Results 1 - 10
of
71,697
Table 1. Constructs of mobile use context
"... In PAGE 1: ... Especially in mobile computing, an awareness of the context surrounding the users and their mobile devices has been a primary concern [1]. In this aspect, therefore, we propose the constructs of mobile use context as shown in Table1 . We categorize mobile use context according to the following: external and internal context.... In PAGE 2: ... Monitoring diary is composed of two parts: specific context questions based on our constructs of mobile use context, and usability problem in that context. The degree of each construct was measured based on 7-point scale, 0 through 6, for example, undistracted(0) through very distracted(6) in auditory distraction (see Table1 ). Part of the usability problem was reported as open-ended.... In PAGE 2: ... Results from the monitoring study As we predicted, the results from monitoring study indicate that mobile Internet users are, indeed, involved in widely varying use contexts. Moreover, each construct of our context model (see Table1 ), such as the degree of social interaction, auditory distraction, timeliness of use and so on, varies according to changing use situations. Indoor vs.... ..."
Table 3b. Solution Statistics for Model 2 (Minimization)
1999
"... In PAGE 4: ...6 Table 2. Problem Statistics Model 1 Model 2 Pt Rows Cols 0/1 Vars Rows Cols 0/1 Vars 1 4398 4568 4568 4398 4568 170 2 4546 4738 4738 4546 4738 192 3 3030 3128 3128 3030 3128 98 4 2774 2921 2921 2774 2921 147 5 5732 5957 5957 5732 5957 225 6 5728 5978 5978 5728 5978 250 7 2538 2658 2658 2538 2658 120 8 3506 3695 3695 3506 3695 189 9 2616 2777 2777 2616 2777 161 10 1680 1758 1758 1680 1758 78 11 5628 5848 5848 5628 5848 220 12 3484 3644 3644 3484 3644 160 13 3700 3833 3833 3700 3833 133 14 4220 4436 4436 4220 4436 216 15 2234 2330 2330 2234 2330 96 16 3823 3949 3949 3823 3949 126 17 4222 4362 4362 4222 4362 140 18 2612 2747 2747 2612 2747 135 19 2400 2484 2484 2400 2484 84 20 2298 2406 2406 2298 2406 108 Table3 a. Solution Statistics for Model 1 (Maximization) Pt Initial First Heuristic Best Best LP Obj.... In PAGE 5: ...) list the elapsed time when the heuristic procedure is first called and the objective value corresponding to the feasible integer solution returned by the heuristic. For Table3 a, the columns Best LP Obj. and Best IP Obj.... In PAGE 5: ... report, respectively, the LP objective bound corresponding to the best node in the remaining branch-and-bound tree and the incumbent objective value corresponding to the best integer feasible solution upon termination of the solution process (10,000 CPU seconds). In Table3 b, the columns Optimal IP Obj., bb nodes, and Elapsed Time report, respectively, the optimal IP objective value, the total number of branch-and-bound tree nodes solved, and the total elapsed time for the solution process.... ..."
Table 2: Mobile Database Parameters
Table 4. Throughput and response time for various locations of the cache with the shopping mix and column-based invalidation with the single-row optimization
"... In PAGE 6: ...1), or on the database for the browsing mix. Table4 shows the corresponding results for the shopping mix. The results differ depending on the location of the cache, but only by small amounts.... ..."
Table 4: Earnings mobility (1984{89)
1996
"... In PAGE 12: ...We use these data to construct Tables 4, 5 and 6 where we report the conditional transition probabilities for the 1984 earnings, income and wealth quintiles. For example, the entry in the rst row and the rst column of Table4 reports that approximately 86% of the households in the lowest earnings quintile in 1984, were also in the lowest earnings quintile in 1989. To avoid the role of retirees in shaping the mobility of those with zero earnings, Table 7 reports the mobility in earnings of those with positive observations in both sample periods.... ..."
Cited by 1
Table 3. Throughput and response time for various locations of the cache with the browsing mix and column-based invalidation with the single-row optimization
"... In PAGE 6: ...1, motivate an investigation of the effect of locating the cache on the front-end or on the back-end machine. Table3 shows the throughput and the response time with the cache on the (single) front-end, on a dedicated machine (as in Section 6.1), or on the database for the browsing mix.... ..."
Table 1: Classification of invalid URLs.
"... In PAGE 3: ... We removed these URLs from the dataset and the percentages reported are for the remaining URLs. Table1 and Figure 3 show the percentage of the remaining invalid URLs contained in each category. For 79.... In PAGE 3: ...9%. The revised percentages of URLs in each category after the second searcher can be seen in Table1 and Figure 3. There was a significant difference between the five individu- als that participated in the experiment for the success of locating URLs.... ..."
Table 1: Classification of invalid URLs.
in ABSTRACT Persistence of information on the web: Analyzing citations contained in research articles
"... In PAGE 3: ... We removed these URLs from the dataset and the percentages reported are for the remaining URLs. Table1 and Figure 3 show the percentage of the remaining invalid URLs contained in each category. For 79.... In PAGE 3: ...9%. The revised percentages of URLs in each category after the second searcher can be seen in Table1 and Figure 3. There was a significant difference between the five individu- als that participated in the experiment for the success of locating URLs.... ..."
Table 5: Mobile Database Parameter Setting
"... In PAGE 7: ... These include costs of sending data and acknowledgement messages, pro- tocol overheads as well as blocking due to collisions with other tags. In the evaluation of mobile database, the values of the various parameters of the mobile database model and the workload is summarized in Table5 and 6. For the access behavior, the typical value is 80#25 of all transactions accesses go to 20#25 of the database pages.... ..."
Table 5. Recognition rates on NIST databases reported by other authors.
in A Methodology For Feature Selection Using Multiobjective Genetic Algorithms For Handwritten . . .
2003
"... In PAGE 21: ... Since about 75% of the strings of digits of the NIST database consist of naturally isolated digits, the classi er optimized in this context, which has about 25% less features than the original classi er, provided the same reliability rates as those found in the original system. Table5 summarizes the recognition rates claimed by di erent authors on NIST... In PAGE 22: ...Kim19 used 5000 strings but they did not specify the data used. By comparing the results reached by our system (Table 4) with those reported by other authors ( Table5 ), we can con rm that our system provides very good recognition rates at zero-recognition level and a very encouraging error-reject trade-o . Since there is an interdependence between features where two or more features between them convey important information, it is very di cult to analyze the unselected features independently.... ..."
Cited by 12
Results 1 - 10
of
71,697