• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 275,063
Next 10 →

Table 1: Results for benchmarks using a CHR Boolean solver extending the Herbrand solver.

in Extending Arbitrary Solvers with Constraint Handling Rules
by Gregory J. Duck, Peter J. Stuckey, Maria Garcia De La Banda, Christian Holzbaur 2003
"... In PAGE 11: ...le faulty gate in a n bit adder (see e.g. [12] for the case of 1 bit). Table1 gives the execution times in milliseconds for a base compilation where every rule for a CHR constraint is rechecked each time a variable in the CHR constraint is mod- ified, and compilation with specialised re-execution. The dyn column gives the times for an equivalent Boolean solver hand coded using the dynamic scheduling features of the Herbrand solver directly.... ..."
Cited by 6

Table 1: Results for benchmarks using a CHR Boolean solver extending the Herbrand solver.

in Extending Arbitrary Solvers with Constraint Handling Rules
by Gregory J. Duck, Peter J. Stuckey, Maria Garcia De La Banda, Christian Holzbaur 2003
"... In PAGE 11: ...le faulty gate in a n bit adder (see e.g. [12] for the case of 1 bit). Table1 gives the execution times in milliseconds for a base compilation where every rule for a CHR constraint is rechecked each time a variable in the CHR constraint is mod- ified, and compilation with specialised re-execution. The dyn column gives the times for an equivalent Boolean solver hand coded using the dynamic scheduling features of the Herbrand solver directly.... ..."
Cited by 6

Table 1: Course lectures overview.

in Abstract Evaluation of a Graduate Level Data Mining Course with Industry Participants
by Peter Christen
"... In PAGE 2: ... Almost 70% of all students had English as a second language, with several students having arrived in Australia just this year for their one-year masters course-work studies. 4 Course Structure The course consisted of nineteen one-hour lectures as summarised in Table1 , with the first five modules presented before the semester break and the rest af- terwards. Modules 4, 5, 6, 7 and 9 were mostly based on corresponding chapters from the text book Data Mining: Concepts and Techniques (Han and Kam- ber 2006) which was used in the course, while the other modules were a mix of text book based mate- rial and additional material developed by the author.... ..."

Table 1: Policy for Lecture Object A

in Policy-Carrying, Policy-Enforcing Digital Objects
by Ra Payette, Carl Lagoze 2000
"... In PAGE 6: ...example of such an item-specific policy, consider an object that provides access to a digitized lecture. Table1 outlines a plausible policy governing access to such an ob- ject. Table 1: Policy for Lecture Object A ... In PAGE 11: ... The default policy restricts access to opera- tions that can modify the contents of the object. The Lecture Disseminator policy (Policy-L) is a PSLang specification of the policy we saw earlier in Table1 . Al- though other lecture objects are structurally similar, they contain different content and different policies.... ..."
Cited by 4

Table 4. Lecture topics System Components Lifecycles

in Examining the Relationship between Perceived Project Risk and the Use of Collaborative Environments
by Dennis P. Groth
"... In PAGE 3: ... During the first semester we hold two lectures and one lab section per week. Lecture topics ( Table4 ) are adapted from software engineering practices. The objective for the lectures is to train and instill the students with a process-oriented view, rather than an artifact-oriented view.... ..."

Table 11: Average hours spent in lectures, tutorials

in Introductory Programming: What's Happening Today and Will There
by Be Any Students
"... In PAGE 5: ... 3.6 Teaching to On-Campus Students Table11 shows time spent each week in lectures, tutorials and practil case by on-campus tdents. The definition of a lecture was common to all participants, but tuorils nd prtils are dfie ifrtly from institutiotoisuon.... ..."

Table 11: Average hours spent in lectures, tutorials

in
by unknown authors
"... In PAGE 5: ... 3.6 Teaching to On-Campus Students Table11 shows time spent each week in lectures, tutorials and practil case by on-campus tdents. The definition of a lecture was common to all participants, but tuorils nd prtils are dfie ifrtly from institutiotoisuon.... ..."

Table 1. Role schema for Lecturer - an exam- ple

in Improving goal and role oriented analysis for agent based systems
by Pei Pei Kuan, Shanika Karunasekera, Leon Sterling 2005
"... In PAGE 4: ... Taking this analogy, a Role Schema is the position description for a particular Role. Table1 shows an example Role Model/Role Schema.... ..."
Cited by 5

Table 1. Web-Lectures available.

in Open-2001-020
by Submitted To World, Giosue Vitaglione, Nora Bousdira, Steven Goldfarb, Homer A. Neal, Charles Severance, Mick Storr
"... In PAGE 3: ...3/14 Table1 lists the current content of the WLAP archive showing a wide variety of events that have been published to date. Table 1.... ..."

Table 1. Web-Lectures available.

in unknown title
by unknown authors
"... In PAGE 3: ...3/14 Table1 lists the current content of the WLAP archive showing a wide variety of events that have been published to date. Table 1.... ..."
Next 10 →
Results 1 - 10 of 275,063
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University