### Table 2. Types of Machine Guards

"... In PAGE 5: ...able 1: How Do Injuries Occur at the Point of Operation?..................................................................... 3 Table2 : Types of Machine Guards.... In PAGE 12: ... This includes the point of opera- tion, the power transmission apparatus, and rotary or reciprocating parts. Table2 describes three types of machine guards commonly used on woodwork- ing machinery: fixed, adjustable, and self-adjusting. To be effective, a guard should prevent employ- ees from contacting the dangerous parts of the machines, and it should be secure.... ..."

### Table 2. Real cubic elds: Computation h+ and theory H +

"... In PAGE 4: ...e use (2.1) to compute f(x) and thereby deduce h+(x)=g+(x)+(1=3)f(x). Our hope that the error term in Conjecture 3.1 can be reduced to o(x1=2)would require that the numbers in the last column of Table 1 and the next to last column of Table2 tend to zero. The data seems rather borderline in support of o(x1=2), but strongly indicative that our conjecture as stated is true, and moreover that the o(x5=6) can be reduced at least somewhat.... In PAGE 4: ...3), at most one linear combination g+(x)+uf(x)can agree with H +(x)towithino(x1=2). The last two columns of Table2 suggest that u =1=3 is more likely than u =0. Infactu =0:31 ::: would give the best t, in a least squares sense, and this agrees well with the theoretically favored u =1=3.... ..."

Cited by 3

### Table 1. Cubic Samples

"... In PAGE 4: ... From this combined catalogue we selected a number of subsamples with di erent magnitude limits and mor- phological type in order to investigate separately voids de ned by all galaxies and by elliptical galaxies (only de Vaucouleurs type T 0). A summary of the observational samples used is given in Table1 (for further explanations of Table 1 cf.... In PAGE 4: ... From this combined catalogue we selected a number of subsamples with di erent magnitude limits and mor- phological type in order to investigate separately voids de ned by all galaxies and by elliptical galaxies (only de Vaucouleurs type T 0). A summary of the observational samples used is given in Table 1 (for further explanations of Table1 cf.... In PAGE 15: ...2. Results Mean void diameters of galaxy samples for all cube sizes used are given in Table1 , separately for voids de ned by all galaxies and by elliptical galaxies, as well as by poor clusters of galaxies. Nearby galaxy samples contain both faint and bright galaxies, thus for nearby samples it is possible to calculate void diameters using several absolute magnitude limits.... In PAGE 17: ... Error bars indicate the rms error of void diameters. 90 and 120 h?1 Mpc) in Table1 . The relative rms scatter (calculated as v over hDvi from Table 1) of void diameters for clusters amounts to 32 % whereas the mean relative scatter of galaxy de ned voids for all galaxy samples in Table 1 is 27 %.... In PAGE 17: ... 90 and 120 h?1 Mpc) in Table 1. The relative rms scatter (calculated as v over hDvi from Table1 ) of void diameters for clusters amounts to 32 % whereas the mean relative scatter of galaxy de ned voids for all galaxy samples in Table 1 is 27 %. The overall range of mean void diameters de ned by all galaxies ranges from 9 to 25 h?1 Mpc, and from 13 to 36 h?1 Mpc for voids de ned by elliptical galaxies.... In PAGE 17: ... 90 and 120 h?1 Mpc) in Table 1. The relative rms scatter (calculated as v over hDvi from Table 1) of void diameters for clusters amounts to 32 % whereas the mean relative scatter of galaxy de ned voids for all galaxy samples in Table1 is 27 %. The overall range of mean void diameters de ned by all galaxies ranges from 9 to 25 h?1 Mpc, and from 13 to 36 h?1 Mpc for voids de ned by elliptical galaxies.... In PAGE 19: ...etermined in section 5.3). The spread is largest in bright galaxy and cluster samples (cf. Table1 ) where mean diam- eters of voids are close to the diameters of voids in Poisson samples with the same number density). We therefore con- clude that statistical properties of the identi ed voids are di erent from \voids quot; found in Poissonian samples.... ..."

### Table 14 Typed encoding of BA into NBA with guarded choice

1998

"... In PAGE 36: ... The translation of the capability and process types follows the same intuitions, and are direct consequence of the fact that the upward exchanges in the source ambient types are disregarded in the translation (for the reasons we just explained). The encoding of terms is given in Table14 . The main difference from the untyped case is in the use of a family of passwords prW and pwW , indexed on types, with the implicit assumption that prW , pwW : N[W ] for all (NBA) types W .... ..."

Cited by 5

### Table 14 Typed Encoding of BA into NBA with guarded choice

"... In PAGE 43: ... The translation of the capability and process types follows the same intuitions, and are direct consequence of the fact that the upward exchanges in the source ambient types are disregarded in the translation (for the reasons we just explained). The encoding of terms is given in Table14 . The main difference from the untyped case is in the use of a family of passwords prW and pwW , indexed on types, with the implicit assumption that prW , pwW : N[W ] for all (NBA) types W .... ..."

### Table 3.3: The opcodes for GUARD type instructions

1997

### Table 1: Theory stdlang

2003

"... In PAGE 10: ... 4.1 Theory stdlang: Language definitions Table1 summarizes the definitions in theory stdlang.5 Type void intends to serve as the type of procedures and statements, as opposed to functions and expressions.... ..."

### Table 1: The results in this paper: worst case upper and lower bounds on the number of vertex or point guards needed in order to guard different types of curvilinear polygons.

"... In PAGE 35: ... Since sg is not guarded by v1, we conclude that sg is not guarded at all, which contradicts our assumption that N is guarded by a finite set of guards. 7 Summary and future work In this paper we have considered the problem of guarding a polygonal art gallery, the walls of which are allowed to be arcs of curves (our results are summarized in Table1 ). We have demonstrated that if we allow these arcs to be locally convex arcs, n (vertex or point) guards are always sufficient and sometimes necessary.... ..."

### TABLE II RATIO OF GUARDED HOSTS IN EDONKEY NETWORK (FEB. 19, 2004). File type #offiles Median size # of sharing hosts Guarded %

2004

Cited by 3

### Table 1 Theory definition

"... In PAGE 15: ... We consider theory definition and proof as distinct activities and now consider the errors occurring in each. Data on the number of theories which subjects specified, up to and including the final (correct) theory, is given in Table1 . The data indicate that the task of making a definition is not straightforward, requiring an average of 7 iterations.... In PAGE 15: ... Errors occurring during theory definition are shown in Table 2. Errors of specific types are calculated with respect to the number of corrections (as given in Table1 ) as this corresponds to the number of theory loading actions.2 Object language errors are approxi- mately twice as frequent as metalanguage errors.... ..."