACHINE\HARDWARE No files! Loaded from drivers and by NTDetect.... In PAGE 34: ...log, Default.sav Table4 -3 The hives and their supporting files 34 ... ..."

Table 4-3 The hives and their supporting files

in Deficiencies in Current Software Protection Mechanisms and Alternatives for Securing Computer Integrity
by Fausi Qattan, Fredrik Thernelius 2004
"... In PAGE 7: ...able 3-7 Autostart locations for Optix Pro as observed by Autostart Viewer.............. 24 Table4 -1 Objects that can be protected by Windows 2000.... In PAGE 7: ...able 4-1 Objects that can be protected by Windows 2000........................................... 31 Table4 -2 Listing the hives, description, and if it is a link or not.... In PAGE 7: ...able 4-2 Listing the hives, description, and if it is a link or not................................... 34 Table4 -3 The hives and their supporting files.... In PAGE 31: ... The auditing information is stored in a System Access Control List (SACL). Table4 -1, shows the complete list of objects that can be protected by Windows 2000. Files Devices Mailslots Anonymous pipes Named pipes Printers Jobs Processes Threads Events Mutexes Semaphores Shared memory sections I/O completion ports LPC ports Waitable timers Access tokens Window stations Desktops Network shares Services Registry keys Table 4-1 Objects that can be protected by Windows 2000 The entries in the DACL and the SACL contain the Security Identifications (SID) of the principal associated with the entries.... In PAGE 31: ... Table 4-1, shows the complete list of objects that can be protected by Windows 2000. Files Devices Mailslots Anonymous pipes Named pipes Printers Jobs Processes Threads Events Mutexes Semaphores Shared memory sections I/O completion ports LPC ports Waitable timers Access tokens Window stations Desktops Network shares Services Registry keys Table4 -1 Objects that can be protected by Windows 2000 The entries in the DACL and the SACL contain the Security Identifications (SID) of the principal associated with the entries. The SIDs are created by the LSA for the users and groups on the local computer and it is used to uniquely identify them.... In PAGE 33: ... Applications use the registry API to retrieve, modify, or delete registry data [2]. The structure of the registry The registry is divided into five sub-trees (known as hives) as shown in Table4 -2 and Figure 4-5. Worth noting is that the hives Hkey_Classes_Root, Hkey_Current_User, and Current_Config really point to other parts of the registry.... In PAGE 34: ...Root key Abbreviation Description Link HKey_Classes_Root HKCR Contains file associations and COM registration information HKLM\SOFTWARE\ Classes HKey_Current_User HKCU Points to the user profile of the currently logged on user Subkey under HKU corresponding to the currently logged on user HKey_Local_Machine HKLM Placeholder-contains other keys Not a link HKey_Users HKU Contains sub-keys for all loaded user profiles Not a link HKey_Current_Config HKCC Current hardware profile HKLM\SYSTEM\ CurrentControlSet\Hardware Profiles\Current Table4 -2 Listing the hives, description, and if it is a link or not Figure 4-5 The main parts of the Registry [25] As the system starts, the registry database is loaded into memory from three sources: (1) files stored on disk, (2) drivers for plug-and-play equipment, and (3) the NTDetect.com program [25].... In PAGE 34: ... NTDetect is used to find out what hardware is installed. Table4 -3, shows which parts of the registry that is stored in which file. Registry hive Supporting files HKEY_LOCAL_MACHINE\HARDWARE No files! Loaded from drivers and by NTDetect.... ..."

TABLE 2 EXPERIMENTAL DESIGN: SESSIONS Observability Session

in To Serve the Community or Oneself -- The Public Servant's Dilemma
by Abigail Barr, Magnus Lindelöw, Pieter Serneels

Table 1: Frequency Coverage By Band Band No. Frequency Range, GHz

in System Design Description
by Larry R. D’addario, Larry R. D’addario
"... In PAGE 3: ...2 Front End (FE) Assembly The required **frequency coverage (all atmospheric windows from 31.3 to 950 GHz) is achieved in 10 separate bands, as listed in Table1 . The band edge frequencies were chosen to provide good coverage of the windows while limiting the **edge frequency ratio for each band to lt; 1:35, considered the largest feasible value.... In PAGE 13: ....1.1.3 Frequency ranges and tuning resolution The flrst LO range for each band is immediately determined by the RF range ( Table1 ) and IF range (Table 2). At the RF band edges, it is acceptable to convert only to the IF band edges; and for the SIS bands (both 2SB and DSB cases) either sideband may be used to reach an RF band edge.... ..."

