• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,259
Next 10 →

Table 1: Performance characteristics; + desired behavior, - not desired behavior

in unknown title
by unknown authors 2004

Table 2. Sample of Desired States and Behaviors Desirable State Associated Behavior

in Systems Theory and Knowledge Management Systems:
by Pratt-whitney Rocketdyne, Mark Chun, Kiho Sohn, Priscilla Arling, Nelson F. Granados
"... In PAGE 4: ... The team performed this analysis by interviewing scientists. The main objective of this effort was to identify existing de- sirable and undesirable states related to the four basic knowledge processes (see Table2 ). A second objective was to begin to understand how the KM processes were related to each other.... ..."

Table 2. Desired speculative memory behavior.

in Abstract Data Speculation Support for a Chip Multiprocessor
by Lance Hammond, Mark Willey, Kunle Olukotun
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."

Table 2. Desired speculative memory behavior.

in Abstract Data Speculation Support for a Chip Multiprocessor
by Lance Hammond, Mark Willey, Kunle Olukotun
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."

Table 2. Desired speculative memory behavior.

in
by unknown authors
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."

Table 2. Desired speculative memory behavior.

in
by unknown authors
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."

Table 1: A sample run. The desired behavior is both spin on input , both go straight on input quot; quot;. After thirteen iterations, convergence is reached.

in An Adaptive Communication Protocol for Cooperating Mobile Robots
by Holly Yanco, Lynn Andrea Stein 1993
Cited by 73

Table 4 Hierarchical Analyses of Social Desirability Distortion in Computer Versus Paper-and-Pencil Personality, Behavior, and Attitude Measures

in unknown title
by unknown authors 1999
"... In PAGE 13: ...67, p lt; .42). Social desirability distortion inferred from other scales. Table4 presents a summary of the analysis of studies in which investigators compared social desirability distortion inferred from scores on computer and paper-and-pencil ver- sions of personality scales, behavioral assessments, symp- tom checklists, and attitude scales. As noted previously, scales were receded so that higher scores always referred to greater social desirability.... ..."
Cited by 11

Table 1: A part of the desired foraging policy. Only the top-ranked behavior is shown for each condition. The full table contains a total ordering for each condition, resulting in 64 entries.

in Reinforcement Learning in the Multi-Robot Domain
by Maja J. Mataric 1997
"... In PAGE 14: ...oncurrently. The table consists of 64 entries: 24 conditions 4 behaviors. The table is initialized to the average of the minimum and maximum possible A(c; b) values. The desired policy, shown in Table1 , was derived by hand, based on empirical data from the hard-coded foraging experiments in which it was independently tested and compared to alternative solutions (Matari c 1994a). 7 Experimental Results and Evaluation The e ectiveness of the proposed reinforcement functions was evaluated by testing three di erent types of reinforcement.... ..."
Cited by 109

Table 3: Roles and Holistic Behaviors of an Engineer

in Raytheon Missile Systems, and
by Denny C. Davis, Steven W. Beyerlein, Mechanical Engineering, Isadore T. Davis, Asee Corporate, Member Council
"... In PAGE 6: ... Based on inputs from diverse industry and academic voices, the authors developed a behavior- based profile aligned with ten roles important to engineering practice. As shown in Table3 , these roles draw from technical, interpersonal, and professional behaviors desired in engineers. Table 4 provides an expanded definition of the profile of an engineer, presented like that of an expert profile 24.... ..."
Next 10 →
Results 1 - 10 of 10,259
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University