• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 8,395
Next 10 →

Table 2: 20%/24-Hour Attention Shifts (All Users)

in An Analysis of Trace Data for Predictive File Caching in Mobile Computing
by Geoffrey Kuenning Gerald, Gerald J. Popek, Peter L. Reiher

Table 2: 20%/24-Hour Attention Shifts (All Users)

in An Analysis of Trace Data for Predictive File Caching in Mobile Computing
by Geoffrey H. Kuenning, Gerald J. Popek, Peter L. Reiher 1994

Table 9: FIT FOR z=2.014

in unknown title
by unknown authors
"... In PAGE 9: ... The small vertical lines above the Si IV 1393 and C IV 1548 transitions denote the velocity centroids of the Gaussian components in the line-pro le solution where we have added 3 components to t the C IV pro les. The VPFIT solution (see Table9 ) yields an excellent reduced 2 = 1:008 with probability P 2 = 0:45. For this system we allowed for the possibility that the Doppler broadening (b values)... ..."

Table 9: FIT FOR z =2.014

in unknown title
by unknown authors
"... In PAGE 9: ... The small vertical lines above the Si IV 1393 and C IV 1548 transitions denote the velocity centroids of the Gaussian components in the line-pro le solution where we have added 3 components to t the C IV pro les. The VPFIT solution (see Table9 ) yields an excellent reduced 2 =1:008 with probability P 2 =0:45. For this system we allowed for the possibility that the Doppler broadening (b values)... ..."

Table 1. A comparison of Enterprise Grid and Web 2.0 aproaches.

in Introduction Cyberinfrastructure and Web 2.0
by Marlon E. Pierce, Geoffrey Fox A, Huapeng Yuan A, Yu Deng A
"... In PAGE 1: ... We compare Web 2.0 with Enterprise-style cyberinfrastructure aplications in the Table1 . This table wil also ... In PAGE 2: ...As sumarized in Table1 , there is a paralel betwen conventional cyberinfrastructure (Web Services, science portals, virtual organizations), and Web 2.0 (REST services, rich internet aplications, online comunities).... In PAGE 16: ...0 technologies with an atempt to show how they can be used and combined with Cyberinfrastructure and e-Science. As the term e-Science implies, much work on cyberinfrastructure has focused on Enterprise-style aplications that we surveyed in column 2 of Table1 . The Enterprise aproach may be roughly characterized as requiring specialized programing and development expertise with particular tols (such as the Globus tolkit or the OGSA-DAI database services) and places an emphasis on sophistication (such as complicated ... ..."

TABLE V The Relationship Between Segregation and Outcomes Age 20-24 Age 25-30

in A MEASURE OF SEGREGATION BASED ON SOCIAL INTERACTIONS
by Federico Echenique, Roland G. Fryer, Jr. 2006

Table 1. Primitive BinX data types.

in Binx - a tool for retrieving, searching and transforming structured binary files
by Rob Baxter, Robert Carroll, Denise J. Ecklund, Bob Gibbins, Davy Virdee, Ted Wen 2003
"... In PAGE 3: ...1 Data Types BinX supports a broad range of primitive data types, particularly those that are important for e- Science applications. Table1 summarises currently supported BinX data types. The underlying physical representation of each primitive data type must be described.... ..."
Cited by 3

Table 2. Experiment results

in Service Provisioning for HLA-based Distributed Simulation on the Grid
by Yong Xie Yong, Yong Meng Teo, Wentong Cai, Stephen John Turner
"... In PAGE 7: ... For example, in the e-Science cluster at Birming- ham University, each node has 2 GBytes of memory and 2 Intel Xeon 3GHz processors, with Red Hat Enterprise Linux (RHEL) system version AS 3 as the operating system. The experimental results are shown in Table2 . The clus- ter version of the latency benchmark shows that our pro- totype incurs about 40 millisecond of overhead in a clus- ter, and this is mainly due to the use of Globus, the encod- ing/decoding of parameters/result, and the communication cost.... ..."

Table 3: Similar Challenges Between Data Provenance and Software Traceability.................................................19

in Establishing the Connection Between Software Traceability and Data Provenance
by Hazeline Asuncion, Richard N. Taylor 2007
"... In PAGE 19: ...2 Similar Challenges Many of the manifestations of the software traceability problem parallel the problems in e- Science. In fact, the problems in e-Science can also be classified into the three perspectives we mentioned: economic, technical, and social (see Table3 ). ... In PAGE 20: ... 19 of 51 Table3 : Similar Challenges Between Data Provenance and Software Traceability 5.3 Similar Requirements Although there are different uses for provenance across the different fields in science, the basic requirements of recording, querying, and processing provenance information are applicable across science [84].... ..."

Table 3: Similarities between the vision of Cadastre 2014 and trends of reviewed systems.

in Cadastral Systems on the World Wide Web: A Multi-Purpose Vision
by Shamsul Izhan A. Majid, A. Majid, Ian P. Williamson, Professor Of Surveying
"... In PAGE 5: ... Certainly each of the systems is unique but the obvious trend is that these features are pointing towards the Cadastre 2014 vision. This is further outlined in Table3 where similarities between key features of Cadastre 2014 and those of the reviewed online cadastral systems are highlighted. This also gives rise to the proposal of a prototype for visualising the Multi-Purpose Cadastre concept with particular emphasis in understanding its associated issues.... ..."
Next 10 →
Results 11 - 20 of 8,395
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University