Amanote Research
Register
Sign In
Table 3: Limit of Agreement Between Nana vs NHANES Positioning Protocols.
doi 10.7717/peerj.3880/table-3
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
Unknown
Publisher
PeerJ
Related search
Figure 1: Nana Positioning Protocol (A, C) and NHANES Positioning Protocol (B, D).
Table 3: Clustering Performance vs Different Parameters.
Certificateless Authenticated Two-Party Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Modular Security Proofs for Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Table S1: Laboratory Protocols
On the Security of Authenticated Group Key Agreement Protocols
Scalable Computing
Computer Science
Extending Cryptographic Logics of Belief to Key Agreement Protocols
Table 2: Corpus of Protocols Analyzed.
Table 3: Inter-Annotator Agreement (Krippendorff’s Alpha) of Estimated Behavior Ratings Using Different Incorporation Methods.