• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 32,572
Next 10 →

Table 4. Conceptual Domains and Results of Our Review*

in STRAY DOGS AND WILD CATS TRACKING DOWN INFORMATION SYSTEMS IN GOVERNMENT?
by unknown authors
"... In PAGE 5: ... The list of the four domains and 22 categories of impacts were formulated by means of an inductive process grounded in the actual findings in the research literature. Table4 lists the 22 categories in our taxonomy. We used this list of variables to categorize the focus of the papers despite we did not look for impacts per se.... ..."

Table 4.3: Receiver Con gurations (please note that each category extends the previous one) [P9].

in A graphics architecture for high-end interactive television terminals
by Pablo Cesar 2005
Cited by 3

TABLE IV SCALING OF DIFFERENT EXECUTION MODELS OF SPECENV FOR THE SMALL AND MEDIUM DATA SET. PLEASE NOTE THE DIFFERENT BASE POINTS.

in SPEC HPG Benchmarks for High Performance Systems
by Matthias S. Müller, Kumaran Kalyanasundaram, Greg Gaertner, Wesley Jones, Rudolf Eigenmann, Ron Lieberman, Matthijs van Waveren, Brian Whitney 2004
Cited by 2

Table 2, lists the options that are currently supported. Please note, some combinations of options might not be supported.

in unknown title
by unknown authors
"... In PAGE 7: ... quot;0 quot;, quot;1 quot;, ... quot;9 quot;] Provide different levels of debug information (0 is no debug information) Table2 , TijahOptions for querying (the bold value is set by default). Next: See example usages of PF/Tijah in the Show Cases.... ..."

Table 1 Comparison of impacts of different energy supply technologies (source: Ref. [9])a

in Comparative Risk Assessment of energy supply technologies: a Data Envelopment Analysis approach
by R. Ramanathan 2001
"... In PAGE 3: ... In addition, the expected land use and carbon dioxide emissions resulting from the use of technologies have also been estimated. Their estimates of the risk and benefit parameters and other variables associated with different energy supply technologies are given in Table1 . For example, according to Nathwani et al.... In PAGE 4: ... Wherever a range is specified in the original study, we have considered their arithmetic average. First, a straightforward application of DEA to the data given in Table1 is attempted. The relative efficiency scores are given in Table 2.... ..."
Cited by 1

Table 1.2 shows the respective parameter values. Please note that finding the best parameter settings for QSD and QLD has to be taken with some

in
by unknown authors

Table 1.2 shows the respective parameter values. Please note that finding the best parameter settings for QSD and QLD has to be taken with some

in 1 Towards Collaborative Information Retrieval: Three Approaches
by Armin Hust, Stefan Klink, Markus Junker, Andreas Dengel

TABLE 2 Three-Dimensional Position (in millimeters) of the Humeral Head Relative to the Glenoid Cavity at Different Arm Positions in the Asymptomatic and Affected Shoulders of Patients with Traumatic and Atraumatic Instabilitya

in Relevance of Arm Position and Muscle
by Ruediger M. O. Von Eisenhart-rothe, Alwin Jäger, Karl-hans Englmeier, Thomas J. Vogl, Heiko Graichen

Table 6 covers additional flows assuming that the source-destination pair are in different ELANs. Please note that the AHFG row and column are shaded as the ELAN choice does not apply to the AHFG.

in unknown title
by unknown authors
"... In PAGE 54: ... Please note that the AHFG row and column are shaded as the ELAN choice does not apply to the AHFG. Table6 : Inter-ELAN Scenarios destination source AHFG Dual-Stack Host Edge Device AHFG AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Dual-Stack Host AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAA(e) (p) AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA Edge Device AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAA AAAA AAAA AAAA AAAA AAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAAAAAA AAAA(n) (k) B2.3 Inter-IASG Scenarios The flows listed in Table 7 are between the source-destination pairs for which the source and destination are in different IASGs.... ..."

Table 2. Number of cases in database with respect to number of features and missing values. Please note that B, C, and A7 are actually subsets of A, and that A = B+C.

in unknown title
by unknown authors
Next 10 →
Results 1 - 10 of 32,572
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University