Help


[permalink] [id link]
+
Page "Schnorr group" ¶ 7
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Implementations and protocols
Implementations of the SIMPLE based protocols can be found in SIP Softphones and also in SIP Hardphones.
Implementations of connection-oriented protocols, such as the widely-used TCP protocol, generally watch for packet errors, losses, or delays ( see Quality of Service ) in order to adjust the transmit speed.
Implementations can use one or more of these protocols and, for example, might use a file-system mechanism to communicate data conforming to a defined interface specification between processes conforming to the SOA concept.
Implementations of FTAM and VT were included in ISODE, and implementations of X. 400 P7 ( PPMS ), TMN ( OSIMIS ) and other OSI protocols were also made atop ISODE.

Implementations and use
Implementations often have to use schemes such as phase-locked loops and self-calibration to reach the required timing accuracy.
Implementations were further hindered by the general tendency of the standard to be verbose, and the common practice of compromising by adopting the sum of all submitted proposals, which often created APIs that were incoherent and difficult to use, even if the individual proposals were perfectly reasonable.
Implementations vary on how the interception of the packets is done — for example, some use virtual devices, others take a slice out of the firewall, etc.
Implementations described as " general use " typically strive to optimize the,, and operations.
Implementations of Sallen – Key filters often use an operational amplifier configured as a voltage follower ; however, emitter or source followers are other common choices for the buffer amplifier.
Implementations of this approach use either a central repository, which describes each allocated block of memory, or fat pointers, which contain both the pointer and additional data, describing the region that they point to.
Implementations of C had to use four 9-bit bytes per word, since the ' malloc ' function in C assumes that the size of an int is some multiple of the size of a char ; the actual multiple is determined by the system-dependent compile-time operator sizeof.
Implementations of concurrent systems that use message passing can either have message passing as an integral part of the language, or as a series of library calls from the language.
Implementations of the Actor model are free to make use of threads and locks in any way that is compatible with the laws for Actors.

Implementations and groups
Implementations come from private companies or open source groups.
Implementations of the OMG specifications come from private companies or open source groups.

Implementations and by
Implementations have been written for various flavors of Unix / Linux, both by Novell and other vendors.
Implementations of Reduce are available on most variants of Unix, Linux, Microsoft Windows, or Apple Macintosh systems by using an underlying Portable Standard LISP or Codemist Standard LISP implementation.
* Specific Logical Frameworks and Implementations ( a list maintained by Frank Pfenning )
* An Analysis of the TACACS + Protocol and its Implementations from a security standpoint, by Openwall
* Robert Schreiber and Horst D. Simon, " Towards the Teraflops Capability for CFD ," in Parallel CFD — Implementations and Results Using Parallel Computers, edited by Horst D. Simon, Scientific and Engineering Computation Series, MIT Press, Cambridge, Mass., 1992, pp. 313 – 341.
Implementations include " Chapay " ( dating to 1999 ) at Pyva. net ; " Chapayev 3D " ( Чапаев 3D ) from Narod. ru ; " Shuffle ", " Shuffle Challenge " and " Shuffle Snakebites " by WildSnake Software and Shockwave. com ; the " Battle Checkers " iPhone game at iTunes. Apple. com.
* Implementations of IEEE 802. 1X suites often allow packet filtering rules to be installed explicitly by an AAA server based on dynamically learned information about clients, including the MAC address.

Implementations and other
Implementations that are presently supported include C-Kermit ( for Unix and OpenVMS ) and Kermit 95 ( for versions of Microsoft Windows from Windows 95 onwards and OS / 2 ), but other versions remain available as well.
A separate page lists both certified and non-certified OSGi Specification Implementations, which include OSGi frameworks and other OSGi specifications.
Implementations should disambiguate NTP time using a knowledge of the approximate time from other sources.
Implementations of the MTD ( f ) algorithm have been shown to be more efficient ( search fewer nodes ) in practice than other search algorithms ( e. g. Negascout ) in games such as chess, checkers, and Othello.

Implementations and are
Implementations almost invariably fall short when one or more facets of this prescription are ignored:
Implementations of real time CORBA are widely used in control systems in ships and aircraft.
Implementations of Deflate are freely available in many languages.
Implementations of generics in languages such as Java and C # are formally based on the notion of parametricity, due to John C. Reynolds.
Implementations of these two types of relaxation oscillators are shown here, but relaxation oscillators need not be electronic in general.
Implementations are currently available for Java SE, C / C ++, C # and Java ME.
Implementations under the Lean label are numerous and whether they are Lean and whether any success or failure can be laid at Lean's door is often debatable.
Implementations of STX are available in Java and Perl.
Software Implementations involve several professionals that are relatively new to the knowledge based economy such as Business Analysts, Technical Analysts, Solutions Architect, and Project Managers.
Implementations of Mobile WiMAX and first-release LTE are largely considered a stopgap solution that will offer a considerable boost until WiMAX 2 ( based on the 802. 16m spec ) and LTE Advanced are deployed.
Implementations of the API are available on many Unix-like POSIX-conformant operating systems such as FreeBSD, NetBSD, OpenBSD, GNU / Linux, Mac OS X and Solaris.
Implementations of algorithms such as AES and triple DES that are believed to be mathematically strong may be trivially breakable using power analysis attacks.
Implementations are available on the following platforms:
Implementations and deployments of SAML V2. 0 are in progress as of this writing ( March-2007 ).
Implementations for both Traditional and Simplified Chinese are available though the coding principle applies to both.
Implementations of Flavors are also available for Common Lisp.
Implementations that share the familiar Citadel user interface, but are not derived from the original Citadel code base, are also common.
Implementations of X. 500 and LDAPv3 have occurred world wide but are primarily located in major data centers with administrative policy boundaries regarding sharing of personal information.

0.196 seconds.