• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 78,573
Next 10 →

Table 1-2. Insured Disaster Losses in Canada, 1984-1998

in unknown title
by unknown authors
"... In PAGE 2: ...ecent Developments in Climate Change............................................................................. 8 Table1 -1 .... In PAGE 13: ... Tornado events in the prairies, particularly in central Alberta, southern Ontario and near the Ontario/Quebec border are likely to increase. Table1 -1, summarizes some of the key projections of the climate models and observed... In PAGE 16: ... However, with the above analysis of trends and their own analyses, many spokespersons of the insurance industry are convinced that increases in frequency of extreme climate events is a contributing factor. The data shown in Table1 -2 and Figure 3 are neither comprehensive nor complete, but they serve to show the dramatic increase in some of the recent losses associated with extreme weather-related events in Canada. It must be recognized that most flood and drought losses are not insured commercially in Canada.... ..."

Tables, Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, ACM Press, Montreal, Canada, pp. 1-12. 9. Wijsen, J., and Meersmen, R., 1998, On the Complexity of Mining Quantitative Association Rules, Data Mining and Knowledge Discovery, Vol. 2, No. 3, pp. 263-281.

in 1. Personalized Network Marketing
by unknown authors

Table 2-4: Examples of dialectal variations

in Porting the Galaxy System to Mandarin Chinese
by Stephanie Seneff, Chao Wang, Chao Wang
"... In PAGE 23: ...5 8.0 Table2 -1: Summary of the corpus 2.2 The Summit Speech Recognition System The recognition system is con gured from the summit probabilistic, segment-based, speaker-independent, continuous-speech recognition system [13, 36, 37].... In PAGE 27: ..... Table2 -2: Chinese vocabulary for weekday names 2.3 Issues in Mandarin Speech Recognition The Chinese language has many distinctive characteristics which need to be addressed speci cally for speech recognition.... In PAGE 27: ...fter the word week (with some variations for the word \Sunday quot;), i.e., \week one quot;, \week two quot;, etc. for \Monday quot;, \Tuesday quot;, as shown in Table2 -2. So a total of about 22 words are needed to cover the names for all the days in a week.... In PAGE 29: ... In practice, the phoneme set is adjusted iteratively during the training process, based on performance in seg- mentation and recognition. Refer to Table2 -3 for our nal choice of model set with example occurrences. There are 23 initials/consonants and 30 nals/vowels in our model set, which are used to specify the pronunciations.... In PAGE 30: ...EXAMPLE SYMBOL EXAMPLE a ba1 ay bai3 aw bao4 e de2 ee western ey bei3 ar er4 i city ia jia1 ie jie1 ii bi3 iu jiu4 rr shi4 o bo1 ow dou1 u bu4 wa hua1 wey hui2 uo duo1 uu xu4 ue xue2 an ban1 ang bang1 eng ben3 ian bian1 ing bing1 ong dong1 wan duan3 un dun4 uan yuan4 m ma2 n na4 b ba1 d da2 p po1 t te4 g gen1 k ken3 c ci2 ch chi1 s si1 sh shi4 z zi1 zh zhi1 j ji3 q qi2 x xi3 l li2 f fu4 v avenue h ha1 acl alveolar closure lcl labial closure vcl velar closure ncl nasal ending not anti-phone iwt inter- and intra- word silence h# utterance initial and nal silence Table2 -3: Acoustic-phonetic symbols and example occurrences... In PAGE 33: ... It is very hard to characterize the rules for this type of variation, because they usually depend on both the acoustic and the linguistic environment. Table2 -4 shows some examples. Handling Variations in the Recognizer Variations can be modeled at several levels in the recognizer.... In PAGE 73: ...Table2 -1 for a summary of the test data. 5.... ..."

Table 11: Data for ATUM Traces on 8K Caches References [1] Anant Agarwal, John Hennessy, and Mark Horowitz, \Cache Performance of Operating Systems and Multiprogramming, quot; ACM Transactions on Computer Systems, 6(4):393{431, November 1988. [2] Anant Agarwal and Steven D. Pudar, \Column-Associative Caches: A Technique for Re- ducing the Miss Rate of Direct-Mapped Caches, quot; in Proceedings of the 20th Annual Inter- national Symposium on Computer Architecture, San Diego, California, pp. 179{190, ACM SIGARCH and IEEE Computer Society, May 17{19, 1993. Computer Architecture News, 21(2), May 1993.

in A Unified Framework for Hybrid Access Cache Design and Its Applications
by Kevin B. Theobald, Herbert H. J. Humy, Guang R. Gao 1993
Cited by 1

Table I. ACM Transactions on Computer Systems, Vol. 2, No. 2, May 1984.

in Byzantine Generals in Action: Implementing Fail-Stop Processors
by Fred B. Schneider

