### Table 2 New types of office space [2] Hive Cell Den Club

1982

"... In PAGE 2: ... No one stereotype emerges, but rather a flexi- ble mix of workspaces, where varying degrees of autonomy and interaction are available, known as hives, cells, dens and clubs. Table2 summarises the salient features of all four types of office space. Duffy argues that the relative proportion of the four types of office space will change as demanding, team- based, high-interaction cooperative activities become commonplace.... ..."

Cited by 3

### Table 6n3a The Den0cnition of decn2dptrs.

1995

"... In PAGE 19: ... If the reference count falls to zeron2c it then recursively decrements the reference counts of all cells pointed to by l. The formal den0cnition appears in Table6 n3b an example appears in Figure 4 where the left side of Figure 4 n28assumed to be part of the graph of the store n1bn29 is transformed into the right side by calling decn2dptrsn28ln3b n1bn29.... ..."

### Table 2. Relative errors for DENS and REAL (without correlation factor among attributes)

"... In PAGE 14: ... Generally speaking, the analysis method with the regional average volume is accurate for the case of the data set with a uniform distribution, while the analysis method with density function is accurate for the case of data set with both uniform and non-uniform data distribution. Table2 and Table 3 show the relative errors of the predictions by our cost model com- pared with the actual experimental results. The observation of the results in the low dimension- al data space (3-5 dimension) is that the analytical estimate of DENS is very close to the actual result: the relative average error is below 10 %.... ..."

### Table 3. Randomly generated weighted instances; dens 2 f99; 100g%.

1997

Cited by 20

### Table VIII. Polynomials that occur as factors in the factorisations of the den [i] for S(F4).

Cited by 1

### Table IX. Polynomials that occur as fac- tors in the factorisations of the den [i] for S(F4)_.

Cited by 1

### Table 4. Cyberterrorism Attack Tools (After [Cohen1, 1998; Denning1, 1999]).

2003