Results 1 - 10
of
19,924
Table 1. Practical impact of limiting polymorphismto values
1995
"... In PAGE 9: ... To determine how often this problem might arise, we modified Standard ML of New Jersey to use our type system. We gathered an extensive collection of ML programs and compiled them with the modified compiler (see Table1 ). We found that most ML programs either satisfy the restriction of polymorphism to values already, or they can be modified to do so with a few -expansions.... ..."
Cited by 81
Table 1. Practical impact of limiting polymorphism to values
"... In PAGE 9: ... To determine how often this problem might arise, we modified Standard ML of New Jersey to use our type system. We gathered an extensive collection of ML programs and compiled them with the modified compiler (see Table1 ). We found that most ML programs either satisfy the restriction of polymorphism to values already, or they can be modified to do so with a few a26 -expansions.... ..."
Table 2. Theme Park Impacts: Limiting Case, No Spillovers, $m. Cluster
in By
2005
"... In PAGE 11: ... The No-Spillovers Case These results are very sensitive to the spillover effect assumptions. We do not believe that other theme parks in the country would be immune from the effects of an attack on a theme park in another State, but we can combine some of the data in Table 1 into another table ( Table2 ) to demonstrate the implications if this belief was incorrect. The data here show the results if the economic impacts are confined to the theme park(s) in the State subject to attack.... In PAGE 11: ... This is the limiting case of minimal impacts, and is useful from that perspective even if not very realistic. As shown in Table2 , the differences are very dramatic, with impacts varying from less than half a billion dollars in Virginia up to more than $11.28 billion in the Florida cluster.... In PAGE 22: ...Table2 . Theme Park Impacts: California, Cluster B, $m.... ..."
Table 3: Impact of limited memory for the pattern-matching network.
1999
"... In PAGE 9: ... Ta- ble 3 presents the results. The second row in Table3 indicates percentage of space avail- able compared to the situation when there is su cient space. The third row shows the cache hit ratio under di erent space avail- ability and error tolerance ratios.... ..."
Cited by 20
Table 3: Impact of limited memory for the pattern-matching network.
1999
"... In PAGE 9: ... Ta- ble 3 presents the results. The second row in Table3 indicates percentage of space avail- able compared to the situation when there is su cient space. The third row shows the cache hit ratio under di erent space avail- ability and error tolerance ratios.... ..."
Cited by 20
Table 3: Impact of limited memory for the pattern-matching network.
"... In PAGE 9: ... Ta- ble 3 presents the results. The second rowin Table3 indicates percentage of space avail- able compared to the situation when there is su cient space. The third rowshows the cache hit ratio under di erent space avail- ability and error tolerance ratios.... ..."
TABLE III. Summary of results of experiments with prefix limiting Router Prefix-limiting Efficacy Prefix-limiting Action Impact Peers Affected Damping Efficacy
2002
Cited by 36
TABLE III. Summary of results of experiments with prefix limiting Router Prefix-limiting Efficacy Prefix-limiting Action Impact Peers Affected Damping Efficacy
2002
Cited by 36
TABLE III. Summary of results of experiments with prefix limiting Router Prefix-limiting Efficacy Prefix-limiting Action Impact Peers Affected Damping Efficacy
2002
Cited by 36
TABLE III. Summary of results of experiments with prefix limiting Router Prefix-limiting Efficacy Prefix-limiting Action Impact Peers Affected Damping Efficacy
2002
Cited by 36
Results 1 - 10
of
19,924