• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 22,290
Next 10 →

Table 4: Highest Success Rates for the Three Encodings Relative to Target Categories

in Data-oriented Acquisition of Stress 2 Acknowledgements
by Walter Daelemans, Steven Gillis, Gert Durieux, We Thank G. De Schutter, A. Dirksen, P. Gupta, B. Macwhinney, M. Van Oostendorp
"... In PAGE 38: ... A second piece of evidence comes from an analysis of the performance of the classifier with regard to the specific target categories. In Table4 the peak success scores for the individual target categories are displayed.11 Table 4: Highest Success Rates for the Three Encodings Relative to Target Categories... ..."

Table 8 Premise triples along with the target categories for the items of Experiment 4

in Feature Centrality And Property Induction
by Constantinos Hadjichristidis, Steven Sloman, Rosemary Stevenson, David Over
"... In PAGE 18: ... The difference between similarity conditions was the category term in the premise of the argument. Table8 presents the 24 cat- egories used and Table 9 a sample item from each Similarity by Centrality condition. Like in Experiments 1 and 2, relative centrality was defined by manipulating the number of properties depending on a feature.... ..."

Table 1: Distribution of cancer targets for Category I genetic tests

in unknown title
by unknown authors 2006
"... In PAGE 18: ... Database III provides a listing of genetic tests in development for cancer as identified by both LexisNexis and CHI resources. Table1 below demonstrates the distribution of cancer indications for all genetic tests found using LexisNexis and CHI databases. The 10 most deadly cancers in the U.... ..."

Table 1. Responses to newsgroup postings by target group. Hits signifies the percentage of responses that fell into the targeted category.

in Targeting Audiences
by On The Internet

Table 1). Two other category-target conditions were included in

in Does word identification proceed from spelling to sound to meaning
by Debra Jared, Mark S. Seidenberg 1991
Cited by 9

Table 5: Instances of the proposed categories in the four target systems.

in Exceptions and Aspects: The Devil is in the Details
by Fernando Castor, Filho Nelio, Cacho Raquel, Maranhão Eduardo Figueiredo, Alessandro Garcia, Cecília Mary, F. Rubira
"... In PAGE 8: ... However, the same does not apply to termination handlers. Table5 shows the number of instances of each category in the four target systems. Using the proposed classifica- tion, it is possible to describe several interesting scenarios.... ..."

Table 2 Mean Response Times for Typical and Atypical Targets in Different Categories and Overall

in Mental Representation of Immoral Events: The Effect of Event Typicality on Judgment Time
by Karl Ask, Niklas Fransson

Table 2: Target output patterns for the 5 color categories.

in Content and Cluster Analysis: Assessing Representational Similarity in Neural Systems
by Aarre Laakso And, Aarre Laakso, Garrison Cottrell 2000
"... In PAGE 20: ... The data had approximately the same numbers of patterns for each color for a total of 627 patterns. To make network training possible, we replaced the Munsell labels with the binary suffixes shown in Table2 to serve as output patterns over 5 units.... ..."
Cited by 7

Table 1: A summary of system call categories and their corresponding access permission. Categories Target Resources Access Permission

in VMM-based Process Shepherding
by Haibo Chen, Pengcheng Liu, Rong Chen, Binyu Zang, Haibo Chen, Pengcheng Liu, Rong Chen, Binyu Zang 2007
"... In PAGE 9: ... In current implementation, Shepherd prohibits speciflc accesses to several categories of system resources for wild processes. Table1 gives a rough description on the resources and its access types that wild processes are prevented from accessing. Table 1: A summary of system call categories and their corresponding access permission.... In PAGE 9: ...As shown in Table1 , Shepherd prevents write accesses to system conflguration flles, devices flles (except for some pseudo devices such as /dev/null and tty). Also, Shepherd disallows a monitored process from communicating with other processes outside the monitoring group.... ..."

Table 3: The number of CSA records collected to create the target list for each of the nine CoRR categories, and the number of words in the resulting target list.

in Using Word Position in Documents for Topic Characterization
by Reem K. Al-Halimi, Frank W. Tompa
"... In PAGE 17: ... shown in Figure 2 we collected a total of 18; 700 CSA records, each satisfying the CSA equivalent of at least one CoRR category. Table3 shows the exact number of records collected for each of the nine CoRR categories. We then extracted the identiflers used in the identifler flelds of all CSA records in each category.... ..."
Next 10 →
Results 1 - 10 of 22,290
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University