Results 11 - 20
of
11,008
Table 69. AT Commands for Compliance Testing
"... In PAGE 92: ... Compliance testing commands and configuration information are provided. Some helpful commands for conducting compliance testing on the Si2456/33/14/03 are listed in Table69 . The modem register defaults configure the modem for FCC operation.... ..."
Table 2: Compliance Assessment Illustration
2001
"... In PAGE 9: ...The organization has existing policies that must be adhered to when developing the new system. The compliance assessment activity is demonstrated in Table2 , which follows the House of Quality (HoQ) [HC88] approach for documenting and analyzing large collections of requirements. The HoQ ensures that requirements reflect the enterprise policies, but requires the involvement of various stakeholders (customers, designers, marketing, etc.... ..."
Cited by 22
Table 7. Attributes for Functionality Compliance
2003
"... In PAGE 7: ... Attributes for Security Attribute Definition Examples Concurrent access security Policies and mechanisms that ensure safe concurrent access to elements in the con- tainer Facilities for duplicating parts of the container; blocking dur- ing an iterator traversal Direct access by position security Policies and artifacts that ensure safe use of positions when accessing the container A position bound to an ele- ment is the same while it is in the container Iterator security Policies and artifacts that ensure safe use of iterators when accessing the container Read-only iterators may not be used in an odd manner 3.5 Functionality Compliance Table7 introduces the attributes for Functional Compliance. In general, the concept of compliance comes from two different sources.... ..."
Cited by 2
Table 6: Fixed-point Precision and Compliance Precision Compliance
2000
Cited by 15
Table 2: Compliance Assessment Illustration
"... In PAGE 9: ...The organization has existing policies that must be adhered to when developing the new system. The compliance assessment activity is demonstrated in Table2 , which follows the House of Quality (HoQ) [HC88] approach for documenting and analyzing large collections of requirements. The HoQ ensures that requirements reflect the enterprise policies, but requires the involvement of various stakeholders (customers, designers, marketing, etc.... ..."
Table 2: Freshest Revocation Information compliance with criteria
"... In PAGE 6: ...able 1: CRL compliance with criteria........................................................................................14 Table2 : Freshest Revocation Information compliance with criteria .... ..."
Table 5: Positive CSI compliance with criteria
"... In PAGE 6: ...able 4: Enhanced CRL Distribution Options compliance with criteria........................................17 Table5 : Positive CSI compliance with criteria.... ..."
Table 2: Compliance Estimation Using BHPS Sample
"... In PAGE 16: ...OLS regression was used to estimate the rate of compliance, conditional on paying something. The results are presented in Table2 . The Logit results that determine the probability of paying anything are rather imprecise with the exception that the Child Support liability is positively correlated with compliance.... ..."
Table 1: Summary of UC and TUC Compliance
"... In PAGE 9: ...Table 1: Summary of UC and TUC Compliance Table1 gives an overview of our conclusions. The first three models are documented rather sparsely for our purposes, but their designers emphasize that they satisfy upward compatibility.... ..."
Table 1: Summary of UC and TUC Compliance
"... In PAGE 9: ...Table 1: Summary of UC and TUC Compliance Table1 gives an overview of our conclusions. The first three models are documented rather sparsely for our purposes, but their designers emphasize that they satisfy upward compatibility.... ..."
Results 11 - 20
of
11,008