MAC Sample Clauses

MAC. The MAC shall be advisory to the BOR and shall function at the request of the BOR. The BOR may seek advice from the MAC in matters including, but not limited to:
AutoNDA by SimpleDocs
MAC. The Metropolitan Airports Commission, which owns and operates Minneapolis-St. Xxxx International Airport. Where this Agreement speaks of approval or consent by MAC or the commission, such approval or consent means action by MAC’s Executive Director or designated representative.
MAC. 5.2 License Fee for the PCOM DOCSIS 1.1 MAC.
MAC. The 802.11 PAR mentions that the MAC will be capable of operation in the 1-20 Mbit/s range. The 802.11 MAC will be reviewed for its capability to support rates up to about 10 Mbit/s targeted by the extended modulation methods. Data rate The data rates targeted by this project are at least 3 Mbit/s for FH PHY and at least 8 Mbit/s for DS PHY. Radio Spectrum Availability The proposed extensions will operate in the already allocated 2.4 GHz ISM band, in which 802.11 is already defined. IEEE P802.11 will correspond with regulatory bodies worldwide in order to try to assure that the proposed extension will be applicable geographically as widely as possible.
MAC. (i) is not subject to any obligation (contingent or otherwise) to repurchase or otherwise acquire or retire any of its capital stock; or (ii) has no liability for dividends or other distributions declared or accrued, but unpaid, with respect to any capital stock.
MAC. The 802.11 PAR mentions that the MAC will be capable of operation in the 1-20 Mbit/s range. The intent of the effort of this PAR is to examine rates beyond the 20 Mbit/s range. The 802.11 MAC will be reviewed for its capability to support such rates. In addition, the MAC will be reviewed to examine its capability to support the data, voice and image services intended in the rulemaking. The 802.11 MAC relies on a Clear Channel Assessment (CCA) mechanism in the Physical Layer for avoiding collisions with other transmissions. The CCA for the new Physical Layer will be developed to ensure fairness with respect to participating stations and ensure operation in presence of other types of radio devices operating in the environment, according to the spirit of the FCC rulemaking. The proposed PHY with 802.11 MAC will meet Quality of Service as detailed in 802.11 PAR.
MAC. If, prior to the Closing Date, any of the Projects is destroyed or damaged by fire or other casualty, Seller will promptly give the Purchasers notice thereof. If all or a Significant Portion of any Project is so destroyed or damaged, and any of (i) the cost to repair or restore such destruction or damage is not fully recoverable from applicable insurance (subject to any deductible under any such applicable insurance policy), (ii) the cost to repair or restore such destruction or damage exceeds 40% of such Project’s Allocated Asset Value, or (iii) such destruction or damage was caused by the intentional misconduct or gross negligence of the Applicable Owner or any agent, director, or employee of the Applicable Owner or any Manager (each circumstance described in clause (i), (ii) or (iii), a “MAC”), the Purchasers will have the option to terminate this Agreement as to such Project and its Applicable Owner upon notice to Seller given not later than fifteen (15) days after receipt of Seller’s notice. In the event of the termination of this Agreement as to a Project and its Applicable Owner pursuant to this Section 8.1(a), the Purchase Price shall be reduced by the Allocated Asset Value of such Project.
AutoNDA by SimpleDocs
MAC. MAC is reserved for manufacturers to recognize production time and category of products.
MAC. We recall that the IEEE 802.15.4 communication technology requires the exchange of packets having a maximum size of 127 bytes. Thus, when the protocol requires larger informa- tion to be exchanged within communicating nodes, message fragmentation is required. As a powerful feature, the CC2538 within the OpenMote-b includes a crypto-processor, able to execute atomic big number modular and Elliptic Curve Cryptography (ECC) operations, using hardware accelerators. We implemented software rou- tines that efficiently combine and orchestrate these atomic operations to provide advanced cryptographic operations, such as the one required by LiKe and competing approaches. As for the cryptographic curves used in our experimental evaluation, we have used the elliptic curves secp160r1, secp192r1, and secp256r1. These curves are publicly recognized as secure by the scientific community, and they all achieve a security level equal or higher than the minimum acceptable security level assumed for an ECC curve, fixed at 80 bits [12]. As a strengthening feature, the CC2538 crypto-processor also pro- vides enhanced protection against physical-layer timing-based attacks against ECC operations, implementing via hardware the Xxxxxxxxxx Ladder technique, widely recognized as a valid technique to defeat side-channel attacks. As for the supporting cryptographic operations, we used the HMAC-SHA hardware function provided by the CC2538 as the hashing function, while the well-known P1363 KDF has been used to translate a string into a key of a given length [47]. To evaluate the time duration of any hardware/software operation, we used the built-in 32 MHz clock provided by the CC2538 SoC, recording the starting and ending time of the operations via dedicated software instructions. As for the energy consumption, we used an oscilloscope Keysight InfiniVision DSOX2012A, equipped with two input channels a resolution bandwidth of 100 MHz, by sampling the voltage drop to the terminals of a 1Ω probe resistor, bridging the pins in series with the CC2538 chipset. The oscilloscope has been set with a vertical resolution of 8 bits, a vertical range of 50 mV/div, and a horizontal range of 1 ms/div. Figure 5 shows our experimental testbed.
Time is Money Join Law Insider Premium to draft better contracts faster.