### Table 3: Inference of Xr via OVPCA(displayed in transformed variable yX;r). Bayesian selection ARD Property

"... In PAGE 15: ...e exploited in the rapid evaluation of (77) as discussed in the second bullet point of Section 6.1. VB approximating posterior distributions for orthogonal parameters Ar (37) and Xr (38) are presented in transformed variables, yA and yX (78), respectively. Moments of the transformed distri- butions are displayed in Table 2 and Table3 , together with the projection of the original simulated values in each case. Again, we condition on the two cases of r used in Table 1.... ..."

### Table 2: Parallel Bayesian Inference in a Tree Network.

1998

"... In PAGE 5: ... variable, etc. The full psuedocode is given in Table2 . For any constant number of evidence variables, its runningtime is O(log n) with n processors.... ..."

Cited by 12

### TABLE III The inference results of fatigue Bayesian network model

2004

Cited by 5

### Table 1. Steps in Mixture Simulation and Conventional Bayesian Inference

"... In PAGE 3: ... Generate an observation, x2, from the posterior. Table1 lists the steps in the mixture simulation approach alongside major steps... ..."

### TABLE I UTTERANCE LEVEL BAYESIAN ADAPTIVE INFERENCE PERFORMANCE

### TABLE III INCREMENTAL BAYESIAN ADAPTIVE INFERENCE PERFORMANCE ON THE COMPLETE DATA SET

### Table 2. Comparative Prolog inference counts for implicational versions of formulae

### Table 5. Security margins

"... In PAGE 15: ... For example, if the minimal number of rounds needed for a candidate to be secure is measured as 10, and the actual number of rounds specified is 12, then the security margin is measured as 20 %. Table5 in the Appendix gives security margins for the candidates, using two measurement schemes (i.e.... In PAGE 31: ... The ROM column indicates the number of bytes needed for encryption only. Table5 provides the actual number of rounds, R, of a candidate for the 128 bit key size. The table also gives the minimum number of rounds needed for security as stated in Ref.... ..."

### Table 5. Security margins

"... In PAGE 6: ... For example, if the minimal number of rounds needed for a candidate to be secure is measured as 10, and the actual number of rounds specified is 12, then the security margin is measured as 20 %. Table5 in the Appendix gives security margins for the candidates, using two measurement schemes (i.e.... In PAGE 22: ... The ROM column indicates the number of bytes needed for encryption only. Table5 provides the actual number of rounds, R, of a candidate for the 128 bit key size. The table also gives the minimum number of rounds needed for security as stated in Ref.... ..."

### Table 2: Complexity results for propositional DDBs (with integrity clauses) Semantics Inference of literal Inference of formula 9 model

1993

Cited by 31