### Table B-10. Multinomial Logit Model Estimation Results of Awareness of the I-405 Closures Before They Happened on August 15-18 or August 22-25.

1998

### TABLES TABLE I. Neutrino rates observed in the four operating solar neutrino experiments [15{18], and corresponding theoretical predictions of the Standard Solar Model (SSM) by Bahcall and Pinsonneault [19].

### Table 5. A comparison of predictions with simulation results for the GI/M/s/0 model with s = 400, Erlang (E4) interarrival times with c2 a = 0:25 and service rate = 1 in Example 10.3. Estimated blocking probabilities and standard deviations for the four estimators: simple (S), natural (N), indirect (I) and time-congestion (T ). Based on 20 batches from simulation runs of length 2700 after deleting an initial portion of length 5. The predictions are based on (15){(18) and Table 1.

1996

"... In PAGE 29: ... The experiment consists of 2 independent runs of length 2700 for each , deleting an initial portion of length 5 to allow the system to approach steady state. The simulation results and the predictions based on (15){(18) are displayed in Table5 . Again the predictions are good.... ..."

Cited by 23

### Table 4. A comparison of predictions with simulation results for the GI/M/s/0 model with s = 400, hyperexponential (Hb 2) interarrival times with balanced means having c2 a = 9:0 and service rate = 1 in Example 10.2. Estimated blocking probabilities and sample standard deviations for the four estimators: simple (S), natural (N), indirect (I) and time-congestion (T ). Based on 20 batches from simulation runs each of length 2700 after deleting an initial portion of length 5. The predictions are based on (15){(18) and Table 1.

1996

"... In PAGE 29: ... (The run length 2700 makes the expected total number of arrivals about 106 in each case.) The simulation results are displayed in Table4 .... In PAGE 31: ... h = + and l = ; (71) where = q (c2 a 1)=m : (72) As a rst concrete example, let s = 400; = 1; = 400 and c2 a = 9:0 as in the second case of Example 2.2 ( Table4 ). We consider 4 values of the common mean environment state holding time m: m = :03125; m = 0:1; m = 1:0 and m = 10:0.... ..."

Cited by 23

### Table 1. Cycle cost of secret sharing functions. scatter assemble verify recover k=2, n=3 23 15 18 51

"... In PAGE 3: ... On the other hand, our secret sharing scheme is able to recover a tampered data value much faster and only recovers tampered values. We will show in the results section ( Table1 ) that the computational cost of recovering function is in terms of hundreds of cycles. Considering other overheads of exception handling in which the value actually gets recovered (details presented in section 3.... In PAGE 9: ... By default, 1/5 of the application data is protected by secret sharing and all optimizations are enabled. Before we present results of our experiments, we first show in Table1 the computational cost (in cycles) of each secret sharing function in isolation under three typical k and n setups. The cycle numbers are measured using SimpleScalar simulator [5] and they are pure computation cycles and no memory latency is counted in.... ..."

### Table 4: System results by the training data WSJ 15-18 on the WSJ Section 21

"... In PAGE 4: ... One interesting fact is that when we tested our system using the data in CoNLL2004 shared task, we found the result with the train data WSJ 15-18 on the WSJ 21 is 73.48 shown in Table4 , which increases about 7 points in the F1 score, compared to WSJ 24 shown in Table 2. We found the label- ing accuracy for WSJ 24 is 87.... ..."

### Table 2. Distribution of derivative works in a 2018 song subset of the database.

### Table A.3. Growth of Population 2003-2023 2003 -2008 2008-2013 2013-2018 2018-2023

2005

### Table 2: K, LK and L for 2 n 8. This table lets many problems open, in particular concerning L(n). Note that since it is shown in [6, 15, 18] that a lower bound for gossiping under the k-port telegraph model (half-duplex, constant time) is

"... In PAGE 17: ...he other has 2 messages. None of these combination can happen after 2 steps under the B model. We let the reader check that it is possible to construct a gossip bus network with 6 vertices and bus of length at most 3. 6 Conclusion Table 1 summarizes the general results of this paper, and Table2 gives the values of K, LK and L for small values of n. 2d?1 lt; n lt; 2d?1 + 2d?2 2d?1 + 2d?2 n 2d ? 2 n = 2d ? 1 n = 2d K(n) dn2e ? 2d?3 n ? 2d?1 2d?1 ? 1 2d?1 LK(n) ( n if n even; pn if n odd; n 2d ? 1 2d L(n) pn + 1 pn + 1 2d ? 1 2d Table 1: General expressions of K, LK and L for n 8.... ..."

### Table 3 Average Years of Schooling of 15 and 18 year olds

1999

"... In PAGE 10: ...5. To explore whether the slowdown in the accumulation of schooling in the region continued through recent years we present in Table3 the average grades of schooling of more recent cohorts for the 11 LAC countries for which household surveys from the 1980s and the early 1990s are available to us. 19 If a child enters school at age six and goes through the system without interruption or repetition, s/he would be expected to have nine and 12 grades of schooling at ages 15 and 18 respectively.... ..."

Cited by 2