• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 9,272
Next 10 →

Tables and Formulae, 30th ed., CRC Press, Boca Raton, 1996. [28] K.F. Chan, D.Y. Yeung, Elastic structural matching for on-line handwritten alphanumeric character recognition, in Proceedings of the 14th International Conference on Pattern Recognition, Brisbane, Australia, 1998, pp.

in An Efficient Syntactic Approach to Structural Analysis of On-line Handwritten Mathematical Expressions
by Kam-Fai Chan, Dit-Yan Yeung

Table 7-10:

in Task Loading Model ITLM)
by Nationalaeronautics, Moffett Reid, Lowell Staveland 1994
"... In PAGE 60: ...Table7 -20showssignificantcorrelationsonlybetweenthevisualdimensionandrt andbetween thevisualdimensionandvisualworkloadreport.Theseshowedfor algorithms1,2, 5, and6, with algorithm6 recordingthehighestcorrelationsagain.... ..."

Table 2.4: Forecast arthritis health costs, 2010, $m

in unknown title
by unknown authors 2005

Table 1. A comparison of Enterprise Grid and Web 2.0 aproaches.

in Introduction Cyberinfrastructure and Web 2.0
by Marlon E. Pierce, Geoffrey Fox A, Huapeng Yuan A, Yu Deng A
"... In PAGE 1: ... We compare Web 2.0 with Enterprise-style cyberinfrastructure aplications in the Table1 . This table wil also ... In PAGE 2: ...As sumarized in Table1 , there is a paralel betwen conventional cyberinfrastructure (Web Services, science portals, virtual organizations), and Web 2.0 (REST services, rich internet aplications, online comunities).... In PAGE 16: ...0 technologies with an atempt to show how they can be used and combined with Cyberinfrastructure and e-Science. As the term e-Science implies, much work on cyberinfrastructure has focused on Enterprise-style aplications that we surveyed in column 2 of Table1 . The Enterprise aproach may be roughly characterized as requiring specialized programing and development expertise with particular tols (such as the Globus tolkit or the OGSA-DAI database services) and places an emphasis on sophistication (such as complicated ... ..."

Table 1. Primitive BinX data types.

in Binx - a tool for retrieving, searching and transforming structured binary files
by Rob Baxter, Robert Carroll, Denise J. Ecklund, Bob Gibbins, Davy Virdee, Ted Wen 2003
"... In PAGE 3: ...1 Data Types BinX supports a broad range of primitive data types, particularly those that are important for e- Science applications. Table1 summarises currently supported BinX data types. The underlying physical representation of each primitive data type must be described.... ..."
Cited by 3

Table 2. Experiment results

in Service Provisioning for HLA-based Distributed Simulation on the Grid
by Yong Xie Yong, Yong Meng Teo, Wentong Cai, Stephen John Turner
"... In PAGE 7: ... For example, in the e-Science cluster at Birming- ham University, each node has 2 GBytes of memory and 2 Intel Xeon 3GHz processors, with Red Hat Enterprise Linux (RHEL) system version AS 3 as the operating system. The experimental results are shown in Table2 . The clus- ter version of the latency benchmark shows that our pro- totype incurs about 40 millisecond of overhead in a clus- ter, and this is mainly due to the use of Globus, the encod- ing/decoding of parameters/result, and the communication cost.... ..."

Table 3: Similar Challenges Between Data Provenance and Software Traceability.................................................19

in Establishing the Connection Between Software Traceability and Data Provenance
by Hazeline Asuncion, Richard N. Taylor 2007
"... In PAGE 19: ...2 Similar Challenges Many of the manifestations of the software traceability problem parallel the problems in e- Science. In fact, the problems in e-Science can also be classified into the three perspectives we mentioned: economic, technical, and social (see Table3 ). ... In PAGE 20: ... 19 of 51 Table3 : Similar Challenges Between Data Provenance and Software Traceability 5.3 Similar Requirements Although there are different uses for provenance across the different fields in science, the basic requirements of recording, querying, and processing provenance information are applicable across science [84].... ..."

Table 2: E-Learning Budget 2006 - 2010

in unknown title
by unknown authors 2005
"... In PAGE 40: ... The number of full- and part-time students enrolled in the Faculty was divided by the FTE instructional design to arrive at the students per FTE ID ratio (see Figure 6). Table2 shows the ratios from which the graphs have been derived. Table 2: Faculty FTE Ratios students/ FTE tech faculty/ FTE tech students/ FTE ID faculty/ FTE ID AFHE 436 25 3484 200 Arts 2710 140 5420 280 Augustana 4000 27 0 0 Business 1153 36 2306 71 Education 4049 117 2025 59 Extension 812 3 1625 7 Law 268 16 536 31 Nursing 653 24 1306 47 Rehabilitation Medicine 561 31 0 0 Saint-Jean 585 24 0 0 Science 600 27 1029 47 Note: Several Faculties were unable to compile information about their internal e- learning support in time for this report (i.... In PAGE 40: ... Table 2 shows the ratios from which the graphs have been derived. Table2 : Faculty FTE Ratios students/ FTE tech faculty/ FTE tech students/ FTE ID faculty/ FTE ID AFHE 436 25 3484 200 Arts 2710 140 5420 280 Augustana 4000 27 0 0 Business 1153 36 2306 71 Education 4049 117 2025 59 Extension 812 3 1625 7 Law 268 16 536 31 Nursing 653 24 1306 47 Rehabilitation Medicine 561 31 0 0 Saint-Jean 585 24 0 0 Science 600 27 1029 47 Note: Several Faculties were unable to compile information about their internal e- learning support in time for this report (i.e.... In PAGE 68: ... If an agreement requires the disclosure of all IP related to course materials that is to be freely shared or licensed, this could require a significant and ongoing ( gt;$100K) investment on an ongoing basis. Summary and Conclusion Table2 summarizes the responsible units, the timing, and the costs of the various strategies identified for the 17 recommendations. It is clear that the recommendations require a mixture of immediate action and long-range planning.... ..."

Table 7.10 shows the performance figures.

in The Computational Processing of Intonational Prominence: A Functional Prosody Perspective
by Christine Hisayo Nakatani 1997
Cited by 12

Table 7.10: Frame Format.

in The Reliable Router: An Architecture for Fault Tolerant Interconnect
by J. Dally, Larry Dennison, Larry R. Dennison 1996
Cited by 1
Next 10 →
Results 11 - 20 of 9,272
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University