Results 1 - 10
of
18,474
Table 1: Predicate exists restriction and Role-forming predicate exists restriction
Table 7. Ex-post prediction analysis ( forecasts are based on the restricted reduced form interest rate
1997
"... In PAGE 5: ...740 Sample period 73:3 93:3 73:3 93:3 68:3 93:3 Li/Ly is a semi-elasticity. the structural parameters of the model (see Table 6) and also to conduct a forecasting exercise (see Table7 ). It can be seen from Table 6 that, in the case of the US, the parameter d in the policy reaction function is positive, which implies that, in the US, monetary authorities increase the money supply in the presence of higher expected in ation, whereas the opposite is true in the case of Germany, where the Bundes- bank appears to pursue a counter-in ationary policy.... ..."
Cited by 2
Table 6: Estimated elasticities of a translog production function, equation 13, with restricted and unrestricted data in corrected and uncorrected form for 1989. unrestricted restricted
Table 1: concept forming operators The syntax of the language restricts the way concept forming operators can be used in Grail statements. The which and whichG statements are the only general mechanism for forming concept expressions. Apart from their 2
1996
Cited by 1
Table 1. Initial ideals of restricted ideals of the generic ideal generated by a quadratic and a cubic form
in Gröbner Bases and Normal Forms in a Subring of the Power Series Ring on Countably Many Variables
"... In PAGE 13: ... We tabulate the rst of these initial ideals in Table 1. The author has proved (Snellman, 1998), that, for all locally nitely generated ideals J, the relation limn!1 gr( n (J)) = gr(J) holds, in the following sense: 8d : 9N(d) : n gt; N(d) =) gr(J) d = gr? n (J) R0 d: So the initial ideals of all restricted ideals determine gr(J); the converse, on the other hand, does not hold in general: studying Table1 , we see that gr( 2 (I)) has the minimal monomial generator x4 2; this \tail quot;, which may be regarded as an e ect of the truncation to two variables (the corresponding generator of the same degree for gr(I) is x1x2x2 3) is impossible to detect from the study of gr(I) alone. B.... ..."
Table 1: GRAIL statements and equivalent abstract forms The GRAIL which statement provides a very re- stricted mechanism for forming concept terms, limited to a base concept conjoined to an arbitrary number of existentially quanti ed restrictions. GRAIL apos;s power lies in providing axiom schemas for a restricted form of general concept inclusion and in providing an operator which allows the de nition of transitively closed roles and the interaction of transitive roles with other roles. The keyword K, in the newAttribute statement also allows roles to be declared functional (single valued). 1`Concept apos; and `type apos; are used synonymously in this paper.
1997
Cited by 32
Table 3. We call such a partition a pattern of synchrony of the cells. Each of these five patterns of synchrony leads to a system of restricted ODEs. For example, if we take the partition {1, 3}{2, 4}, {5} and the corresponding subspace {x, y, x, y, z}, then the restricted equations take the form:
2006
"... In PAGE 21: ...325 partition polysynchronous subspace {1, 2, 3, 4, 5} {x, x, x, x, x} {1, 2, 3, 4}, {5} {x, x, x, x, y} {1, 3, 5}, {2, 4} {x, y, x, y, x} {1, 3}, {2, 4, 5} {x, y, x, y, y} {1, 3}, {2, 4}, {5} {x, y, x, y, z} Table3 . Synchrony patterns for Figure 16.... ..."
Cited by 8
Table 2: Static Interface Restrictions System Interface Restriction
1998
"... In PAGE 6: ....1.1 Static Interface Restrictions Here we describe several forms of static interface restriction:file system access controls, firewalls, wrappers, and the Java security model. Table2 summarizes these interface restrictions, describing the interface affected, and how it is restricted, which we detail here. There are many forms of file system access controls, e.... ..."
Cited by 2
Table 2: Static Interface Restrictions
1998
"... In PAGE 6: ....1.1 Static Interface Restrictions Here we describe several forms of static interface restriction:file system access controls, firewalls, wrappers, and the Java security model. Table2 summarizes these interface restrictions, describing the interface affected, and how it is restricted, which we detail here. There are many forms of file system access controls, e.... ..."
Cited by 2
Table 3. Relevant matrix dimensions for various restrictions of the cointegrating space.
1995
"... In PAGE 4: ...Table 2 gives the number of restrictions involved in the hypotheses considered by Johansen and Juselius. The relevant dimensions are given in Table3 . It is clear that restrictions on of the form B keep the identification burden fully on (it does not restrict the A matrix in any way).... ..."
Cited by 4
Results 1 - 10
of
18,474