### Table 1: Embedded benchmark applications.

"... In PAGE 2: ... We simulated the warp processor execution for a number of standard embedded benchmark applications collected from several different benchmark suites, including Powerstone [15], EEMBC [4], MediaBench [11], and NetBench [16], in addition to a lean logic minimization algorithm [13]. Table1 presents a summary of the embedded benchmark applications considered. We only considered those applications amenable to speedup using FPGA, namely applications whose critical kernels do not use floating point arithmetic, dynamic memory allocation, recursion, function pointers, and regular pointers (other than for array accesses).... In PAGE 4: ... 4. Results We evaluate the performance and power consumption of our low-power warp processor for the embedded benchmark applications listed in Table1 . For all applications, we simulated the performance-driven and low-power warp processors utilizing an XScale port of the SimpleScalar simulator [3] to determine software execution cycles and gate-level simulations of the W- FPGA to determine hardware cycles for the partitioned critical kernels.... ..."

Cited by 1

### Table 1: Experiments on embedding a polygon in three half-planes.

1996

"... In PAGE 20: ... The number of possible poses for the polygon to be embedded in these generated half-planes was then computed, and the summarized results for all group are listed in the last two columns of the table. Table1 tells us that three half-planes are insu#0Ecient to limit all possible poses of an embedded polygon to a unique one, namely, the real pose; in fact the table suggests that... In PAGE 22: ... The ratio between these two squares #28circles#29 was set uniformly to be 1 2 for all seven groups of data. In contrast to Table1 , Table 2 tells us that two cones allowaunique pose of an inscribed polygon in most cases. In each group of tests, only cases with one pose or two poses occurred, and the mean of possible poses stayed very close to 1, independent of the mean polygon size.... ..."

Cited by 19

### Table 1: Experiments on embedding a polygon in three half-planes.

1996

"... In PAGE 15: ... The number of possible poses for the polygon to be embedded in these generated half-planes was then computed, and the summarized results for all group are listed in the last two columns of the table. Table1 tells us that three half-planes are insu#0Ecient to limit all possible poses of an embedded polygon to a unique one, namely, the real pose; in fact the table suggests that a linear #28in the size of the polygon#29 number of possible poses will usually exist. We can see in the table that despite the appearances of cases with one or two possible poses, the ratio between the mean of numbers of possible poses and mean polygon size lies in the approximate range 0.... In PAGE 17: ...squares #28circles#29 was set uniformly to be 1 2 for all seven groups of data. In contrast to Table1 , Table 2 tells us that two cones allowaunique pose of an inscribed polygon in most cases. In each group of tests, only cases with one or two poses occurred, and the mean of possible poses stayed very close to 1, independent of the mean polygon size.... ..."

Cited by 19

### Table 1: Experiments on embedding a polygon in three half- planes.

"... In PAGE 6: ... The number of possible poses for the polygon to be embedded in these generated half-planes was then computed, and the summarized results for all group are listed in the last two columns of the table. Table1 tells us that three half-planes are insufficient to limit all possible poses of an embedded polygon to a unique one, namely, the real pose; in fact the table suggests that linear (in the size of the polygon) number of possible poses will usually exist. We can see in the table that despite the appearances of cases with one or two possible poses, the ratio between the mean of numbers of possible poses and mean polygon size lies in the approximate range 0.... In PAGE 7: ... The ratio between these two squares (circles) was set uniformly to be 1 2 for all seven groups of data. In contrast to Table1 , Table 2 tells us that two cones allow a unique pose of an inscribed polygon in most cases. In each group of tests, only cases with one pose or two poses occurred, and the mean of possible poses stayed very close to 1, independent of the mean polygon size.... ..."

### Table 1: Experiments on embedding a polygon in three half- planes.

"... In PAGE 6: ... The number of possible poses for the polygonto be embedded in these generated half-planes was then computed, and the summarized results for all group are listed in the last two columns of the table. Table1 tells us that three half-planes are insufficient to limitall possible poses of an embedded polygon to a unique one, namely, the real pose; in fact the table suggests that linear (in the size of the polygon) number of possible poses will usually exist. We can see in the table that despite the appearances of cases with one or two possible poses, the ratio between the mean of numbers of possible poses and mean polygonsize lies in the approximate range 0.... In PAGE 7: ... The ratio between these two squares (circles) was set uniformly to be 1 2 for all seven groups of data. In contrast to Table1 , Table 2 tells us that two cones allow a unique pose of an inscribed polygon in most cases. In each group of tests, only cases with one pose or two poses occurred, and the mean of possible poses stayed very close to 1, independent of the mean polygon size.... ..."

### Table 1: EERs for various line lengths and embedding powers.

2002

"... In PAGE 3: ... Our goal was to find the mini- mum polygonal line length and the maximum watermark embed- ding power that allow for credible detection while guaranteeing imperceptible embedding. Thus, the algorithm was applied with different embedding power values p on individual polygonal lines of various lengths and the ROC (Receiver Operating Character- istics) curves (plots of the probability of false alarm Pfa versus the probability of false rejection Pfr), as well as the correspond- ing Equal Error Rate points (the points on the ROC curve where the probability of false alarm equals the probability of false re- jection) were evaluated ( Table1 ). Visual inspection demonstrated that distortions are almost impossible to be observed when p is smaller than 0.... ..."

Cited by 1

### Table 4: Polygon functions.

"... In PAGE 111: ...3 Obtaining the Operation Frequency Table In addition to the partitioning and polarization data, information regarding the frequency of occunence of each operation is required. Table4 gives an example of frequencies for some GIS operations at four sites. Table 4: Frequency of occurrence of some operations on four sites Operation Frequency of Occurrence Site I (%) Site 2 (%) Site3 (%) Site 4 (%) arcs polygonshades intersection mapextents 25 30 50 25 25 30 20 30 30 20 l0 20 20 20 20 25... In PAGE 111: ... Table 4 gives an example of frequencies for some GIS operations at four sites. Table4 : Frequency of occurrence of some operations on four sites Operation Frequency of Occurrence Site I (%) Site 2 (%) Site3 (%) Site 4 (%) arcs polygonshades intersection mapextents 25 30 50 25 25 30 20 30 30 20 l0 20 20 20 20 25... ..."

### Table 1 Qualitative comparison of embedded application implementations

2004

"... In PAGE 6: ... Some of the key featur es of the FLIX core have been preserved in order to support the notion of its local time and time tick by executing all native instructions in equal time that corresponds to one system tick . A qualitative comparison of different implementation strategies of embedded applications and our motivation for REFLIX development are summarized in Table1 . Reactive features in embedded systems may be mapped into finite state machines (FSMs) and ... ..."

Cited by 2

### Table 1. The embedded applications used in this study.

2002

"... In PAGE 7: ... The applications are taken from various domains such as printing, digital photography, signal processing and communications. Table1 presents a brief description of the applications used. Table 1.... ..."

Cited by 4

### Table 1. TEOS embedded networked systems and applications.

"... In PAGE 3: ... Over the past 4 years, CENS researchers have de- ployed a diversity of fixed and mobile (robotic) net- worked instruments and sensor arrays, some of which serve the needs for engineering and software develop- ment field tests, while others support short and long- term biological investigations. Table1 presents a ma- trix of our currently deployed systems, hardware and software development platforms, sensors streams and related data types, spatial and temporal coverage of the data streams, and the ecological focus of our tests. The four primary categories of networked instruments, sen- sornets, and cyberinfrastructure now in place at the James Reserve are described.... ..."