• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 2,427
Next 10 →

Table 1: Policy for Lecture Object A

in Policy-Carrying, Policy-Enforcing Digital Objects
by Ra Payette, Carl Lagoze 2000
"... In PAGE 6: ...example of such an item-specific policy, consider an object that provides access to a digitized lecture. Table1 outlines a plausible policy governing access to such an ob- ject. Table 1: Policy for Lecture Object A ... In PAGE 11: ... The default policy restricts access to opera- tions that can modify the contents of the object. The Lecture Disseminator policy (Policy-L) is a PSLang specification of the policy we saw earlier in Table1 . Al- though other lecture objects are structurally similar, they contain different content and different policies.... ..."
Cited by 4

Table 11: Average hours spent in lectures, tutorials

in Introductory Programming: What's Happening Today and Will There
by Be Any Students
"... In PAGE 5: ... 3.6 Teaching to On-Campus Students Table11 shows time spent each week in lectures, tutorials and practil case by on-campus tdents. The definition of a lecture was common to all participants, but tuorils nd prtils are dfie ifrtly from institutiotoisuon.... ..."

Table 11: Average hours spent in lectures, tutorials

in
by unknown authors
"... In PAGE 5: ... 3.6 Teaching to On-Campus Students Table11 shows time spent each week in lectures, tutorials and practil case by on-campus tdents. The definition of a lecture was common to all participants, but tuorils nd prtils are dfie ifrtly from institutiotoisuon.... ..."

Table 2. Performance evaluation of streaming archived lectures

in Model-Based System Development for Asynchronous Distance Learning
by Shu-ching Chen
"... In PAGE 12: ... Similarly, the process contin- ues until the final state is reached. PERFORMANCE EVALUATION Table2 shows the performance evaluation of streaming archived lectures... ..."

Table 1: Test-set of lectures

in unknown title
by unknown authors 2001
"... In PAGE 1: ...9 hour speech. The test-set for evaluation consists of ten lecture presen- tations specified in Table1 . Many of them are invited lec- tures at technical meetings, thus relatively longer than sim- ple paper presentations.... ..."
Cited by 12

Table 1. Test-set of lectures

in unknown title
by unknown authors
"... In PAGE 1: ...9 hour speech. The test-set for evaluation consists of ten lecture presen- tations specified in Table1 . Many of them are invited lec- tures at technical meetings, thus relatively longer than sim- ple paper presentations.... ..."

Table 6. Selective Lecture room clustering DER

in Robust speaker segmentation for meetings: The ICSI-SRI spring 2005 diarization system
by Xavier Anguera, Chuck Wooters, Barbara Peskin, Mateu Aguiló 2005
Cited by 9

Table 5. Average lecture comprehension scores.

in Fostering Engagement in Asynchronous Learning Through Collaborative Multimedia Annotation
by Scott LeeTiernan , Jonathan Grudin 2001
"... In PAGE 7: ... Scores averaged 6.85 across all participants, with non-significant differences among the conditions ( Table5 ). (One outlier whose score of 1 was below chance on multiple-choice questions was discarded.... ..."
Cited by 8

TABLE II TRAFFIC STATISTICS OF CLASSROOM LECTURE

in Characterizing Packet Audio Streams from Internet Multimedia Applications
by Chen-nee Chuah, Randy H. Katz 2002
Cited by 6

Table 1. Role schema for Lecturer - an exam- ple

in Improving goal and role oriented analysis for agent based systems
by Pei Pei Kuan, Shanika Karunasekera, Leon Sterling 2005
"... In PAGE 4: ... Taking this analogy, a Role Schema is the position description for a particular Role. Table1 shows an example Role Model/Role Schema.... ..."
Cited by 5
Next 10 →
Results 11 - 20 of 2,427
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University