### Table 1: Representative areas and knowledge expected for IS graduates Organizational theory The organizational theory sub-area intends to give students knowledge to explore the ways in which organizations are analysed as entities within an environment, as subjects of strategic action, as technologies, as social structures, as cultures, and as physical structures. It also covers important topics such as knowledge management, change management and decision-making. Systems theory Systems theory should provide the basic concepts of general system theory, together with some well- known laws and principles, as well as other related topics such as viable systems and information theory. The application of systems theory to information systems is another important topic to consider.

"... In PAGE 4: ... Technology involves the creative use of hardware and software platforms to support the information systems. Those areas were further subdivided in significant sub-areas as presented in Table1 . Each sub-area was developed through consideration of the roles that IS professionals must play in organizations, for instance as CIO, systems analyst, IS project manager and IS consultant.... In PAGE 8: ...hain and electronic commerce. Their role and impact in the organization should be studied. Figure 2 presents the curriculum sub-areas related to the activities model, which was the basis of our curriculum proposal. Although Table1 only presents the main areas of organization and technology, the curricula also includes other complementary and interleaved topics and areas such as mathematics, economy, law, ethics, leadership and communication. Modules are the building blocks of our curriculum.... ..."

### Table 3: Cross-table for the Planets in the Solar system. .

in Knowledge Processing The Hard Way: Extracting Value From Symbolic Logic For Artificial Intelligence

"... In PAGE 12: ... Each of the planets is attributed an attribute according to whether its size is small, medium or large, whether its distance from the sun is near or far and whether it not it has moons. A cross-table describing these properties for each of the planets is described in Table3 and the resulting concept lattice is shown in Figure 12. It turns out that lattices have a wonderfully rich theory that allows us to mathematically explore a host of applications based on this simple idea.... ..."

### Table 2.1: Comparison of the quantities and fundamental mathematical equations of equilibrium statistical physics and large deviations theory.

2003

### Table 2 Experimental results based on difierent mathematical domains.

"... In PAGE 22: ...53% as shown in Table 1. Table2 shows the recognition rates based on mathematical domains. Among the six mathematical domains used in our experiment, Trigonometric Func- tions and Difierential Calculus gave the highest recognition rates of 97% while Number Theory gave the lowest recognition rate of 90%.... ..."

### Table 2. Game theory in negotiation

2001

"... In PAGE 6: ... More complex negotiations may arise when domains have competing or even conflicting objectives. For example, consider the setting illustrated in Table2 . Here we have two are two domains, each of... In PAGE 7: ...We assume that each domain starts with a limited number of routes of each type (see Table2 (c)). The domains are unable to share routes, and can only trade some of their routes with each other in order to increase their profits.... In PAGE 7: ... Game theory [2] provides a mathematical framework for studying situations where individual rational decision makers are working towards competing or conflicting objectives. We can use game theory to find a solution for the problem in Table2... In PAGE 8: ...omain D1). Thus this alternative is not a stable outcome. This observation is intuitively satisfying, since from a security point of view we can see that this alternative solution violates the least privilege principle (defined in the previous example). In light of this second example, let us reexamine our four questions for the general case of any negotiation that can be cast in terms of objective values and resources, as in Table2 . (Note that our previous example (in Table 1) can also be recast in this form.... In PAGE 9: ... Detecting success or failure becomes part of the negotiating strategy, and a decision as to whether to continue negotiating must be made at each step of the negotiation. For example, consider the prob- lem in Table2 , and assume that the contents of Table 2(a) are known only to Domain 1 and the contents of Table 2(b) are known only to Domain 2. This would constitute a negotiation with local constraints.... In PAGE 9: ... Detecting success or failure becomes part of the negotiating strategy, and a decision as to whether to continue negotiating must be made at each step of the negotiation. For example, consider the prob- lem in Table 2, and assume that the contents of Table 2(a) are known only to Domain 1 and the contents of Table2 (b) are known only to Domain 2. This would constitute a negotiation with local constraints.... In PAGE 11: ... Thus the information required to assign a numeric value to any given common state must be specified by the system administrator. This was the case in Table2 , where preferences were quantified as the value associated with each objective. This discussion and attempts to provide answers to our four questions for the case of negotiation with local constraints opens several avenues of further research: a.... ..."

