• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 306,594
Next 10 →

Table 3: Functional ability of patients recovering from stroke

in Mixed Models and Longitudinal Data
by Random Effects Consider

Table 2 shows that the included studies provided no usable information on patient outcomes or

in Systematic Review Of Effectiveness Of Teaching - Critical Appraisal
by For Correspondence, Statistics Medicine, Oxford Ox Lf, Chris Hyde, Julie Parkes, Jonathan Deeks, Ruairidh Milne
"... In PAGE 9: ....... 17 Table2 . Included studies; general characteristics .... In PAGE 32: ... For one article [54], ancillary information was available from an early published report of the same study [57]. The general characteristics of the included studies are given in Table2 . Important issues arising from considering these were as follows.... In PAGE 34: ... Nature of intervention Further detail on this is provided in Appendix 7. There was particular ambiguity concerning reporting of this indicated by the high proportion of shaded cells in Table2 . Despite this it seems certain that there was marked heterogeneity between studies, particularly in terms of the duration of the critical appraisal teaching intervention.... In PAGE 34: ... Despite this it seems certain that there was marked heterogeneity between studies, particularly in terms of the duration of the critical appraisal teaching intervention. The variation is clear in Table2 , ranging from extremely brief (1 hour or less in the case of the studies by Cuddy [44] and Seelig (1993) [56], to prolonged courses of over 10 hours (Bennett [41], Caudill [43], Frasca [45] amp; Reigelman [54, 57]). Where there was variation in duration within a study, because the intervention was repeated a number of times to different groups, the minimum level that could have been received by all participants is given.... In PAGE 34: ... There was also heterogeneity in terms of the teaching formats used. The descriptions applied in Table2 generally report the term used by the original authors. In this there is particular ambiguity between use of the terms seminars, tutorials and journal clubs.... ..."

Table 1. variation of prediction error

in Cost-Sensitive Analysis in Multiple Time Series Prediction
by C. K. Walgampaya
"... In PAGE 4: ... Accuracy of prediction is a nonlinear function of the number of sensors [16]. Table1 shows the experimental results for models approximated with different polynomials with corresponding error of approximation for MLP. We selected the polynomial model with relative small error and at the same time enough simple.... ..."

Table 3: Example of common functions of devices: Same functions are mapped to the same gesture; similar functions may be mapped to the same gesture if this is intuitive and no other function is overloaded.

in Technical Details and Ergonomical Aspects of Gesture Recognition applied in Intelligent Home Environments
by Markus Kohler 1997
"... In PAGE 13: ... Depending on the gesture commands are sent to the devices and feedback is applied. The correlation of gestures and commands is shown in Table3 . If the dialogue nishes by time out or by the pointing gesture or a certain termination gesture the control ow enters the direction determination (Figure 12).... In PAGE 30: ...evice at a time. First a device is selected by the unique pointer click. Depending on the selected device, the gesture will execute a certain command. Table3 shows a possible mapping. The stars indicate that the device in that column supports the function of the row.... ..."
Cited by 4

Table 3. Part of the Semiotic Framework outcomes for SBS

in The Practice of Software Development and the Organisational Semiotics Approach: A Case Study in Business Organizations
by Carlos Alberto, Cocozza Simoni, M. CecĂ­lia, C. Baranauskas
"... In PAGE 9: ... With these discussions, the people in- volved started to see the system not simply as a system for collecting maintenance requests, but as a channel for a relationship with Customers, Consumers and the Ser- vice technician. Table3 shows this analysis for the three upper levels of the Semiotic Framework. Table 3.... ..."

Table 5. Reset Characteristics (VCC = 5.0V) Symbol Parameter Condition Min Typ Max Units

in unknown title
by unknown authors
"... In PAGE 25: ... The circuit diagram in Figure 23 shows the reset logic. Table5 defines the timing and electrical parameters of the reset circuitry. 25... In PAGE 27: ... As shown in Figure 23, an internal timer clocked from the Watchdog Timer Oscillator pre- vents the MCU from starting until after a certain period after VCC has reached the Power- on Threshold voltage (VPOT), regardless of the VCC rise time (see Figure 24). The Fuse bits SUT1 and SUT0 are used to select start-up time as indicated in Table5 . A 0 in the table indicates that the fuse is programmed.... In PAGE 37: ... The wake-up period is defined by the same SUT fuses that define the Reset Time-out period. The wake-up period is equal to the clock reset period, as shown in Table5 on page 27. If the wake-up condition disappears before the MCU wakes up and starts to execute, e.... In PAGE 104: ...UT1..0 Fuses: Determine the MCU start-up time. See Table5 on page 27 for further details. Default value is unprogrammed ( 11 ), which gives a nominal start-up time of 16 ms.... ..."

Table 2: Distribution of framework functions across phases

in Use of an Environment Classification Model
by Marvin Zelkowitz 1993
"... In PAGE 4: ... * 1 Table 3: Distribution of User functions across phases dures, its place within the framework was determined and all references to that procedure were identi ed. Table2 presents a summary of this process. Each \* quot; represents a reference to that service within the indi- cated phase, and the numbers5 indicate the number of functions within that phase that implement aspects of that service.... In PAGE 4: ...3 Summary of mapping An evaluation of the mapping data concerning SUPPORT reveals much about its structure. From Table2 , the underlying MS-DOS operating system be- comes obvious. Security (as represented by policy en- forcement services and the object management access 5The numbers sum to more than 245 since several functions perform more than one service.... In PAGE 6: ... The costs of work- ing with one of these approaches is not indicated by the available data, but the fact that such characteris- tics exist is indicated. At rst glance, Table2 seems to indicate that ob- ject management services are distributed across most (7 out of 10) phases of SUPPORT. However, closer examination reveals that this is not necessarily so and may point out a weakness in the framework model.... In PAGE 6: ... In Table 5 the Storage service is analyzed in some de- tail. The rst line reproduces the corresponding line from Table2 . However, SUPPORT manages ve basic data types: (1) Program storage in the form of syntax trees, (2) Program identi ers, called names, (3) Run- time activation records for the interpreter, (4) LALR parsing table data, and (5) Files of data (of various types).... In PAGE 8: ... Some services appear to have virtual implemen- tations. For example, Table2 indicates no commu- nication service functions. However, SUPPORT cer- tainly communicates among its phases.... ..."
Cited by 5

Table 2: Top five ICD-9 codes most frequent in the patient record database showing the performance of support vector machine- based method (SVM) and of bayesian ridge regression-based method (BRR).

in Large Scale Diagnostic Code Classification for Medical Patient Records
by Lucian Vlad Lita, Shipeng Yu, Stefan Niculescu, Jinbo Bi
"... In PAGE 5: ... We evaluate our models using Precision, Recall, AUC (Area under the Curve) and F1 measure. The results on the top five codes for both classification ap- proaches are shown in Table2 . For the same exper- iments, the receiver operating characteristic (ROC) curves of prediction are shown in Figure 1 and in Figure 2.... ..."

TABLE II GENERAL PSEUDOCODE FRAMEWORK FOR A BAYESIAN EDA.

in Bayesian Inference in Estimation of Distribution Algorithms
by Marcus Gallagher, Ian Wood, Jonathan Keith, George Sofronov

Table 2 Classification of Migraine-Related Stroke

in unknown title
by unknown authors 2001
"... In PAGE 8: .... M. A. Welch proposed a classification system to help define the intricate relationships between the 2 disorders ( Table2 ).18 Category I refers to clearly defined stroke occurring remotely in time from a typical attack of migraine from which the patient routinely suffers.... ..."
Next 10 →
Results 21 - 30 of 306,594
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University