Table 2-4 Monitoring matrix

in Table Of Contents ATLAS Collaboration.................... iii Acknowledgements..................... iv
by unknown authors 1998
"... In PAGE 13: ... For to the Data Acquisition (DAQ) system, the LVL1 Trigger is another source of data and dedi- cated ReadOut Drivers (RODs) are used. The organization of the ATLAS detector read-out is specified in Table2 -1 in terms of the parti- tioning, of data sources (the RODs), of Read-Out Links (ROLs), and of ROS subsystems, assum- ing that a maximum of 12 ROLs can be connected to a single ROS subsystem. The information... In PAGE 14: ... Each partition can function independently. Table2 -1 The distribution of the RODs per detector per partition. Detector Partition RODs ROD crates ROLs ROS subsys- tems ROLS per ROS sub- system Inner Detector B Layer 4434443*12+8 Disk 121121 1*2 Layer 1 + 2 38+26 4 38+26 6 5*12+4 SCT Left Barel 222222 2*1 Right Barel222222 2*1 Left Endcap 24 2 24 2 2*12 Right Endcap 24 2 24 2 2*12 TRT Barel A 3233232*1+8 Barel C 3233232*1+8 Endcap A 96 8 96 8 8*12 Endcap C 96 8 96 8 8*12 LAr EMB A 56 4 224 19 18*12+8 EMB C 56 4 224 19 18*12+8 EMEC A 35 3 140 12 11*12+8 EMEC C 35 3 140 12 11*12+8 FCAL 4 1 16 2 2*8 HEC 6 1242 2*1 Tilecal Barel A 8 1162 2*8 Barel C 8 1162 2*8 Ext Barrel A 8 1 16 2 2*8 Ext Barrel C 8 1 16 2 2*8 MDT Barel A 484484 4*12 Barel C 484484 4*12 Endcap A 48 4 48 4 4*12 Endcap C 48 4 48 4 4*12 CSC Endcap A 8+8 1 16 2 2*8 Endcap C 8+8 1 16 2... In PAGE 15: ...ATLAS Technical Design Report High-Level Triggers, DAQ and DCS 30 June 2003 2 Parameters 11 Maximum fragment sizes as specified by the subdetector groups and estimates of the fragment sizes are presented in Table2 -2.To each fragment a ROD header and trailer (together 48 Bytes) and a ROBIn header (56 Bytes) are added.... In PAGE 15: ...ied in the table and falls in the range from 1.2 to 2.2 MByte. RPC Half Barrel 1 16 1 16 2 2*8 Half Barrel 2 16 1 16 2 2*8 TGC Endcap A 8 1 8 1 2*8 Endcap C 8 1 8 1 2*8 LVL1 (RoI, CP, JEP and PP RODs belong to the same partition) MIROD 1 1 1 54*12+8 RoI 6 1 or 2 6 CP 4 16 JEP 4 16 PP 4 8 16 CTP 1 1 1 Total 33 984 92 1628 146 Table2 -2 Estimates and maximum data fragment sizes in Bytes. Subdetector Number of ROLs Low luminosity (2 1033) Design luminosity (1034) Max.... In PAGE 15: ...m. calorimeter 728 752 752 1400 Hadron calorimeter 64(Tilecal) 752 752 1100 (Tilecal) 24 (LAr) 752 752 1400 (LAr) Muon precision 192 800 800 1000 Muon trigger (RPCs and TGCs) 48 380 380 1000 CSC 32 200 200 200 FCAL 16 1400 1400 1400 LVL1 56 1200 (average) 1200 (average) 1200 (average) Total event size, raw 1020312 1359072 2018400 Total event size, with headers 1197800 1536560 2195888 Table2... In PAGE 16: ... More de- tails are provided in Appendix 1. In Table2 -3 an overview is presented of typical values of rates and data volumes for 75 kHz LVL1 trigger rate. .... In PAGE 16: ... . Table2 -3 Overview of typical values and rates for 75 kHz LVL1 trigger rate. Low luminosity Design luminosity Average number of ROBIns receiving a RoI request, per LVL1 trigger 18.... ..."

