Results 1 - 10
of
10,259
Table 1: Performance characteristics; + desired behavior, - not desired behavior
2004
Table 2. Sample of Desired States and Behaviors Desirable State Associated Behavior
"... In PAGE 4: ... The team performed this analysis by interviewing scientists. The main objective of this effort was to identify existing de- sirable and undesirable states related to the four basic knowledge processes (see Table2 ). A second objective was to begin to understand how the KM processes were related to each other.... ..."
Table 2. Desired speculative memory behavior.
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."
Table 2. Desired speculative memory behavior.
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."
Table 2. Desired speculative memory behavior.
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."
Table 2. Desired speculative memory behavior.
"... In PAGE 3: ... In Section 4 we describe how we create and manage speculative threads in the Hydra CMP. The effective memory behavior desired during speculation is sum- marized in Table2 for individual accesses to an address. Writes are forwarded from earlier threads to later ones.... ..."
Table 1: A sample run. The desired behavior is both spin on input , both go straight on input quot; quot;. After thirteen iterations, convergence is reached.
1993
Cited by 73
Table 4 Hierarchical Analyses of Social Desirability Distortion in Computer Versus Paper-and-Pencil Personality, Behavior, and Attitude Measures
1999
"... In PAGE 13: ...67, p lt; .42). Social desirability distortion inferred from other scales. Table4 presents a summary of the analysis of studies in which investigators compared social desirability distortion inferred from scores on computer and paper-and-pencil ver- sions of personality scales, behavioral assessments, symp- tom checklists, and attitude scales. As noted previously, scales were receded so that higher scores always referred to greater social desirability.... ..."
Cited by 11
Table 1: A part of the desired foraging policy. Only the top-ranked behavior is shown for each condition. The full table contains a total ordering for each condition, resulting in 64 entries.
1997
"... In PAGE 14: ...oncurrently. The table consists of 64 entries: 24 conditions 4 behaviors. The table is initialized to the average of the minimum and maximum possible A(c; b) values. The desired policy, shown in Table1 , was derived by hand, based on empirical data from the hard-coded foraging experiments in which it was independently tested and compared to alternative solutions (Matari c 1994a). 7 Experimental Results and Evaluation The e ectiveness of the proposed reinforcement functions was evaluated by testing three di erent types of reinforcement.... ..."
Cited by 109
Table 3: Roles and Holistic Behaviors of an Engineer
"... In PAGE 6: ... Based on inputs from diverse industry and academic voices, the authors developed a behavior- based profile aligned with ten roles important to engineering practice. As shown in Table3 , these roles draw from technical, interpersonal, and professional behaviors desired in engineers. Table 4 provides an expanded definition of the profile of an engineer, presented like that of an expert profile 24.... ..."
Results 1 - 10
of
10,259