• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 9,467
Next 10 →

Table X Alternative Measures of Soft Information

in How Does Organizational Form Matter? Communication, Distance and Soft Information
by José María Liberti 2005

Table 2. Comparison of various soft-error protection techniques.

in unknown title
by unknown authors
"... In PAGE 6: ... The Soft-Error Protection: Test Results side- bar discusses radiation testing of some soft-error protection techniques. Table2 shows a compara- tive analysis of these techniques with respect to several system-level metrics, exploring some vari- ables and factors that determine their applicabil- ity to actual designs. REUSE PARADIGM FOR BUILT-IN SOFT-ERROR RESILIENCE A new paradigm that leverages the reuse of on- chip resources for multiple functions at various stages of manufacturing and field use can over- come the drawbacks of existing soft-error protec- tion techniques.... ..."

Table 1 A summary table of the alternatives to patent protection [own table].

in Acknowledgements
by This Master Thesis, Tore Nordlund, Tore Nordlund
"... In PAGE 7: ...igure 54 Freedom to operate (US).....................................................................................106 4 Tables Table1 A summary table of the alternatives to patent protection[own table].... ..."

Table 3: Results of link protection primary path alternate route

in Logical Topology Design and Multi-layered Survivability
by Hideo Miyahara

Table 2. Hard and soft systems characteristics

in Multi-stakeholder Partnerships in Affordable Rental Housing: an Investigation Using Soft Systems Framework
by Lynne Multistakeholder
"... In PAGE 7: ... Checkland has proposed what is termed the soft systems methodology as an alternative (Checkland, 1981). Table2 compares hard and soft systems characteristics. Table 2.... ..."

Table 1. Relative Cell-level Timing, Power, Area, amp; SER Comparisons of scan flip-flops reused for soft error protection.

in 1 BUILT-IN SOFT ERROR RESILIENCE STRUCTURES
by Subhasish Mitra, Ming Zhang, Norbert Seifert, Quan Shi, T. M. Mak, Kee Sup Kim
"... In PAGE 2: ... The analysis of the design in the presence of a soft error in PH2 or LA when CLK = 1 is similar. The truth table of a C-element is shown in Table1 . Depending on the speed of the system and the leakage current, the keeper in Fig.... In PAGE 2: ... 2 may not be necessary. Table1 . Truth table of a C-element O1 O2 Q 0 0 1 1 1 0 0 1 Previous value retained 1 0 Previous value retained Extensive soft error rate simulations on an advanced process technology using an internal tool [Nguyen 03] show that the design in Fig.... ..."

TABLE II. On shore and on the water test results.

in An Application Of Close Range Photogrammetry In Dolphin Studies
by S. Bräger, A. K. Chong

Table 3 Sightings rate for shore based surveys.

in A Survey Of Bottlenose Dolphins
by Tursiops Truncatus In, Emer Rogan, Simon Ingram, Brian Holmes

Table 1 summarises the coverage of the IP-based fast recovery techniques in the studied network topologies. It clearly shows that by combining loop-free alternates, U- turns and protection tunnels, it is possible to protect all links in real ISP topologies. The values describe the percentage of links that can be protected by combining the first protec- tion techniques. For example, in GEANT all links are pro- tected by using LFA, U-turns and protection tunnels, while in Abilene protection tunnels with directed forwarding are required in addition to the techniques used in GEANT. The not-via addresses were not necessary to protect unicast IP traffic in the topologies that we considered.

in Categories and Subject Descriptors: [C.2.2]: Routing Protocols
by Pierre Francois, Olivier Bonaventure
"... In PAGE 2: ... Table1 : Combined coverage of loop-free alternates, protection tunnels and not via address 4. CONCLUSION AND FURTHER WORK In this paper, we showed by simulation that loop-free al- ternates combined with U-turns are sufficient to protect be- tween 40 and 90% of the directed links in the studied net- works.... ..."

Table 7. Employment protection legislation: OECD Indicator for 1998

in 2
by Karsten Gareis, Werner B. Korte, Karsten Gareis, Werner B. Korte
"... In PAGE 9: ... 2000: 41). According to this indicator, countries such as the United Kingdom and Ireland, but also Denmark, are those with lowest levels of employment protection regulation while France, Italy and Spain provide the most stringent regimes (see Table7 ). One way for companies to deal with stringent labour market regimes is to look for alternative work arrangements that are not subject to the same regulation as regular employment relationships.... ..."
Next 10 →
Results 1 - 10 of 9,467
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University