• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 24,426
Next 10 →

Table 2: Optimal ^ for examples with two choices for loss, and parameterization as in (6).

in Separable Multicriterion Design And Performance Optimization Of Awmps
by Geof H. Givens 1997
"... In PAGE 6: ... Consider the example with squared error loss, L(x; y) = (x ? y)2. Table2 shows the optimal ^ in this case and also when L(x; y) = log xy 2. Fig.... In PAGE 6: ... in this case and also when L(x; y) = log xy 2. Fig. 1 shows strike limit trajectories for a single replicate of the B7 trial when removals are taken according to Q3rds. Shown are quotas for PBR, `Thirds apos;, H, and C( ^ ) for the two loss functions of Table2 . In this gure, the ideal strike limits are quite low, because the B7 trial is pessimistic and `Thirds apos; generally permits excessive catch.... In PAGE 12: ... Sensitivity to Class of C: Appropriate choice of a class for C raises the standard statis- tical issues of model selection: is the model su ciently exible to re ect the data without being over- or under-parameterized? In this application, due to the vast amount of `data apos; and the interest in accurate predictions, it seems that the balance should be shifted more than usual towards large, exible classes with many parameters. 7Also, Table2 shows that ^ is similar for the two cases. However, this need not be the case because similar ts can be obtained for many di erent values of , just as in ordinary linear regression.... ..."
Cited by 5

Table 1: Parameterized vertices

in Automatic Derivation of Probabilistic Inference Rules
by Manfred Jaeger
"... In PAGE 9: ... How- ever, each vertex is given as the intersection of hyperplanes defined by the constraints with faces of A1BG. Figure 2 shows the general position of these intersection points, and Table1 presents them as a list. The third column of Table 1 states the conditions on the parameters for when the intersection point is an actual vertex of the polytope.... In PAGE 9: ... Figure 2 shows the general position of these intersection points, and Table 1 presents them as a list. The third column of Table1 states the conditions on the parameters for when the intersection point is an actual vertex of the polytope. Such conditions we will subsequently encounter in great numbers; they are formally introduced by the following definition.... In PAGE 10: ...(r)=0.4, I(s)=0.2 (0,0,1,0) (0,0,1,0) I(r)=0, I(s)=0 (0,0,1,0) Figure 1: Polytopes for different parameter values 3 5 2 4 8 6 7 1 Figure 2: General vertex positions problem statement for generating a complete parameterized vertex list can now be refined as follows: given input constraints BV, we have to find a list DACY BM APCY B4BD AK CY AK C5B5 (13) where each DACY is a parameterized vertex as in (7), and the APCY are lists of p-constraints, such that for every parameter instantiation C1 the set of vertices of A1B4C1B4BV B5B5 is just CUC1B4DACYB5 CY C1 satisfies APCYCV (where, naturally, C1 satisfies AP iff for every APCX AH D4CX AO BC BE AP: C1B4D4CXB5 AO BC). Table1 provides this list for the input constraints (9) and (10). To obtain a systematic method for generating such a list it is convenient to consider one by one the different faces of A1BEC3, in... In PAGE 12: ...icularly suitable method is fraction free Gaussian elimination (see e.g. [7]). This is a variant of Gaussian elimination that avoids divisions, which is useful for us, as otherwise we would have to divide by symbolic expressions that might be zero for some parameter values and nonzero for others, thereby requiring us to make a number of case distinctions. As an illustration for the working of the algorithm we retrace how vertex 8 in Table1 was generated. This vertex is the solution of the system (14)-(16) defined by CS BP BE, C0 BP CUBDBN BEBN BFCV and the (then mandatory) selection of both constraints CRBDBN CRBE for (16).... In PAGE 14: ... To illustrate the general method, we continue with our example, taking C8 B4BMBT CY BUB5 to be the target probability of the inference rule to be derived. The probability of BMBT given BU at the vertices listed in Table1 is evaluated by computing DABFBPB4DABDB7DABFB5, which leads to the values listed in Table 4. Note that the possible values of C8 B4BMBT CY BUB5 are still annotated with the parameter constraints on the vertices at which they are attained, and that for vertices 5 and 8 the new p-constraint D7 BO BD has been added.... In PAGE 21: ... Minimal irredundant sets of values for minimization and maximization of C8 B4BT CY BU CM BWB5 are indicated by the +-marks in the columns 8 and 9, respectively. The final bound functions we obtain now are C4B4D6BN D8BN D9BN DAB5 BP minCJD6BPDA BM AQ BN DA BQ BCCL (40) CDB4D6BN D8BN D9BN DAB5 BP maxCJBC BM D6 BP BCBN DA BP BDBN BD BM AQ BN D9 AK D6BN D6 BQ BCBN BD BM AQ BN D9 AK D8BN D8 AK DABN D8 BQ BCBN BD BM AQ BN D6 AK D9BN D9 AK D8BN D9 BQ BCBN BD BM AQ BN DA AK D8BN DA BQ BCBN D8BPD9 BM AQ BN D8 AK D9BN D9 BQ BCCLBM (41) where the p-constraints AQ suppressed in Table1 have been reinstated. Remembering the con- ventions min BN BP BDBN max BN BP BC, and taking into account that the conditions D6 AK D8BN D9 AK DA are taken for granted in (29), these functions can be seen to be the same as (30) and (31).... ..."
Cited by 1

