Results 1 - 10
of
281,481
Table 3 Period of Modern Structures
2002
"... In PAGE 19: ... c. Table3 . The period of repair and improvement that was attempted using a more robust approach to jetty building lasting up to the 1970s.... ..."
Table 2. Closure properties of formal languages
"... In PAGE 7: ...amily F of languages. Of course, every combing is a U-combing. The usefulness of an F-combing for a group may well depend on the decidability of certain problems for languages in F; the decidability properties of languages in various formal language families are shown in Table 1. For the purposes of this article we are interested also in the closure properties of the various families of formal languages, that is, questions such as whether or not the intersection of two languages in a family F, or the concatenation of two such families, is also in F; Table2 lists the relevant closure properties of various formal language families. The de nitions of most of the closure properties referred to in Table 2 are straightforward, and are given within that table.... In PAGE 7: ... For the purposes of this article we are interested also in the closure properties of the various families of formal languages, that is, questions such as whether or not the intersection of two languages in a family F, or the concatenation of two such families, is also in F; Table 2 lists the relevant closure properties of various formal language families. The de nitions of most of the closure properties referred to in Table2 are straightforward, and are given within that table. The properties related to homo- morphisms and GSM mappings may need some clari cation.... In PAGE 8: ... Where the properties P\Rg etc. are as de ned in Table2 , a family of languages is called a trio if it satis es P\Rg, P ?freeh and Ph?1, a full trio if it is a trio which also satis es Ph, an abstract family of languages (AFL) if it is a trio which also satis es P[, P and P+, and a full AFL if it is a full trio which also satis es P[, P and P . The families Rg, Cf, Ind and RcE are full AFL apos;s; Rc and Cs are AFL apos;s ([18, 8]).... ..."
Table 1: Modern Document Scoring Schemes
"... In PAGE 22: ... Again we can consider that errors occur in the pattern or in the text. Table1 illustrates this classification and places the existing schemes in context. Search Approach Data Structure Neighborhood Partitioning into Intermediate Generation Exact Searching Partitioning Errors in Text Errors in Pattern Errors in Text Errors in Pattern [10] Jokinen amp; Suffix Tree Ukkonen 91 [19] Shi 96 [24] Ukkonen 93 [5] Cobbs 95 Suffix Array [7] Gonnet 88 [17] Navarro amp; Baeza-Yates 99 [10] Jokinen amp; Q-grams n/a Ukkonen 91 [16] Navarro amp; [14] Myers 90 [9] Holsti amp; Baeza-Yates 97 Sutinen 94 Q-samples n/a [21] Sutinen amp; n/a [18] Navarro n/a Tarhio 96 et al.... In PAGE 22: ... Search Approach Data Structure Neighborhood Partitioning into Intermediate Generation Exact Searching Partitioning Errors in Text Errors in Pattern Errors in Text Errors in Pattern [10] Jokinen amp; Suffix Tree Ukkonen 91 [19] Shi 96 [24] Ukkonen 93 [5] Cobbs 95 Suffix Array [7] Gonnet 88 [17] Navarro amp; Baeza-Yates 99 [10] Jokinen amp; Q-grams n/a Ukkonen 91 [16] Navarro amp; [14] Myers 90 [9] Holsti amp; Baeza-Yates 97 Sutinen 94 Q-samples n/a [21] Sutinen amp; n/a [18] Navarro n/a Tarhio 96 et al. 2000 Table1 : Taxonomy of indexes for approximate text searching. A n/a means that the data structure is unsuitable to implement that search approach because not enough information is maintained.... In PAGE 42: ... Most research groups at TREC currently use some variant of these two weightings. Many studies have used the phrase tf-idf weighting to refer to any term weighting method that uses tf and idf, and do not differentiate between using a simple document scoring method (like C8 D8BEC9BNBW D8CU A1D0D2 C6 CSCU ) and a state-of- the-art scoring method (like the ones shown in Table1 ). Many such studies claim that their proposed methods are far superior than tf-idf weighting, often a wrong conclusion based on the poor weighting formulation used.... In PAGE 46: ... Finally, semistructured databases are designed to efficiently manage data that only partially conforms to a schema, or whose schema can evolve rapidly [1]. Each of these systems employ different physical and logical data models, query languages, and query processing techniques appropriate to the type of data being managed (see Table1 for a brief summary). There is a substantial body of work that deals with the design of each of these classes of information man- agement systems.... In PAGE 47: ...Relational amp; Object DBMS Semistructured (XML) DBMS Data Models Unstructured text documents possibly with structured fields Relations, Objects grouped into classes Directed edge-labeled graphs Query Models Extended boolean, Vector space, Probabilistic Relational model Relational model extended with graph operations and recursion Query Operators Boolean operators, Proximity operators, Pattern matching operators Relational operators Relational operators + (extended) path expressions + restructuring operators Example Query Languages Boolean, Natural language [5] SQL, OQL Lorel[2],UnQL[8] Table1 : Comparing different information management systems based on data and query modelsBE need to handle inventory information in a relational database as well as purchase orders received as (semistruc- tured) XML documents. Second, there are significant advantages in leveraging the facilities provided by one type of information management system to implement another.... ..."