Cited by 9

### Table 2. Game theory in negotiation

2001

"... In PAGE 6: ... More complex negotiations may arise when domains have competing or even conflicting objectives. For example, consider the setting illustrated in Table2 . Here we have two are two domains, each of... In PAGE 7: ...We assume that each domain starts with a limited number of routes of each type (see Table2 (c)). The domains are unable to share routes, and can only trade some of their routes with each other in order to increase their profits.... In PAGE 7: ... Game theory [2] provides a mathematical framework for studying situations where individual rational decision makers are working towards competing or conflicting objectives. We can use game theory to find a solution for the problem in Table2... In PAGE 8: ...omain D1). Thus this alternative is not a stable outcome. This observation is intuitively satisfying, since from a security point of view we can see that this alternative solution violates the least privilege principle (defined in the previous example). In light of this second example, let us reexamine our four questions for the general case of any negotiation that can be cast in terms of objective values and resources, as in Table2 . (Note that our previous example (in Table 1) can also be recast in this form.... In PAGE 9: ... Detecting success or failure becomes part of the negotiating strategy, and a decision as to whether to continue negotiating must be made at each step of the negotiation. For example, consider the prob- lem in Table2 , and assume that the contents of Table 2(a) are known only to Domain 1 and the contents of Table 2(b) are known only to Domain 2. This would constitute a negotiation with local constraints.... In PAGE 9: ... Detecting success or failure becomes part of the negotiating strategy, and a decision as to whether to continue negotiating must be made at each step of the negotiation. For example, consider the prob- lem in Table 2, and assume that the contents of Table 2(a) are known only to Domain 1 and the contents of Table2 (b) are known only to Domain 2. This would constitute a negotiation with local constraints.... In PAGE 11: ... Thus the information required to assign a numeric value to any given common state must be specified by the system administrator. This was the case in Table2 , where preferences were quantified as the value associated with each objective. This discussion and attempts to provide answers to our four questions for the case of negotiation with local constraints opens several avenues of further research: a.... ..."

Cited by 9

### Table 1 The current state of the art of Theory of synthesis .

1998

"... In PAGE 1: ... Our project inherits the core of the objectives of the parent project. Table1 shows our understanding of the current state of the art of Theory of synthesis. The important dimensions for classification of related knowledge include domain-dependence and static/dynamic, and the dynamic knowledge has subdimensions such as logical/mathematical/system.... ..."

Cited by 1

### Table 1: Some multiple sum identities found by PSLQ In another application to mathematical number theory, PSLQ has been used to inves- tigate sums of the form

"... In PAGE 4: ...[13] some base-3 formulas were obtained, including the identity 2 = 2 27 1 X k=0 1 729k quot; 243 (12k + 1)2 ? 405 (12k + 2)2 ? 81 (12k + 4)2 ? 27 (12k + 5)2 ? 72 (12k + 6)2 ? 9 (12k + 7)2 ? 9 (12k + 8)2 ? 5 (12k + 10)2 + 1 (12k + 11)2 # 5. Identi cation of Multiple Sum Constants A large number of results were recently found using PSLQ in the course of research on multiple sums, such as those shown in Table1 . After computing the numerical values of these constants, a PSLQ program was used to determine if a given constant satis ed an identity of a conjectured form.... In PAGE 4: ... Eventually, elegant proofs were found for many of these speci c and general results [6, 7]. Three examples of PSLQ results that were subsequently proven are given in Table1 . In the table, (t) = P1 j=1 j?t is the Riemann zeta function, and Lin(x) = P1 j=1 xjj?n denotes the polylogarithm function.... ..."

### Table 1. The mathematical expressions for three types of strain energies namely Ustretching, Ubending and Utwisting shown in the table has direct analogy with those derived from theory of elasticity [19].

### Table 1. Proofs, theories and programs, according to Fetzer (1988;2001).

"... In PAGE 4: ... 2.5 The comparison advanced by Fetzer (1988;2001), which we reproduce in Table1 , suggests that the differences between theorems and programs may outweigh their similarities. Programs, like scientific theories, have semantical significance that mathematical proofs do not possess.... ..."

Cited by 1