### Table 2. The testing master/slave pairs of JERS-1 radar data.

"... In PAGE 5: ...able 2. The testing master/slave pairs of JERS-1 radar data. The differential result of each master/slave pair indicates the magnitude of the ground deformation during the period between the two acquisitions. For example, the differential result of Pair 1 in Table2 indicates the ground deformation occurred in the next 132 days after the acquisition of the master image. The DInSAR results of these pairs are shown in Figures 3 and 4.... In PAGE 8: ...(b) (c) (d) Figure 6. The results of estimated subsidence of Pair 1 ~ 4 in Table2 after using GIS tools are shown respectively in (a), (b), (c) and (d). Figure 6 (a) to (d) show the locations of subsidence caused by mining activities during the corresponding periods.... In PAGE 9: ... Possible Error Sources In order to obtain a good correlation between the two radar images, there are some limitations in both the temporal and spatial sense (Atlantis, 2002; Mendes et al, 1995): Temporal decorrelation caused by rainfall, vegetation growth or random motion during the period of the two passes have effects on phase correlation, and hence the quality of the interferogram. There is also a limit to the baseline separation ( Table2 ). The usable perpendicular baseline separation can be up to several hundred metres for ERS-1/2 radar and one to two kilometres for JERS-1.... ..."

### Table 4 Market Structure and Telephone Penetration

2001

"... In PAGE 14: ...6 In this case I omit the regulation variable since I do not have that information for countries outside Europe. The first column of Table4 shows the results of this regression. As expected, per capita income is positive and statistically significant: richer countries had better telephone systems, as is still the case today.... In PAGE 14: ...bout 1.4 phones per hundred. To begin focusing empirically on Europe, where I have more complete information, I run the same regression (for now ignoring regulations) using only the 18 European countries in my sample. The second column of Table4 shows those results, which are consistent with the results 4 Concessions in the UK did not actually allow the government to take over the system without compensation at the end of the concessionary period. Instead, the issue was that the government was not planning on renewing the concession after 1911 and had as late as 1904 had made no statement as to what would happen after that date.... In PAGE 15: ...2 phones per hundred worse, on average. The third column of Table4 shows the results of this estimation when including the capricious regulation variable. The coefficient on this variable is negative and significant, as is the coefficient on the government monopoly variable, which also increases in magnitude, from negative 1.... ..."

Cited by 3

### Table 2: 3D point reconstruction error for the RADIUS image data.

2000

"... In PAGE 24: ... Our algorithm recovered 61 correspondence rooftop polygon points, all of them correct (Figures 11 and 12). The corresponding 3D points reconstructed by the al- gorithm are reported in Table2 . This experiment uses the ground truth 3D data supplied in the model board 1 data set Here we only reported the comparisons between the reconstructed 3D points and their ground truth data for those 3D points whose ground truth coordinates are available.... In PAGE 24: ... This experiment uses the ground truth 3D data supplied in the model board 1 data set Here we only reported the comparisons between the reconstructed 3D points and their ground truth data for those 3D points whose ground truth coordinates are available. From Table2 , we can see that for some image correspondences such as 20, 21, 34, 35, 36, 49, 50, and 57, the trian- gulated 3D points have large errors although their correspondences are determined correctly by our algorithm. This is due mainly to the errors in the locations of rooftop polygon points, since it is well known that these 2D errors have a significant effect on the triangulated 3D data, especially when there are only two images [17].... ..."

Cited by 5

### Table 1. A Sample of Input 3D Image Data

2001

"... In PAGE 6: ... No special attention has yet been paid to speeding up the code, except for using the fast Fourier transform for cross correlation computation. The algorithm has been applied to over 100 3D image sets #28 Table1 #29 with varying modalities. One strategy used to increase robustness to large orientation errors is to use both axial and coronal slices simultaneously to estimate the yaw and roll angles #28usually one of these sets of slices is measured directly, and the other is created by resampling the image volume#29.... In PAGE 7: ... robustness of the iMSP algorithm. Two ground truth image test sets are created from datasets 5 and 110 respectively #28 Table1 #29, one is a sparse, axial CT vol- ume and the other is a dense, coronal MR volume. Each ground truth test set is formed by #0Cnding the midsagittal plane by hand, then re#0Decting one half of the head volume about this midsagittal plane to overlay the other half, produc- ing a perfectly symmetrical volume.... ..."

Cited by 17

### Table 1: Detection Error Rate after JPGE Compression

2001

"... In PAGE 3: ...he extracted watermark is hoped to be the same as the extracted signature (e.g., robust bits) after reasonable image compression. Table1 shows the error rate after JPEG algorithm. It must be noted that even without JPEG compression, the watermarked image is different from the original one.... In PAGE 3: ...fter reasonable image compression. Table 1 shows the error rate after JPEG algorithm. It must be noted that even without JPEG compression, the watermarked image is different from the original one. Table1 shows that the extracted signature and watermark are almost the same unless the compression ratio is more than 16:1. However, such high compression leads to obvious image degradation, which is rarely used in applications.... ..."

Cited by 1

### Table 7 Market Structure and Telephone Penetration (t-statistics in parentheses)

2001

"... In PAGE 16: ... I use this panel to re-estimate the equation presented above, this time allowing the introduction of fixed effects. Table7 shows the results of these regressions. The first two columns show exactly the same regressions as above (i.... ..."

Cited by 3

### TABLE 3. PENETRATION EQUATIONS INPUT PARAMETERS

in ENGINE DEBRIS FUSELAGE PENETRATION TESTING, PHASE II 6. Performing Organization Code 7. Author(s)

2002

"... In PAGE 47: ... TABLE3 . Structural Element Impact Regions Using Base Width Criteria.... ..."

### Table 1: Comparison of algorithmic results for compressed sensing

"... In PAGE 3: ... Our algorithm achieves a uniform bound because, unlike for each algorithms, HHS uses a stronger estimation matrix and a combination of sifting and noise reduction matrices (see below) tailored to the mixed- norm bound of Theorem 1. (We include in Table1 uniform results only.) Chaining Pursuit is the only algorithm in the literature that achieves the first three desiderata [10].... ..."

### Table 1: Comparison of algorithmic results for compressed sensing

"... In PAGE 3: ... Our algorithm achieves a uniform bound because, unlike for each algorithms, HHS uses a stronger estimation matrix and a combination of sifting and noise reduction matrices (see below) tailored to the mixed- norm bound of Theorem 1. (We include in Table1 uniform results only.) Chaining Pursuit is the only algorithm in the literature that achieves the first three desiderata [10].... ..."

### Table 4: Comparison of compression rates for 2-D blocks versus 3-D blocks.

1996

"... In PAGE 20: ... This fractal image coder was used to compress each cross section of the individual slices of an 8-bit CT Head dataset and a di erent 8-bit MRI dataset. Table4 demonstrates that capitalizing on the additional redundancy of the third dimension results in higher compression rate with the same compression delity. As the compression rate increases, the bene ts of 3-D block... ..."

Cited by 14