Table 6 Reproduction of some creativity techniques as a word of the formal language
"... In PAGE 9: ... Verification (R: {(V, v)}) By verification of the stimuli, the participants create new ideas (v) for the existing situation. This formal language allows the reproduction of a creativity technique as a word of the language (some examples are illustrated in Table6 [17]). This word represents the algorithm of the technique and contains no details of its implementation.... ..."
Table.2. Comparison between formal and traditional developments for a byte code verifier
Table 2 indicates the modelling language. Company Formal technique Ref.
1999
"... In PAGE 3: ... Unfortunately, only SDL has gained wider acceptance in industry and the vast majority of formal methods projects are carried out with little or no industry involvement. Table2 lists some projects in which formal methods have been applied to the design of communications ser- vices in the industry, and that we consider important, for a number of reasons that will be discussed later. Most of these projects make use of a modelling language to spec- ify the service behavior, a property speci cation language to express behavioral constraints that the service should satisfy, and validation techniques (like model checking).... In PAGE 3: ... Table2 : Formal techniques in the comm. domain At Lucent, several formal method projects aimed at de- signing and implementing software for the Lucent 5ESS (Electronic Switching System) and several formal meth- ods have been applied over a longer time-period, e.... ..."
Cited by 8
Table 2. Distinction of Mediators and Facilitators. Tools are needed to support the development and maintenance of mediators. To have e ective tools a common formal paradigm is needed. We cited some early tools used to support the initial mediation projects. The emerging standards have been made public on the networks, to avoid proprietary dominance. Rapid development is possible by exploiting the same modern networks that make the architecture itself feasible. With network access to standards and the potential consumers, whoever build the best tools or provides the best services will gain the deserved advantage. 13
1995
Cited by 38
Table 3 shows the percentage of lost URLs in each class before and after the lost URLs were sent to a second searcher. Only 9% of the lost URLs were considered to be very important with regard to the ability for future research to verify and/or build on the given paper. After a second searcher looked for URLs that could not be found by the first searcher, none of the remaining lost URLs were considered very important. The 6 remaining lost URLs after the second searcher were two author homepages, a web link verifying tool listed as one of two possible tools to use for verifying web links in future research, the homepage of the OSF formal methods project (many papers from
"... In PAGE 5: ...6% 50% Very important 9.0% 0% Table3 : Classification of lost URLs. It turns out that RFCs are quite easy to find in new locations on the web.... ..."
Table 2: Last formal context
2005
"... In PAGE 9: ... The old dependency would be substituted for two new ones ( fIfInstruction ! BooleanExprg and fWhileInstruction ! BooleanExprg ) that will be conflrmed as correct. The formal context with Cases 1{7 appears in Table2 and the associated lattice is shown in Figure 5. 4 JV2M: a case study The examples used throughout the paper about Java source code are, actually, cases used in JV2M [5], an Intelligent Tutoring System (ITS) that teaches the compilation of object-oriented languages.... ..."
Cited by 1
Table 3 Formal Complexity Rules
1997
"... In PAGE 7: ... Next, we show how to use these primitive operations to implement the queries in our high level language, which allows us to determine the worst case run-time complexities of these queries on a pointer RAM. We rst give inference rules in Table3 that take the type and subtype system into account to give asymptotic run-time complexities for implementation of primitive set operations (Table 2) on a pointer RAM. The judgment ? ` fAg S; O(p) time can be read as \ In the type environment ?, if the precondition A is satis ed then S can be executed in O(p) worst case time quot;, where S could be either a statement or an expression, in which case we also assign a type to the computed expression.... In PAGE 7: ... If the predicate A is true then it may be elided. In the judgments in Table3 , may be any type except a strong base, and x is unit-space data computable in O(1) time. We shall not formally prove the soundness of the rules in Table 3 but will try to informally establish... In PAGE 7: ... type to the computed expression. If the predicate A is true then it may be elided. In the judgments in Table 3, may be any type except a strong base, and x is unit-space data computable in O(1) time. We shall not formally prove the soundness of the rules in Table3 but will try to informally establish... ..."
Cited by 5
Results 1 - 10
of
281,481