Table 2-4: interconnection protocols comparaison

in ENACTS-Data Management in HPC 1 The ENACTS Project.......................................................................................................1
by unknown authors 2003
"... In PAGE 7: ...able 1-1: ENACTS Participants by Role and Skills..............................................................2 Table2 -1: Level for RAID technology.... In PAGE 7: ...able 2-1: Level for RAID technology................................................................................12 Table2 -2: Secondary storage technology.... In PAGE 7: ...able 2-2: Secondary storage technology. .........................................................................13 Table2 -3: Tertiary storage roadmap .... In PAGE 7: ...able 2-3: Tertiary storage roadmap ...................................................................................15 Table2 -4: interconnection protocols comparaison.... In PAGE 7: ...able 2-4: interconnection protocols comparaison..............................................................16 Table2 -5: SAN vs.... In PAGE 7: ...able 2-5: SAN vs. NAS ........................................................................................................17 Table2 -6: Sample of RasQL.... In PAGE 19: ... The RAID array is the configuration used to assemble disks, in order to obtain performance and reliability. The basic characteristics of different configurations are found in Table2 -1. RAID A disk array in which part of the physical storage capacity is used to store redundant information about user data stored on the remainder of the storage capacity.... In PAGE 19: ... Level 6 As RAID 5, but with additional independently computed check data. Table2 -1: Level for RAID technology. ... In PAGE 20: ...onsequence, the aggregate I/O rates required for challenging applications (e.g., those involved ASCI) can be achieved only by coupling thousands of disks or hundreds of tapes in parallel. Using the low-end of projected individual disk and tape drive rates, Table2 -2 shows how many drives are necessary to meet high-end machine and network I/O requirements. Secondary Storage Technology Timeline 1999 2001 2004 Disk Transfer Rate 10-15 MB/sec (SCSI/Fibre Channel) 20-40 MB/s 40-60 MB/s (may be higher with new technology) Positioning Latency Milliseconds Milliseconds Milliseconds Single Volume Capacity 18 GB 72 GB 288 GB Active Disks per RAID 8 8 8 Number of RAIDs (100% of I/O rate) 75 375 625 Total Parallel Disks 600 3000 5000 Table 2-2: Secondary storage technology.... In PAGE 20: ... Using the low-end of projected individual disk and tape drive rates, Table 2-2 shows how many drives are necessary to meet high-end machine and network I/O requirements. Secondary Storage Technology Timeline 1999 2001 2004 Disk Transfer Rate 10-15 MB/sec (SCSI/Fibre Channel) 20-40 MB/s 40-60 MB/s (may be higher with new technology) Positioning Latency Milliseconds Milliseconds Milliseconds Single Volume Capacity 18 GB 72 GB 288 GB Active Disks per RAID 8 8 8 Number of RAIDs (100% of I/O rate) 75 375 625 Total Parallel Disks 600 3000 5000 Table2 -2: Secondary storage technology. In contrast to secondary storage, assembling tertiary systems from commodity components is much more difficult, although individual tertiary drives may be as fast as or faster than disk.... In PAGE 22: ...enacts.org October 2003 15 Tertiary Storage Technology Timeline 1999 2001 2004 Tape Transfer Rate 10-20 MB/sec 20-40 MB/sec 40-80 MB/sec (may be higher with breakthrough technology) Mount and Positioning Latency 50-100 sec 50-100 sec 50-100 sec Single Removable Volume Capacity 50-100 GB 250-500 GB 1 TB Active Drives per RAIT 8 8 8 Number of RAITs (40% of SAN bandwidth) 8 32 125 Total Parallel Drives 64 256 1000 Table2 -3: Tertiary storage roadmap 2.3 Interconnection technology From the user apos;s point of view, data can be local, directly available to the user; or remote - accessible through a network.... In PAGE 22: ... The latter, as standard command protocol is carried also over Fibre Channel connections and over IP connections (called iSCSI). A comparison between these protocols is briefly described in Table2 -4. ... In PAGE 24: ... All NAS and SAN configurations use available, standard technologies: NAS takes RAID disks and connects them to the network using Ethernet or other LAN topologies, while SAN implementations will provide a separate data network for disks and tape devices using the Fibre Channel equivalents of hubs, switches and cabling. Table2 -5 highlights some of the key characteristics of both SAN and NAS. SAN NAS Protocol Fibre Channel (Fibre Channel-to- SCSI) TCP/IP Application Mission-critical transactions.... In PAGE 24: ...apacity. No distance limitations. Easy deployment and maintenance. Table2 -5: SAN vs. NAS SAN can provide high-bandwidth block storage access over a long distance via extended Fibre Channel links.... In PAGE 36: ...enacts.org October 2003 29 MARRAY Select marray n in [0:255] values condense + over x in sdom(v) using v[x]=n from VolumetricImages as v For each 3-D image its histogram COND Select condense + over x in sdom(w) using w[x] gt; t from Warehouse as w For each datacube in the warehouse, count all cells exceeding threshold value t Table2 -6: Sample of RasQL 2.6.... ..."

Table 2.4: Horizontal and Vertical database layout of D.

in Survey on frequent pattern mining
by Bart Goethals, Tom Brijs, Toon Calders, Christian Hidber, Paolo Palmerini 2002
Cited by 25

Table 2.4: Horizontal and Vertical database layout of D.

in Efficient Frequent Pattern Mining
by Bart Goethals, Tom Brijs, Toon Calders, Christian Hidber, Paolo Palmerini

Table 2.4: List of available databases in the public domain [8]

in DEANSHIP OF GRADUATE STUDIES
by Mohammed Aleemuddin, King Fahd University
Next 10 →
Results 11 - 20 of 78,573
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University