• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 11,008
Next 10 →

Table 69. AT Commands for Compliance Testing

in unknown title
by unknown authors
"... In PAGE 92: ... Compliance testing commands and configuration information are provided. Some helpful commands for conducting compliance testing on the Si2456/33/14/03 are listed in Table69 . The modem register defaults configure the modem for FCC operation.... ..."

Table 2: Compliance Assessment Illustration

in Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems
by Annie I. Antón, Julia B. Earp 2001
"... In PAGE 9: ...The organization has existing policies that must be adhered to when developing the new system. The compliance assessment activity is demonstrated in Table2 , which follows the House of Quality (HoQ) [HC88] approach for documenting and analyzing large collections of requirements. The HoQ ensures that requirements reflect the enterprise policies, but requires the involvement of various stakeholders (customers, designers, marketing, etc.... ..."
Cited by 22

Table 7. Attributes for Functionality Compliance

in A Quality Model for the Ada Standard Container Library
by Xavier Franch, Jordi Marco 2003
"... In PAGE 7: ... Attributes for Security Attribute Definition Examples Concurrent access security Policies and mechanisms that ensure safe concurrent access to elements in the con- tainer Facilities for duplicating parts of the container; blocking dur- ing an iterator traversal Direct access by position security Policies and artifacts that ensure safe use of positions when accessing the container A position bound to an ele- ment is the same while it is in the container Iterator security Policies and artifacts that ensure safe use of iterators when accessing the container Read-only iterators may not be used in an odd manner 3.5 Functionality Compliance Table7 introduces the attributes for Functional Compliance. In general, the concept of compliance comes from two different sources.... ..."
Cited by 2

Table 6: Fixed-point Precision and Compliance Precision Compliance

in Source Code Optimization and Profiling of Energy Consumption in Embedded Systems
by Tajana Simunic, Luca Benini, Giovanni De Micheli, Mat Hans 2000
Cited by 15

Table 2: Compliance Assessment Illustration

in Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems
by Annie I. Antón, Julia B. Earp
"... In PAGE 9: ...The organization has existing policies that must be adhered to when developing the new system. The compliance assessment activity is demonstrated in Table2 , which follows the House of Quality (HoQ) [HC88] approach for documenting and analyzing large collections of requirements. The HoQ ensures that requirements reflect the enterprise policies, but requires the involvement of various stakeholders (customers, designers, marketing, etc.... ..."

Table 2: Freshest Revocation Information compliance with criteria

in On the Dissemination of Certificate Status Information
by Supervisor Prof, Chris Mitchell, Ioannis Iliadis Rhbnc, Ioannis Iliadis, Ioannis Iliadis
"... In PAGE 6: ...able 1: CRL compliance with criteria........................................................................................14 Table2 : Freshest Revocation Information compliance with criteria .... ..."

Table 5: Positive CSI compliance with criteria

in On the Dissemination of Certificate Status Information
by Supervisor Prof, Chris Mitchell, Ioannis Iliadis Rhbnc, Ioannis Iliadis, Ioannis Iliadis
"... In PAGE 6: ...able 4: Enhanced CRL Distribution Options compliance with criteria........................................17 Table5 : Positive CSI compliance with criteria.... ..."

Table 2: Compliance Estimation Using BHPS Sample

in Child Support Reform: Some Analysis of the 1999 White Paper*
by Gillian Paull Ifs
"... In PAGE 16: ...OLS regression was used to estimate the rate of compliance, conditional on paying something. The results are presented in Table2 . The Logit results that determine the probability of paying anything are rather imprecise with the exception that the Child Support liability is positively correlated with compliance.... ..."

Table 1: Summary of UC and TUC Compliance

in Notions of Upward Compatibility of Temporal Query Languages
by John Bair, Michael H. Böhlen, Christian S. Jensen, Richard T. Snodgrass
"... In PAGE 9: ...Table 1: Summary of UC and TUC Compliance Table1 gives an overview of our conclusions. The first three models are documented rather sparsely for our purposes, but their designers emphasize that they satisfy upward compatibility.... ..."

Table 1: Summary of UC and TUC Compliance

in Notions of Upward Compatibility of Temporal Query Languages
by John Bair, Author(s John Bair, Christian S. Jensen, Christian S. Jensen, Richard T. Snodgrass, Richard T. Snodgrass, Christian S. Jensen (codirector, Michael H. B Ohlen, Michael H. B Ohlen, Michael H. B Ohlen, Renato Busatto, Heidi Gregersen, Kristian Torp, Richard T. Snodgrass (codirector, Anindya Datta
"... In PAGE 9: ...Table 1: Summary of UC and TUC Compliance Table1 gives an overview of our conclusions. The first three models are documented rather sparsely for our purposes, but their designers emphasize that they satisfy upward compatibility.... ..."
Next 10 →
Results 11 - 20 of 11,008
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University