Table 5.3 Comparison of Simulation Results with and without Source Table Scenario 1 Scenario 2 Total Data Packets Dropped* 906 769

in Pro-Active Route Maintenance In DSR
by Liang Qin 2002
Cited by 8

Table 3-5 identifies each of the survey and/or analytical methods that may be used to provide the required information needed to resolve each of the decision statements. The possible limitations associated with each of these methods are also provided with the estimated cost.

in unknown title
by unknown authors 1996
"... In PAGE 32: ... 3.1 INFORMATION REQUIRED TO RESOLVE DECISION STATEMENTS Table3 -1 specifies the information (data) required to resolve each of the decision statements identified in Table 2-1 and identifies whether the data already exist. For the data that are identified as existing, the source references for the data have been provided, along with a qualitative assessment as to whether or not the data are of sufficient quality to resolve the corresponding decision statement.... In PAGE 32: ...n the evaluation of the corresponding quality control data (e.g., spikes, duplicates, and blanks), detection limits, data collection methods, etc. Table3 -1. Required Information and Reference Sources.... In PAGE 33: ...2 BASIS FOR SETTING THE ACTION LEVEL The action level is the threshold value that provides the criterion for choosing between alternative actions. Table3 -2 identifies the basis (e.g.... In PAGE 33: ... The numerical value for the action level is defined in DQO Step 5. Table3 -2. Basis for Setting Action Level.... In PAGE 33: ... TBD = to be determined 3.3 COMPUTATIONAL AND SURVEY/ANALYTICAL METHODS Table3 -3 identifies the decision statements where existing data either do not exist or are of insufficient quality to resolve the decision statements. For these decision statements, Table 3-3 presents computational and/or surveying/sampling methods that could be used to obtain the... In PAGE 34: ...Rev. 0 3-3 Table3 -3. Information Required to Resolve the Decision Statements.... In PAGE 34: ... b RCF analysis. HPGe = high-purity germanium NaI = sodium iodide RCF = Radiological Counting Facility Table3 -4 presents details on the computational methods identified in Table 3-3. These details include the source and/or author of the computational method and information on how the method could be applied to this study.... In PAGE 34: ... These details include the source and/or author of the computational method and information on how the method could be applied to this study. Table3 -4. Details on Identified Computational Methods.... In PAGE 35: ...Rev. 0 3-4 Table3 -5. Potentially Appropriate Survey/Analytical Methods.... In PAGE 35: ...) Access to fill material during and after removal High background levels Not a consideration in this evaluation Variance of radionuclides in the fill Soil sampling for HPGe analysis Radiological activity of the fill material Sampling and SFL laboratory analysis 2 Chemical COC concentrations in the fill material Sampling and SFL laboratory analysis Access to fill material during and after removal 3.4 ANALYTICAL PERFORMANCE REQUIREMENTS Table3 -6 defines the analytical performance requirements for the data that need to be collected to resolve each of the decision statements. These performance requirements include the PQL and precision and accuracy requirements for each of the COCs.... In PAGE 35: ... These performance requirements include the PQL and precision and accuracy requirements for each of the COCs. Table3 -6. Analytical Performance Requirements.... In PAGE 36: ...Rev. 0 3-5 Table3 -6. Analytical Performance Requirements.... ..."
Cited by 2

Table 5.4: Summary of partitionable membership service requirements.

in Using Group Communication to Support Inter-Vehicle Coordination
by Eoin O'Gorman

TABLE I Gate count after different design trajectories # of gates % gates

in VHDL and CDFG Based Transformational Design: a Case Study
by Peter Middelhoek Gerhard, Gerhard E. Mekenkamp, Bert E. Molenkamp, Thijs Krol

Table 1 Summary of different perspectives on user participation

in Citations (this article cites 19 articles hosted on the SAGE Journals Online and HighWire Press platforms):
by Gillian Symon, Chris Clegg, Downloaded From 2005
Next 10 →
Results 1 - 10 of 19,438
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University