### Table 13: Histogram of the error ratio U/L computed by approx-mpe(i) algorithm on cpcs360b network with LIKELY evidence (10 nodes). Summary on 1000 instances. range % U/L Mean Mean Mean Mean Mean Mean MPE U/L

1998

Cited by 27

### Table 17: Histogram of the error ratio U/L computed by approx-mpe(i) algorithm on cpcs422b network with LIKELY and RANDOM evidence (10 nodes). 1000 instances per each value of i.

1998

Cited by 27

### Table 1: Topologic relations in 1D and in 2D. 1. We investigate the e ect of small changes of two sets on their relations. This will reveal a network of likely changes between the relations. 2. We present a probabilistic description of the uncer- tainty of the relations, which allows to derive the prob- ability of a certain relation given the boundary of a set and its uncertainty.

1994

Cited by 1

### Table 1. Operating point definitions for the GPSP.

1997

"... In PAGE 18: ...ath length varied in the ranges [0.1, 0.8] and [4, 8], respectively. Operating point number 8 in Table1 was employed for this test case. The results are summarized in Table 2.... In PAGE 19: ... Thus, the variables (the graph connectivity, the path length and the operating point) are set to maximize the convergence rate so that the network is likely to converge to a solution without requiring unreasonable simulation time. Earlier simulation work shows the convergence rate is the highest for low graph connectivity, the operating point given by number 1 in Table1... ..."

Cited by 6

### Table 7.1: Summary of the results. The KLKS braching ratio is obtained from KS ! 0 0 decay in our experiment, whereas OBELIX detects the + ? decay mode. The summary shows a good agreement between the former Crystal Barrel results and the values derived in this report. The large discrepancy between our value for the 0 0 branching ratio and the corresponding OBELIX value is still unresolved. But our KSKL value agrees with OBELIX result. They measured KL apos;s decaying into + ? whereas we looked for the 0 0 deacy mode. This accordance may be a hint for a reason of the large discrepancy of the 0 0 branching ratios. Their KLKS branching ratio is independent on their determined detection e ciency in contrast to the 0 0 value.

### Table 2. Detectability d8 as a Function of the Duration Background for

1996

"... In PAGE 6: ...22,23 A consequence is that a duration below this optimum exists for which flashes of the adaptation field are equally detectable as prolonged blocks of the same contrast. According to Table2 , flash durations of 10 ms (for observer HS) and 20 ms (for observer LP), re- spectively, have detectability roughly equal to that of the 500-ms luminance blocks used in experiment 1. Based on these results, we ran experiment 2 with 10-ms flashes in the adaptation field for observer HS and 20-ms flashes for observer LP.... In PAGE 9: ...6 (Table 1) ap- parently not depending on the value for t. However, our estimates of g in Table2 (as well as those derived from experiment 2) are in good agreement with power expo- nents obtained in spatial (instead of temporal) contrast discrimination and masking experiments.38 This sug- gests that the test disk in our experiments is mainly de- tected through its spatial structure.... ..."

### Table 2. Flat Propositional Contrastive Logic: Semantics

"... In PAGE 48: ... The syntax of CL1 is presented in Table 1. I now turn to the semantic de nition of CL1, presented in Table2 . I use `j= apos; to ambiguously denote satisfaction both of a classical propositional formula over one world, and for the satisfaction of a contrastive formula over two worlds, leaving the distinction to context.... In PAGE 126: ...Strong Cut-Elimination for Constant Domain First-Order S5 name of condition de nition general for every n, n is accessible from reverse for every n, is accessible from n re exivity is accessible from transitivity if is a proper initial segment of , then is accessible from universal any label is accessible from any label Table 1. conditions on accessibility logic Conditions on Accessibility K, KD general KT general, re exivity KB, KDB general, reverse3 KTB general, re exivity, reverse K4, KD4 general, transitivity S4 (= KT4) general, re exivity, transitivity S5 (= KTB4) universal Table2 . accessibility conditions for various logics label is available on a branch, if it occurs on that branch.... In PAGE 126: ... 402)), namely: L2 X; ( ; 2A) ! Y ` X; ( ; A) ! Y for any accessible from provided (i) for K; KB; and K4; must be available on the branch; (ii) for KD; KT; KDB; KTB; KD4; S4; and S5; must either be available on the branch or must be a simple, unrestricted extension of R2 X ! ( ; 2A); Y ` X ! ( ; A); Y provided is a simple, unrestricted extension of The tableau rules for _, :, 8 and the structural rules mon and cut remain unchanged. If S is any system listed in Table2 , let TQS be the tableau presentation of its constant domain rst-order extension. If we try to reuse the proof of strong cut-elimination for TQS5 in order to establish strong cut-elimination for TQS, we have to be careful, since both R2 and L2 come with complex side conditions.... ..."

### Table 1. Contrasting Empirical Models MODEL

"... In PAGE 5: ... We use a modified Bass model [3, 8] and a coupled- hazard survival model [9] to model state-wise digital wireless phone diffusion. (See Table1 and Figure 1 for comparisons.) The former model provides an appropriate point of comparison to validate the results that we have obtained from the coupled-hazard model, a new model that offers a different estimation structure for the theory and somewhat different managerial insights.... ..."

Cited by 1

### TABLE I LIST OF OUR URBAN AND RURAL WILD TESTBED LINKS. deployments of which we are aware. However, the two studies are orthogonal: we focus on loss variability char- acterization, determining the impact of different sources of losses and remedies for loss alleviation, their work focused more on performance analysis of 802.11 network at various layers in the network stack and the effect of other parameters (weather, SNR, payload, datarate) on loss. Our work also differs from mesh networks like Roofnet [1] in that WiLD networks, as we show, have very different loss characteristics, with loss much more due to external interference than multipath effects.

2007

Cited by 3

### Table 1. Reference threshold contrast detail detectability values for the FAXIL Curves F16, F25 and F33

"... In PAGE 3: ...HTref(Ai) is taken ( Table1 ). The mean value of these ratios, summed over all available detectable data points, will be the quality index.... In PAGE 5: ... Appropriate kerma rate normalization factors are employed to modify the overall magnitude of the TCDD curves to account for different input kerma rates that relate to the different FOVs. The FAXIL data for the 30/36 cm FOV (F33) and 15/ 17 cm FOV (F16) were used [9] ( Table1 ). Apparent detail size correction factors were calculated from the ratio of these sizes (33 cm and 16 cm, respectively, for the mid point of each range) to F25.... ..."