• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 46,205
Next 10 →

Table 1 Comparison of Computation Efficiency

in Batch Verification of Validity of Bids in
by Homomorphic Auction Kun, Kun Peng, Colin Boyd
"... In PAGE 14: ...2 Efficiency Analysis Suppose an inverse with modulus has the same cost of an exponentiation with the same modulus and e, the RSA public key in the oblivious transfer, is a small integer. In Table1 , the cost of bid validity check with normal method and batch solution respectively are compared. An example is given in the table for this comparison, where w = 1024, |N| = |q| = 1024 and L = 20.... ..."

Table 2 Computational efficiency comparison

in An Efficient Hybrid Genetic Algorithm for Structural Form and Element Sizing Design Optimization of Tall Steel Frameworks
by C. -m. Chan, K. -m. Wong 2005
"... In PAGE 9: ...A alone. Over the entire 100 generations set for the OC-GA, rapid and smooth convergence is found in all the three OC-GA runs. If a more reasonable termination criterion were to be adopted such that the same best-fit design is maintained for 10 consecutive generations, the hybrid OC-GA could have been stopped a lot earlier. As shown in Table2 , the hybrid OC-GA could be, on average, stopped after 53th generation in approximately 6.6 hours of computational time, resulting in only about 86% of the time required for the 100 GA generations.... ..."

Table 1. Computational Efficiency Comparison.

in A Minimalist Hardware Architecture For Using Commercial Microcontrollers In Space
by D. W. Caldwell, D. A. Rennels 1997
Cited by 6

Table 2: Computation efficiency of COTA.

in Defending against wormhole attacks in mobile ad hoc networks
by Weichao Wang, Bharat Bhargava, Yi Lu, Xiaoxin Wu 2002
Cited by 2

Table 2. Computational Efficiencies of the Algorithms

in Phase Unwrapping Algorithms for Radar Interferometry: Residue-Cut, LeastSquares, and Synthesis Algorithms
by Yanping Lu, Howard A. Zebker, Howard A. Zebker

Table 1. Computational Efficiency Comparison.

in A MINIMALIST HARDWARE ARCHITECTURE FOR USING COMMERCIAL MICROCONTROLLERS IN SPACE
by unknown authors

Table 3: Checkpoint duration in seconds (system-level versus user-defined checkpointing).

in System-Level versus User-Defined Checkpointing
by Luis Moura Silva, João Gabriel Silva, System-level Versus User-defined Checkpointing
"... In PAGE 4: ... This result is due to three main reasons: (i) in UDC it is only necessary to perform a centralized checkpoint of the master process: the slave processes do not need to be checkpointed; (ii) the size of the checkpoint is negligible; (iii) the checkpoint operation is taken by an additional thread at the master processor and this operation does not disturb the normal execution of the computation. Table3 presents a comparison in the checkpoint duration. The first column represents the checkpoint duration of the system-level checkpointing scheme, while the second column represents the user-defined checkpointing mechanism.... ..."

Table 7 (continued) Measures of Individual Firm Efficiency

in Incorporating Monotonicity and Concavity Restrictions into Stochastic Cost Frontiers
by Dek Terrell, Imad Dashti, Jel Codes C
"... In PAGE 28: ... Table7 (continued) Measures of Individual Firm Efficiency Firm number Posterior Mean .025 percentile .... ..."

Table 6. DTP efficiency by varying proportional distribution of patients at different compliance levels amp; case-finding efficiency

in unknown title
by unknown authors
"... In PAGE 15: ... For example, the DTP efficiency of SR would then increase from 16.4% at the current rates (shown in column 2 of Table6 ) to 24.2%, when all the cases comply at level 4 (column 8, Table 6) with CF efficiency remaining at 33%.... In PAGE 15: ...4% at the current rates (shown in column 2 of Table 6) to 24.2%, when all the cases comply at level 4 (column 8, Table6 ) with CF efficiency remaining at 33%. The DTP efficiency would be three times the above figure (49.... In PAGE 15: ...7% for the current compliance structure and 73.3% when all the cases comply at level 4) if the CF efficiency is 100% (last row of Table6 , Part a). ... In PAGE 16: ...respective sputum conversion rates for compliance structure given in columns 2 to 8 given in Appendix Table.; ** Structure of compliance:-please see Appendix Table with SCC is calculated, except that improvement with SCC over SR, when rates of compliance are increased to 100% at level 4, increases only from 24% to 29% at CF efficiency of 33% (row 1 of Table6 Part b). The DTP efficiency at 100% CF efficiency improves to nearly three times (78.... In PAGE 16: ... The DTP efficiency at 100% CF efficiency improves to nearly three times (78.9%) the value attainable for CF efficiency at 33%, at the current rates of compliance (column 2, last rowof Table6 b). Compliance, regimen mixes, CF efficiency and DTP efficiency Another factor that could be studied through the model is the effect of varying the mixes of relative proportions of cases on SR and SCC.... ..."

Table 2 Intermittently monitored parameters

in mining
by Andrew Kusiak A, Christopher A. Caldarone B, Michael D. Kelleher C, Fred S. Lamb D, Thomas J. Persoon E, Alex Burns A 2004
"... In PAGE 4: ...The intermittently monitored parameters consisted of laboratory data and physiologic parameters ob- served at the bedside by nurses. These parameters were obtained retrospectively from nursing assessment records (flow sheets) and were added to the database (see Table2 ). These parameters were collected as the parameter values were changed and updated; there was no regular data collection interval.... In PAGE 17: ...4%, that were collected had the value of wellness score of 3.5 or higher (see Table2 0). The occurrences of wellness score values 0 through 3 was small and therefore difficult to predict accurately.... ..."
Next 10 →
Results 11 - 20 of 46,205
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University