• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 18,474
Next 10 →

Table 1: Predicate exists restriction and Role-forming predicate exists restriction

in Adapting Optimization Techniques to Description Logics with Concrete Domains
by Anni-yasmin Turhan, Volker Haarslev

Table 7. Ex-post prediction analysis ( forecasts are based on the restricted reduced form interest rate

in Domestic and External Factors in Interest Rate Determination
by Guglielmo Maria Caporale, Nikitas Pittis 1997
"... In PAGE 5: ...740 Sample period 73:3 93:3 73:3 93:3 68:3 93:3 Li/Ly is a semi-elasticity. the structural parameters of the model (see Table 6) and also to conduct a forecasting exercise (see Table7 ). It can be seen from Table 6 that, in the case of the US, the parameter d in the policy reaction function is positive, which implies that, in the US, monetary authorities increase the money supply in the presence of higher expected in ation, whereas the opposite is true in the case of Germany, where the Bundes- bank appears to pursue a counter-in ationary policy.... ..."
Cited by 2

Table 6: Estimated elasticities of a translog production function, equation 13, with restricted and unrestricted data in corrected and uncorrected form for 1989. unrestricted restricted

in Production Functions and Efficiency Analysis of the Siberian Forest Industry: An Enterprise Survey 1989 and 1992
by Michael Obersteiner, Sten Nilsson

Table 1: concept forming operators The syntax of the language restricts the way concept forming operators can be used in Grail statements. The which and whichG statements are the only general mechanism for forming concept expressions. Apart from their 2

in unknown title
by unknown authors 1996
Cited by 1

Table 1. Initial ideals of restricted ideals of the generic ideal generated by a quadratic and a cubic form

in Gröbner Bases and Normal Forms in a Subring of the Power Series Ring on Countably Many Variables
by Jan Snellman
"... In PAGE 13: ... We tabulate the rst of these initial ideals in Table 1. The author has proved (Snellman, 1998), that, for all locally nitely generated ideals J, the relation limn!1 gr( n (J)) = gr(J) holds, in the following sense: 8d : 9N(d) : n gt; N(d) =) gr(J) d = gr? n (J) R0 d: So the initial ideals of all restricted ideals determine gr(J); the converse, on the other hand, does not hold in general: studying Table1 , we see that gr( 2 (I)) has the minimal monomial generator x4 2; this \tail quot;, which may be regarded as an e ect of the truncation to two variables (the corresponding generator of the same degree for gr(I) is x1x2x2 3) is impossible to detect from the study of gr(I) alone. B.... ..."

Table 1: GRAIL statements and equivalent abstract forms The GRAIL which statement provides a very re- stricted mechanism for forming concept terms, limited to a base concept conjoined to an arbitrary number of existentially quanti ed restrictions. GRAIL apos;s power lies in providing axiom schemas for a restricted form of general concept inclusion and in providing an operator which allows the de nition of transitively closed roles and the interaction of transitive roles with other roles. The keyword K, in the newAttribute statement also allows roles to be declared functional (single valued). 1`Concept apos; and `type apos; are used synonymously in this paper.

in Experience building a Large, Re-usable Medical Ontology using a Description Logic with Transitivity and Concept Inclusions
by Alan L. Rector, Ian R. Horrocks 1997
Cited by 32

Table 3. We call such a partition a pattern of synchrony of the cells. Each of these five patterns of synchrony leads to a system of restricted ODEs. For example, if we take the partition {1, 3}{2, 4}, {5} and the corresponding subspace {x, y, x, y, z}, then the restricted equations take the form:

in Nonlinear dynamics of networks: the groupoid formalism
by Martin Golubitsky, Ian Stewart 2006
"... In PAGE 21: ...325 partition polysynchronous subspace {1, 2, 3, 4, 5} {x, x, x, x, x} {1, 2, 3, 4}, {5} {x, x, x, x, y} {1, 3, 5}, {2, 4} {x, y, x, y, x} {1, 3}, {2, 4, 5} {x, y, x, y, y} {1, 3}, {2, 4}, {5} {x, y, x, y, z} Table3 . Synchrony patterns for Figure 16.... ..."
Cited by 8

Table 2: Static Interface Restrictions System Interface Restriction

in Death, Taxes, and Imperfect Software: Surviving the Inevitable
by Crispin Cowan, Calton Pu, Heather Hinton 1998
"... In PAGE 6: ....1.1 Static Interface Restrictions Here we describe several forms of static interface restriction:file system access controls, firewalls, wrappers, and the Java security model. Table2 summarizes these interface restrictions, describing the interface affected, and how it is restricted, which we detail here. There are many forms of file system access controls, e.... ..."
Cited by 2

Table 2: Static Interface Restrictions

in Death, Taxes, and Imperfect Software: Surviving the Inevitable
by Crispin Cowan, Calton Pu, Heather Hinton 1998
"... In PAGE 6: ....1.1 Static Interface Restrictions Here we describe several forms of static interface restriction:file system access controls, firewalls, wrappers, and the Java security model. Table2 summarizes these interface restrictions, describing the interface affected, and how it is restricted, which we detail here. There are many forms of file system access controls, e.... ..."
Cited by 2

Table 3. Relevant matrix dimensions for various restrictions of the cointegrating space.

in Testing General Restrictions on the Cointegrating Space
by Jurgen A. Doornik, A. Doornik 1995
"... In PAGE 4: ...Table 2 gives the number of restrictions involved in the hypotheses considered by Johansen and Juselius. The relevant dimensions are given in Table3 . It is clear that restrictions on of the form B keep the identification burden fully on (it does not restrict the A matrix in any way).... ..."
Cited by 4
Next 10 →
Results 1 - 10 of 18,474
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University