• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 17,910
Next 10 →

Table2. Recording environments for fixed-line network.

in SPEAKER VERIFICATION BASED ON SAUDI ACCENTED ARABIC DATABASE
by Mohamed Alkanhal, Mansour Alghamdi, Zeeshan Muzaffar

Table 1: Position of one of the fixed lines for resonance (3,0)

in Evaluating High Order Resonances Using Resonant Normal Forms
by Todesco Infn

Table 4: Example Routing Table in the VANET Scenario

in Attribute Based Routing in Sensor Networks ∗
by A. Agarwal, T. D. C. Little 2006

Table 2: A comparison of fixed and wireless Internet users in Western Europe, USA and the World

in Landscape
by Nikhilesh Dholakia, Ruby Roy Dholakia, Mark Lehrer, Nir Kshetri
"... In PAGE 6: ... Nations vary considerably in the penetration of mobile Internet access compared to fixed-line telecommunications and fixed-line Internet access. Whereas USA has been a global leader in overall Internet access, it lags far behind Europe and advanced economies of the Asia-Pacific region in terms of mobile Internet access ( Table2 ). One reason for this is that fixed-line access is relatively cheap and generally not metered in the U.... ..."

Table 1: Constraints on ! for various combinations of cameras and motion given the vanishing points vi of three orthogonal di- rections in the scene. The first three cases describe a single view of the scene where additional constraints are obtained from the knowledge that the camera is natural. Where two views are avail- able, the vanishing line of the second view image plane seen in the first view is l0 1. In the case of a fixed camera, la is the fixed line of H1 and li a side of the triangle of orthogonal vanishing points

in unknown title
by unknown authors 1999
Cited by 33

Table 2. Routing Schemes

in in IP/MPLS over optical
by Anna Urra, Eusebi Calle, Jose L. Marzo 2006
"... In PAGE 9: ...878 routing schemes throughout the experiment. SRS and SRSMI schemes show improve- ment over the RSFP scheme due to the shared backup mechanism used to protect HR requests (see Table2 ). It can be concluded from this simulation that using the RPDP scheme shows improvement over the previous routing schemes (NRS and NRSMI) for (1) all network scenarios when a shared backup mechanism is used to protect HR requests (SRS and SRSMI) and (2) low/medium protected network when a dedicated backup mechanism is used to protect HR requests (RSFP).... ..."

Table 1: Constraints on a170 for various combinations of cameras and motion given the vanishing points a84 a54a53 of three orthogonal di- rections in the scene. The first three cases describe a single view of the scene where additional constraints are obtained from the knowledge that the camera is natural. Where two views are avail- able, the vanishing line of the second view image plane seen in the first view is a87 a56a55 a172 . In the case of a fixed camera, a87 a56a57 is the fixed line

in unknown title
by unknown authors

Table 3. Coupled-Hazard Model Results VARIABLES COEFF. STD.

in Does One Standard Promote Faster Growth? An Econometric Analysis
by Robert J. Kauffman, Angsana A. Techatassanasoontorn
"... In PAGE 8: ...2. Results of the Coupled-Hazard Survival Model Table3 summarizes the coupled-hazard Weibull survival model estimation. The model has a likelihood ratio of 64.... In PAGE 8: ...atio of 64.48 (p=0.00). (See Table3 .) All digital wireless phone industry environment variables except the number of digital operators (DIGITAL_OPR) are significant.... ..."
Cited by 1

Table 1: Malaysia - Telecommunications Indicators, 1970-2000

in Telecommunications Reforms in Malaysia
by Cassey Lee
"... In PAGE 2: ... This emphasis on infrastructure development notwithstanding, the expenditures appear to be targeted mainly at the transport and power sectors. As a result, telecommunications indicators - such as the fixed line penetration ratio - remained relatively low particularly before 1980 ( Table1 ). In 1970, the fixed line penetration ratio was merely 1.... ..."

Table 2 The proposed routing schemes

in Abstract Performance evaluation of minimum interference routing in network scenarios with protection requirements
by Jose L. Marzo A, Eusebi Calle A, Pere Vilà A, Anna Urra B 2007
"... In PAGE 4: ... The presented routing algorithms are based on a well known QoS routing algorithm (WSP) [18], a minimum interference algorithm (LMIR) and a method for selecting shared backup paths (FIR). Table2 summarizes the pro- posed algorithms. 1.... ..."
Next 10 →
Results 1 - 10 of 17,910
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University