• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28,185
Next 10 →

TABLE III TRUST-BASED QUIZ ALGORITHM

in Result Verification and Trust-based Scheduling in Peer-to-Peer Grids
by Shanyu Zhao, Virginia Lo, Chris GauthierDickey

Table 3: Trust criteria for sources and objects of trust (based on TAN, THOEN 2001) Sources and objects of trust

in 1 MANAGEMENT OF PERCEIVED RISKS IN E-BUSINESS FOR EFFICIENT FOOD SUPPLY NETWORK MANAGEMENT: THE CASE OF TRUST 1
by Melanie Fritz, Maurizio Canavari, Melanie Fritz, Maurizio Canavari
"... In PAGE 8: ... Building on this basis, the factors for trust generation in food networks emerged from the empirical work and the literature study have been used for the construction of the hierarchic decision model for trust generation in e-business for food networks. TAN and THOEN (2002) define the transaction partner and available control mechanisms as sources for the generation of trust in transactions and at the same time as objects, which need to be trusted (see Table3 ). They distinguish objective and subjective criteria generating trust towards transaction partner or control mechanism.... ..."

Table 2. wall clock times in seconds for I/O on the T3E.

in HPCN and air quality modeling
by J. G. Blom, W. M. Lioen, J. G. Verwer 1998
"... In PAGE 7: ... Strictly speaking, BUFFER OUT is not standard Fortran, so this approach is not portable. In Table2 we show the CPU time (column CPU) of our model without doing any I/O. For the I/O we show the minimum, average and maximum wall clock times.... In PAGE 7: ...From Table2 we see a signi cant di erence between minimum and maximum times. This is because we are dealing with shared physical devices.... ..."
Cited by 2

Table 2. Hazards Addressed in this Bibliography HAZARD # ARTICLES

in Published by
by Pamela S. Showalter, Matthew Ramspott, Additional Contributions, Dave Morton, Linda Prosperie, Louis Walter, The James, The James 1999
"... In PAGE 5: ...TABLE OF CONTENTS The James and Marilyn Lovell Center for Environmental Geography and Hazards Research i Center Scholars and Research Interests ii Introduction 1 Description of Material Found in the Bibliography 1 An Invitation to Authors 2 The Use of Remote Sensing in Detecting and Analyzing Natural Hazards and Disasters, 1972-1998: A Partially Annotated Bibliography 6 List of Tables Table 1. Hazards and General Associated Utility of Remotely Sensed Data 3 Table2 . Hazards Addressed in this Bibliography 4 List of Figures Figure 1.... In PAGE 6: ... To further assist scholars and environmental managers, Table 1 provides a general overview of different types of hazards addressed, sensors used to study them, types of data the sensors acquire, and the types of hazards analyses that have been performed. Table2... In PAGE 7: ...number of articles addressing specific hazard topics that can be found in this bibliography. (The heading general in Table2 refers to overview papers on the topic and address a number of different types of hazard and hazard analyses.) Figure 1 illustrates the frequency with which the hazards described in Table 2 are found in the bibliography (having been reduced into eight categories).... In PAGE 7: ... (The heading general in Table 2 refers to overview papers on the topic and address a number of different types of hazard and hazard analyses.) Figure 1 illustrates the frequency with which the hazards described in Table2 are found in the bibliography (having been reduced into eight categories). Within these categories, mass movement includes references to: avalanches, landslides, mass movements, mountain hazards, and slope instability.... ..."

Table 1. Hazards and General Associated Utility of Remotely Sensed Data. (Adapted from Wadge, 1993, p. 10)

in Published by
by Pamela S. Showalter, Matthew Ramspott, Additional Contributions, Dave Morton, Linda Prosperie, Louis Walter, The James, The James 1999
"... In PAGE 5: ...TABLE OF CONTENTS The James and Marilyn Lovell Center for Environmental Geography and Hazards Research i Center Scholars and Research Interests ii Introduction 1 Description of Material Found in the Bibliography 1 An Invitation to Authors 2 The Use of Remote Sensing in Detecting and Analyzing Natural Hazards and Disasters, 1972-1998: A Partially Annotated Bibliography 6 List of Tables Table1 . Hazards and General Associated Utility of Remotely Sensed Data 3 Table 2.... In PAGE 6: ... Additionally, because of the sometimes bewildering number of acronyms commonly used in remote sensing, Appendix B provides a glossary of acronyms found in some of the references and pertinent to the field. To further assist scholars and environmental managers, Table1 provides a general overview of different types of hazards addressed, sensors used to study them, types of data the sensors ... ..."

Table 5: Scope for Participatory Democracy: Corporatist and Activist Unionism

in ABL, Vol. 26, No. 4, December, 2000 301 Contributed Article
by Leadership Representativeness In, Tom Bramble
"... In PAGE 19: ... 57). This has been responsible for the rise of what might be called the activist approach which attempts to reverse years of decline ( Table5 ). ACTU publications Unions 2001 and unions@work, in particular, make much of the need for strong delegate organisation.... ..."

Table 2 - Basic hazard detection

in RESULTS FROM THE WILLWARN PROJECT
by Andreas Hiller, Arno Hinsberger, Markus Strassberger, Dirk Verburg
"... In PAGE 5: ... For the deployment of the application a standardized minimum set of detection algorithms has to be defined that has to be implemented on all onboard units. WILLWARN partners did found good detection results for the event types listed in Table2 . As it can be derived from the table there are different classes of reliability for the hazards in the scope of the WILLWARN project: ... ..."

Table 2. Hazards detection for each application

in unknown title
by unknown authors 712
"... In PAGE 15: ...2 Results Figure 3 shows the speedups for all applications compared to the original WaveScalar without memory disambiguation. Table2 show the number of RAW, WAR and WAW hazards detected during the simulations. Most of the applications show a significant speedup that grows with the Speculation Window, although the maximum speedup is reached for finite Speculation Windows that are usually small (less then 20).... ..."

Table 2. Hazard detection using OTs

in PBExplore: A framework for compiler-in-the-loop exploration of partial bypassing in embedded processors
by Aviral Shrivastava, Nikil Dutt, Alex Nicolau, Eugene Earlie 2005
"... In PAGE 3: ... OTs of operations in a given sched- ule can be combined to discover all the pipeline hazards. Table2 shows how OTs can be used to detect data hazard between two simple dependent instructions: ADD R1 R2 R3 SUB R5 R1 R4 on the pipeline shown in Figure 2. The OT-based compiler has to maintain the state of the machine in terms of busy re- sources and available registers in each register file for each cycle.... In PAGE 3: ...ble register file), and resource hazards (e.g. a required re- source is busy). Table2 shows that after scheduling the first operation (ADD), register R1 is not available in RF in cy- Operation Table of ADD R1 R2 R3 1F 2D 3OR ReadOperands R2 C1, RF R3 C2, RF C5, BRF DestOperands R1, RF 4EX WriteOperands R1 C4, BRF 5WB WriteOperands R1 C3, RF Table 1. Operation Table of ADD R1 R2 R3 cle 4.... ..."
Cited by 6

Table 6. Candidate Hazard Detection Techniques

in unknown title
by unknown authors
"... In PAGE 5: ...able 5. Commercial Airlines Weather-Related Accident Causes.............................................................. 7 Table6 .... In PAGE 13: ... These criteria were adopted to ensure that the science and technology of the proposed detection techniques were mature enough to allow one or more of the proposed techniques to be investigated in flight tests within the next few years. Table6 shows the three candidate detection techniques that met both criteria. Table 6.... ..."
Next 10 →
Results 1 - 10 of 28,185
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University