### Table 1 The basic mathematical model

"... In PAGE 3: ... To solve the mathematical model, techniques of successive subdivision in linear programming and integer numbers are applied. The basic mathematical model is presented at Table1 (at the end of the paper) 4. CONCLUSION The basic mathematical model presented here is a static one.... ..."

### Table 1. Results of the mathematical programs comparison

"... In PAGE 2: ... We have evaluate our model with Cplex version 6 on a PC with a Pentium II 400Mhz. Table1 gives results in seconds and in number of choice points that we have obtained. The sign gt; indicates that the computation time is greater than the last one given in the same column and - indicates that the resolution has been stropped before the end of the search.... ..."

### Table 2. Mathematical model for risk assessment.

"... In PAGE 5: ... The model is expressed mathemat- ically as the union of two sets, Pf and Cf, and an in- tegrated risk factor Rf of the following form: Rf = Pf + Cf - (Pf)(Cf) . Table2 outlines the details of the evaluation matrix used. In practice, this method would be applied to many elements of a program, and a risk factor would be obtained for each element.... In PAGE 7: ...1(A2) (A2) With dual wiring. Note: See Table2 for definitions of factors. costs depended on the volume and rate of orders.... In PAGE 8: ...1 Production schedule within manufacturing capability; 230 units already delivered. Note: See Table2 for definitions of factors. Figure 3.... ..."

### Table 9--Elasticity estimates from the different models

"... In PAGE 21: ... Because these four models are non-nested rationalizations of the s ame data, some divergence exists in t he elasticity estimates across the four models, with those from t he log-infrequency of purch ase model the most plausible. The last row of Table9 gives the sample me an of the elasticity of postal services demand with respect to the probability of compute r own ership. For the log-infrequency model, this mean elasticity implies that increases in th e p robability computer owners hip bring about reductions in the demand for postal delivery services at the household-level.... ..."

### Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics

2007

"... In PAGE 32: ... 5.3 Discussion Table4 provides an overview of the models that are discussed in this section and the subsequent section on modeling dynamics on networks. Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics ... ..."

Cited by 1

### Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics

"... In PAGE 32: ... 5.3 Discussion Table4 provides an overview of the models that are discussed in this section and the subsequent section on modeling dynamics on networks. Table 4: Network properties modeled and applicable models developed in mathematics / statistics / social network analysis and physics ... ..."

### Table 1: Applicability of ISO Security Services

1991

"... In PAGE 7: ...1 Security Services The OSI model speci es fourteen security services [12]. (They are summarized in Table1 ). These services, however, are not uniformly applicable to all types of objects being restricted by policy:... ..."

Cited by 3

### Table 17 Mathematics Achievement Analysis of Covariance

1998

"... In PAGE 74: ...7 The fourth analysis of covariance (ANCOVA) procedure examined mathematics total NCE scores. The ANCOVA summary table for mathematics total NCE achievement is shown in Table17 . The data were examined to determine if any two or... ..."

### Table 1. Mathematical notations.

"... In PAGE 3: ...o interaction between peers. Note that we only have one ISP in our model. The issues of multiple ISPs and multihoming are much more complicated and will appear in our future work. Lastly, Table1 contains all notations used in our mathematical model. Let a39a40a27a30a29 denote the traffic demand (or transmission rate in unit of Mbps) from peer a2 to peer a31 .... ..."