• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 101,335
Next 10 →

Table 1 The basic mathematical model

in From a Multicriterion Model to a Mathematical Model to Support Decision Making in Regards the Selection of Continuous Training Activities
by Marie-michèle Boulet, Clermont Dupuis, Université Laval
"... In PAGE 3: ... To solve the mathematical model, techniques of successive subdivision in linear programming and integer numbers are applied. The basic mathematical model is presented at Table1 (at the end of the paper) 4. CONCLUSION The basic mathematical model presented here is a static one.... ..."

Table 1. Results of the mathematical programs comparison

in A Scheduling Problem With Multiple Purposes and Unrelated
by Resources The Farmer, Guillaume Thisselin, Antony Vignier
"... In PAGE 2: ... We have evaluate our model with Cplex version 6 on a PC with a Pentium II 400Mhz. Table1 gives results in seconds and in number of choice points that we have obtained. The sign gt; indicates that the computation time is greater than the last one given in the same column and - indicates that the resolution has been stropped before the end of the search.... ..."

Table 2. Mathematical model for risk assessment.

in F/A-18 E/F Program Independent Analysis
by John P. Halpin, Peter P. Pandolfini, Peter P. P, Paul J. Biermann, Thomas J. Kistenmacher, James S.O'Connor, Lawrence W. Hunter, James S. O’connor, Daniel G. Jablonski
"... In PAGE 5: ... The model is expressed mathemat- ically as the union of two sets, Pf and Cf, and an in- tegrated risk factor Rf of the following form: Rf = Pf + Cf - (Pf)(Cf) . Table2 outlines the details of the evaluation matrix used. In practice, this method would be applied to many elements of a program, and a risk factor would be obtained for each element.... In PAGE 7: ...1(A2) (A2) With dual wiring. Note: See Table2 for definitions of factors. costs depended on the volume and rate of orders.... In PAGE 8: ...1 Production schedule within manufacturing capability; 230 units already delivered. Note: See Table2 for definitions of factors. Figure 3.... ..."

Table 9--Elasticity estimates from the different models

in Changes in the Household-Level Demand for Postal Delivery Services from 1986 to 1994
by Frank A. Wolak
"... In PAGE 21: ... Because these four models are non-nested rationalizations of the s ame data, some divergence exists in t he elasticity estimates across the four models, with those from t he log-infrequency of purch ase model the most plausible. The last row of Table9 gives the sample me an of the elasticity of postal services demand with respect to the probability of compute r own ership. For the log-infrequency model, this mean elasticity implies that increases in th e p robability computer owners hip bring about reductions in the demand for postal delivery services at the household-level.... ..."

Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics

in Network Science
by Katy Börner, Soma Sanyal, Alessandro Vespignani 2007
"... In PAGE 32: ... 5.3 Discussion Table4 provides an overview of the models that are discussed in this section and the subsequent section on modeling dynamics on networks. Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics ... ..."
Cited by 1

Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics

in unknown title
by unknown authors
"... In PAGE 32: ... 5.3 Discussion Table4 provides an overview of the models that are discussed in this section and the subsequent section on modeling dynamics on networks. Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics ... ..."

Table 2: Mathematical model.

in A Survey of Formal Hardware Verification Tools Developed in Europe
by Jean Mermet, Adam Morawiec

Table 1: Applicability of ISO Security Services

in An End-to-End Argument for Network Layer, Inter-Domain Access Controls
by Deborah Estrin, Deborah Estrin, Gene Tsudik, Gene Tsudik 1991
"... In PAGE 7: ...1 Security Services The OSI model speci es fourteen security services [12]. (They are summarized in Table1 ). These services, however, are not uniformly applicable to all types of objects being restricted by policy:... ..."
Cited by 3

Table 17 Mathematics Achievement Analysis of Covariance

in unknown title
by unknown authors 1998
"... In PAGE 74: ...7 The fourth analysis of covariance (ANCOVA) procedure examined mathematics total NCE scores. The ANCOVA summary table for mathematics total NCE achievement is shown in Table17 . The data were examined to determine if any two or... ..."

Table 1. Mathematical notations.

in Performance Modeling on the interaction of ISPs
by Sam C. M. Lee, Joe W. J. Jiang, John C. S. Lui
"... In PAGE 3: ...o interaction between peers. Note that we only have one ISP in our model. The issues of multiple ISPs and multihoming are much more complicated and will appear in our future work. Lastly, Table1 contains all notations used in our mathematical model. Let a39a40a27a30a29 denote the traffic demand (or transmission rate in unit of Mbps) from peer a2 to peer a31 .... ..."
Next 10 →
Results 1 - 10 of 101,335
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University