• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 208,606
Next 10 →

Table 5. NEXT with context-recommendation system.

in unknown title
by unknown authors
"... In PAGE 9: ... NEXT with context-recommendation system. In Table5 , the results from our experiment in using NEXT as a prefetch algorithm are presented. The overall improve- ment is quite good.... ..."

Table 2. Software engineering and knowledge engineering software processes

in A Process Model Applicable To Software Engineering And Knowledge Engineering
by Silvia Acua Natalia, Facultad De Ciencias Forestales, Santiago Estero, Natalia Juristo, Natalia Juristo
"... In PAGE 6: ... The traditional software process, as per IEEE standard 1074-1991, is composed of four main processes, each grouping a series of activities that are responsible for implementing their associated goals [22]. These processes are shown in Table2 . Although it has not been formally defined by any organization or document, the KE software process can be considered to be composed primarily of the processes shown in Table 2, as all of these activities appear in one way or another in the most well-known KE development methodologies [8] [9] [10] [11] [12].... In PAGE 6: ... These processes are shown in Table 2. Although it has not been formally defined by any organization or document, the KE software process can be considered to be composed primarily of the processes shown in Table2 , as all of these activities appear in one way or another in the most well-known KE development methodologies [8] [9] [10] [11] [12]. Below we discuss which of the activities of SE could be applied in KE and vice versa.... ..."

Table 1, List of Criteria Used or Recommended by Six Countries for the delineation of Basic Spatial Units (BSU) for the dissemination of statistics.

in unknown title
by unknown authors
"... In PAGE 8: ... In particular CCD and Postcode boundaries form core boundary systems for aggregation in a number of secondary boundary systems. Table1 also highlights that many boundary systems are the responsibility of individual state government departments and agencies. Consequently methods used in constructing these boundaries vary between each of the state and agency.... In PAGE 9: ...5 Catchment State Government Topographic Boundaries Parish Distance and Population Table1 , Commonly used administrative boundaries, coverage and delineation techniques. Table 1 provides an insight into the core administrative boundaries, however with GIS becoming increasing available agencies are continuing to construct boundaries to meet individual needs.... In PAGE 9: ...5 Catchment State Government Topographic Boundaries Parish Distance and Population Table 1, Commonly used administrative boundaries, coverage and delineation techniques. Table1 provides an insight into the core administrative boundaries, however with GIS becoming increasing available agencies are continuing to construct boundaries to meet individual needs. Examples of these boundaries include the boundaries for plants, public transport and emergency response.... ..."

Table 1: Implicit and explicit knowledge

in unknown title
by unknown authors 2003
"... In PAGE 2: ... The engines behind the two knowledge spectrum forces are the knowledge processors, natural or artificial entities able to create abstractions from data and to instantiate abstractions in order to fit reality. Knowledge is traditionally categorized into implicit and explicit ( Table1 ) and ranges from rich representations grounded in a reality, to highly abstracted, symbolic rep- resentations of that reality. The classical distinction between data, meta-data, information, knowledge and meta-knowledge is simplified by our subscription to the unified view of Algorithmic Information Theory (AIT) [4] which recasts all knowledge modalities and their process- ing into a general framework requiring a Universal Turing Machine, its programs and data represented as finite binary sequences.... ..."

Table 2. Evaluation scores and the average size of the recommendation set produced by the recommendation engine using a session window size of 2.

in unknown title
by unknown authors 2000
"... In PAGE 7: ... Ideally, we would like the recommendation engine to produce few but highly relevant recommendations. Table2 shows the results produced by the recommendation engine for the 3 profile generation methods using a session window size of 2. For example, at a threshold of 0.... ..."
Cited by 47

Table 1: Field differences in combinations of scientific excellence and in application relevance

in Quality Control and Validation Boundaries in a Triple Helix of University-Industry-Government: 'Mode 2' And the . . .
by Yuko Fujigaki, Loet Leydesdorff

Table 1. A Survey of DKBA research categorised by Knowledge Engineering Issues

in Clarity guided belief revision for domain knowledge recovery in legacy systems
by Yang Li, Hongji Yang, William Chu 2000
"... In PAGE 1: ... Traditional DKBA methods are heavy-weighted where the effective- ness of domain knowledge recovery relies heavily on the use of knowledge at different abstract layer and therefore hinders the efficiency of these methods. Table1 lists re- lated work on DKBA, categorised by typical knowledge engineering issues. It is our observation that important is- sues such as knowledge representation, uncertainty reason- ing and program space management have not been suffi- ciently addressed in the context of domain knowledge re- covery from source code.... ..."
Cited by 3

Table 4. Proposed Strategies to Improve Hand Washing Technique and Complianc e

in Bureau of Infectious Diseases
by Disinfection, Hand Washing Cleaning
"... In PAGE 9: ... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Table4 . Proposed Strategies to Improve Hand Washing Technique and Compliance .... In PAGE 16: ... It may also be due to real or perceived obstacles , such as understaffing, inconveniently located hand washing facilities, an unacceptable hand washing product or dermatitis caused by previous hand washing. A number of strategies have been suggested to improv e compliance ( Table4 ). Long-term success will require development of programs and sustained efforts a t promoting compliance with hand washing.... ..."

Table 2: Pros (+) and Cons (-) for Search engines, Notifier programs, and Recommender systems. Search engines Notifier programs Recommender

in Collaborative Aspects of Information Retrieval Tools:
by Summarising Three Action, Dick Stenmark
Cited by 1

Table 2: Pros (+) and Cons (-) for Search engines, Notifier programs, and Recommender systems. Search engines Notifier programs Recommender

in Collaborative Aspects of Information Retrieval Tools: Summarising Three Action Case Studies
by Dick Stenmark
Cited by 1
Next 10 →
Results 1 - 10 of 208,606
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University