Table 1: Critical Issues for the General Manager

in Cognitive reapportionment: Rethinking the location of judgement in managerial decision making
by Benn R. Konsynski, John J. Sviokla 1993
"... In PAGE 20: ... However, as shown above, these systems are non-neutral in their adoption and effects. Therefore, the manager (see Table1 ) and management researcher needs to understand the current application and potential implications of the use of systems to allocate and reallocate cognitive responsibilities at the individual, organizational and inter- organizational level. Table 1: Critical Issues for the General Manager... ..."
Cited by 1

Table 3 { STEP package parameterized heading commands

in Iso Tc 184/sc4/ N
by Date Supersedes Iso
"... In PAGE 21: ... NOTE In the tables, C = clause, SC = subclause, SSC = subsubclause, NA = normative annex, IA = informative annex. The commands listed in Table3 are equivalent to the general sectioning commands, but are intended to indicate the start of a particular documentation element. These commands take either one or two parameters.... ..."

Table 2. Parameterizations considered Model Parameters

in an assistant professor of economics at the University of Western Ontario. The authors thank Graham Candler,
by Lawrence J. Christian, Jonas D. M. Fisher, Lawrence J. Christiano, Jonas D. M. Fisher, Wouter Den Haan, Kenneth Judd, Albert Marcet, Mario Mir, Ellen Mcgrattan 1997
"... In PAGE 37: ....1. Model Pararneterizations Considered in the Analysis The utility function, U, and Markov transition matrix, pel, used in the analysis have the following form: The parameter p is the first order autocorrelation of 0 and o is the associated standard deviation. In the benchmark parameterization, labelled parameterization (1) in Table2 , P = 1.03-0.... In PAGE 37: ... = 1.0, a = 0.3, 6 = 0.02, a = 0.23, p = 0. The relatively large value of o was chosen to guarantee that the investment constraint would bind a substantial fraction of times. For the other model parameterizations, we perturb the benchmark values in the manner indicated in rows (2)-(7) of Table2 . The perturbations were chosen to provide information about the robustness of our results.... In PAGE 60: ... Generally this accuracy criterion was hardest to meet for the financial statistics and most other statistics were within 1% of the corresponding exact values. See Table 1 for a fuller description of the computational strategies, and Table2 for a summary of the model parameter values. A common set of starting values were used for all the algorithms.... ..."

Table 2. General types of metadata and issues associated with video content

in Interface concepts for the Open Video Project
by Gary Geisler, Gary Marchionini, Michael Nelson, Richard Spinks, Meng Yang 2001
Cited by 6

Table 2. General types of metadata and issues associated with video content

in Interface Concepts for the Open Video Project
by Gary Geisler , Gary Marchionini, Michael Nelson, Richard Spinks, Meng Yang 2001
Cited by 6

Table 2: Attributes and their state Attribute Type General issues

in EDITOR: C. Anumba
by Khaled Nassar, Associate Professor 2006

Table 1. Maximum Output parameterization of Adaptive Mapping and PAM DGP

in Probabilistic Adaptive Mapping Developmental Genetic Programming (PAM DGP): A New Developmental Approach
by Garnett Wilson, Malcolm Heywood 2007
"... In PAGE 6: ... Each individual is a stack-based machine composed of a general-purpose stack and an output register. A program that changes the state of the machine is a list of instructions from the function set in Table1 below. When an instruction in the pro- gram is processed sequentially, the required arguments are taken from the stack, they are presented to the function, and the return value (if any) is pushed back onto the stack.... In PAGE 6: ...Hz PowerPC G4 running Mac OS X Version 10.4.4. Algorithm parameters are summarized in Table1 for both DGP algorithms. Table 1.... In PAGE 8: ... The alternative settings for this problem demonstrate the high customizability of PAM DGP and provide an example of its performance on a hard problem using a larger population (and larger probability table) than the MAX problem. Parameterizations specific to the Two Boxes problem are shown in Table 4 ( Table1 details the common parameters). Table 4.... ..."
Cited by 2

Table 1. Example of applications in e-government based on the classification of decisions, and type of corporation in e-government (* adapted from Galligan 1990, pp.114; ** adapted from Lenk et al. 2002, pp.71)

in THE COLLABORATIVE MODEL TO SUPPORT DISCRETIONARY DECISION-MAKING IN E-GOVERNMENT
by unknown authors
"... In PAGE 5: ... 4 DISCRETIONARY DECISION-MAKING IN E-GOVERNMENT SERVICES It is clear that the transformation from governmental manual-based to e-government services inevitably involves discretionary decision-making to a certain degree. To articulate the potentiality of discretion related applications in e-government services, Table1 illustrates examples of e-government applications based on each type of decisions classified by Galligan (1990). In addition, the type of ... ..."
Next 10 →
Results 1 - 10 of 24,426
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University