### Table 5: Description of the eleven application mixes and

2000

Cited by 111

### Table 2. List of the eleven phenotypes assayed experimentally

"... In PAGE 4: ... These were not the 61 predictions with the highest q scores, but were those predictions with q(i, j) gt;0.5 and with phenotype j among eleven phenotypes (listed in Table2 ) with available high-throughput assay results. These eleven phenotypes were tested in 4710 yeast deletion mutants (Winzeler et al.... In PAGE 5: ...hat contradictory evidence (i.e. evidence that mutants do not have the phenotype) was found. The list is sorted alphabetically by phenotype indicated in Table2 , following (Hampsey, 1997). UV sensitivity was measured by growth on YPD following UV irradiation with 100 Joules/m2.... In PAGE 5: ...th phenotype (k = 1,...,11), let vk denote the number of predictions validated from among these tk predictions, and let uk denote the total number of the 4710 deletion mutants that displayed the kth phenotype using our relaxed standard of evidence. (The values of tk, vk and uk are listed in Table2 .) Suppose we were to exchange the tk genes we predicted to be associated with the kth phenotype with tk genes selected at random (from among the 4710 genes tested for phenotype k) for each k,togetanew set of 61 predictions.... ..."

### Table 5. The interpretation of the use of trust in the eleven articles.

"... In PAGE 16: ...e. the concept of trust was used either as a concept of everyday life, as a phenomenon to be explained, as a concept to be explored concept, or as attributed explanatory power, (see Table5 ). Moving from left to right in table 5 we see that trust is used on a scale ranging from an everyday life concept, to a ... In PAGE 16: ... The interpretation of the use of trust in the eleven articles. What can be seen in Table5 is that the trust-concept most often is used as a concept given explanatory power, which means that it is used to explain various accounting phenomena. However, out of seven articles in this category, only four contain explicit definitions of the concept.... ..."

### TABLE I SPECIFICATIONS OF THE ELEVEN HETEROGENEOUS COMPUTERS

### Table 2. Eleven theses, with relevant citations.

2002

### Table 6: Measurement of features for eleven lung tumors

### TABLE 1 VALUES FOR THE ELEVEN PARAMETERS OF THE CONTAGIOUS MODEL

### Table 2 Specifications of the Eleven Heterogeneous Computers Machine

"... In PAGE 12: ... 5.2 Applications A small heterogeneous local network of 11 different Solaris and Linux workstations shown in Table2 is used in the experiments. The network is based on 100 Mbit Ethernet with a switch enabling parallel communications between the computers.... In PAGE 15: ... 7. Determination of a set with relatively few points used to build the speed functions of the processors X2-X5 whose specifications are shown in Table2 . As few as 6 points and 5 points are used to build an efficient speed function for matrix multiplication and LU factorization respectively with deviation approximately 5% from other speed functions built with more number of points.... In PAGE 15: ... Though the absolute speed must be obtained by multiplication of two dense non-square matrices, we observed that our serial version gives almost the same speeds for multiplication of two dense square matrices if the number of elements in a dense non-square matrix is the same as the number of elements in a dense square matrix. This is illustrated in Table 3 for computers X2-X5 whose specifications are shown in Table2 . Thus speed functions of the processors built using dense square matrices will be the same as those built using dense non-square matrices.... In PAGE 17: ... However allocation of a task to these computers, the size of which is greater than 36000000 and 81000000 for matrix-matrix multiplication and LU factorization respectively, will result in severe performance degradation of the parallel application. For each of these two applications, the largest problem size that can be solved on the network of heterogeneous networks shown in Table2 is just the sum of the largest sizes of the tasks that can be solved on each computer. There are three important issues in selecting a set of points to build a speed function of a processor: 1.... In PAGE 18: ... Speeds of the processors are assumed to be zero for problem sizes beyond their upper bounds. multiplication obtained using three sets of 6, 7, and 8 points and speed functions for LU factorization obtained using three sets of 5, 7, and 8 points for the computers X2-X5 whose specifications are shown in Table2 . It can be seen that 6 points and 5 points are enough to build an efficient speed function that fall within acceptable limits of deviation for matrix multiplication and LU factorization respectively.... ..."

### Table 2. Errors for the fteen and eleven term polynomial response surface models.

"... In PAGE 3: ... Thus, the number of terms in the response surface model has been reduced to eleven and the modeling of the tip chord variable has been simpli ed from quadratic to linear. Table2 shows that the accuracy of the response surface t is only slightly impaired after removing terms from the polynomial model for which the coe cient of variation is large. Here, the errors are calculated from the di erence between the response surface prediction for the range and the actual value for the range at each of the 157 remaining HSCT design points.... ..."