### Table 2: Numerical results for the tunneling methods classical tunneling exponential tunneling

"... In PAGE 14: ... We run our program on a SUN SPARC station and summarize the numerical results in Tables 1 { 3, with Table 1 containing the results for the basic semismooth solver from Algorithm 2.1, Table2 containing the results for the modi cation using the two di erent tunneling approaches, and Table 3 containing the results for the two di erent lled function modi cations (here, we call the lled functions P1 and P2 the exponential and the rational lled function, respectively). The columns of these tables have the following meanings: problem: name of the test problem in GAMSLIB/MCPLIB n: dimension of the test problem SP: number of starting point used ksemi: number of iterations used in the basic semismooth solver ktotal: total number of iterations used jglobal: number of times we switch to the global optimization technique kr(xf)k1: norm of the natural residual at the nal iterate xf.... In PAGE 18: ... In fact, the overall behaviour of the basic solver is much better, and it is able to solve all other problems basically without any di culties. From the results in Table2 we can deduce a couple of things: First of all, the global optimization technique usually does not become active if the basic method itself was able to solve the underlying problem. The only exception is problem vonthmcp.... ..."

### Table 2. Classical del Pezzo surfaces as hypersurfaces in C P3(w) Index w

"... In PAGE 21: ... In all such cases techniques of [DK] say nothing about the corresponding Zw. Table2 below gives the classical examples of Zw that can be written as smooth hypersurfaces in weighted projective spaces and which by other methods admit K-E metrics [TY]. We only indicate a particular polynomial as the most general such hypersurface involves many such monomials which for reasons of space we do not include.... ..."

Cited by 12

### Table 1: Wind Tunnel Fr

2003

"... In PAGE 3: ...004 ee Stream Conditions correlations based on higher fidelity viscous CFD solutions in the present study. Representative flow conditions for each of the standard 20-Inch Mach 6 Air Tunnel operating points at which tests were con- ducted have been computed using the GASPROPS20 code and are listed in Table1 . The flow conditions listed in Table 1 were used as the free stream flow conditions used in the viscous CFD solutions from which boundary layer edge conditions were extracted in the present study at angles-of-attack of 20-degrees, 30-degrees, and 40-degrees.... In PAGE 3: ... Representative flow conditions for each of the standard 20-Inch Mach 6 Air Tunnel operating points at which tests were con- ducted have been computed using the GASPROPS20 code and are listed in Table 1. The flow conditions listed in Table1 were used as the free stream flow conditions used in the viscous CFD solutions from which boundary layer edge conditions were extracted in the present study at angles-of-attack of 20-degrees, 30-degrees, and 40-degrees. Global surface heating distributions were obtained using the digital optical measurement method of two-color, relative-intensity, phosphor thermography21-25.... In PAGE 4: ...1905 mm CL1 CL2 CL3 CL4 CL5 CL6 AL3-20 AL3-30 AL3-40 AL4-20 AL4-30 AL4-40 AL5-20 AL5-30 AL5-40 AL6-20 AL6-30 AL6-40 Port 3 American Institute of Aeronautics and Astronautics Navier-Stokes LAURA option. Free stream conditions for the computations were set to the nominal operat- ing conditions of the NASA LaRC 20-Inch Mach 6 Air Tunnel, which are listed in Table1 . For these com- putations, a uniform, ambient 300 K wall temperature boundary condition was imposed.... ..."

### Table 5. Results on real-life datasets Satellite Pendigits Dig44 Vst method

2000

"... In PAGE 9: ... Each database was split into three disjoint parts: a learning set (LS), a pruning set (PS) and a test set (TS). Results are summarized in Table5 (from top to bottom): { A single decision tree was built from LS, then post-pruned using PS with classical and median discretization. { Using the same 25 bootstrap samples, we built 25 fully developed trees ( = 1:0) with classical discretization, we pruned them individually, then in a combined way and tested the three bagged sets of trees using class- probability estimates averaging.... In PAGE 10: ... Combined pruning. From Table5 , it is clear that individual pruning tends to produce trees which are not complex enough given the reduction of variance due to bagging. On the other hand, combined pruning always decreases complexity (by 20% on average) without notable change in accuracy with respect to full... ..."

Cited by 1

### Table 1 FASER Wind Tunnel Experiment Procedures

"... In PAGE 4: ... The experiment design used for FASER wind tunnel testing was a hybrid design broken down into a series of procedures. The procedures are listed in Table1 . Randomization4-6 was used throughout the testing, to separate independent variable effects from time-dependent systematic errors.... ..."

### Table 6: Decomposition of the individual income effects

### Table 3.1. Comparison of key system requirements for spectra-selective sensing with digital interferogram filtering (Dig) and TDF methods.

2004

### Table 1. Efficiency of the Code as a Function of the Number of Tunnels

1999

"... In PAGE 11: ... The efficiency of encoding, measured as the ratio of the number of the pixels in the surface to the number of elements in the ultimate sequence (plus one), is essentially better as that of the method of Section 3. It depends on the genus of the surface, as shown in Table1 for the worst case : small objects whose walls are only one voxel thick. For bigger objects the efficiency is much better, as shown by the upper curve in Fig.... ..."

Cited by 2

### Table 4 shows the overall results for this RAIM method. The overall user cost for the optimized RAIM parameters is very low, and we see that the probability of an undetected penetration of the outer precision-landing tunnel is simply Pr(vert. error gt; 15 m) Pr(MD | vert. error gt; 15 m) = 2.7 x 10-7. This result is very close to the desired probability of 1 x 10-7 as specified in the RNP tunnel concept [9], although it does not necessarily include the effects of all possible ranging errors. For a VDOP limit of 3.0, availability is still very high, and false alarms are infrequent. Overall, these results are very promising and suggest that further improvements to RAIM software can be achieved.

"... In PAGE 7: ... Table4 : Residual RAIM Results Summary 6.2 WAAS correction warning algorithms Another RAIM approach that may be especially suitable for WAAS is based on the very probability models we have built to describe spatial decorrelation errors.... ..."