Results 11 - 20
of
4,195
Table 5 Compulsory Education
"... In PAGE 29: ... The optimality conditions that characterize enrollments are now irrelevant. Table5 presents the outcome in this case. Column 1 shows the outcome with compulsory education alone, while column 2 does the revenue neutral experiment.... ..."
Table 9 Sources of education on IS
"... In PAGE 6: ... External courses and similar arrangements were used by 16 % of the respondents. Summary of the sources for education is on Table9 . In the same table we can see the hopes of the respondents concerning the future sources of edp-knowledge.... ..."
Table 2 Educational Efficiency
2001
"... In PAGE 28: ... It should be noted that the OLS regression results are highly significant, with the exogenous variables explaining fifty-five percent of the variation in IMR. Table2 summarizes the results for EDUC, our second human development indicator. OWNLOCAL is always positive, and significant.... ..."
Table 2. Educational experience
2002
"... In PAGE 44: ... Hardware/Software Laboratories To provide architectural concepts with hands-on skills, integration, team-work and hence to enhance the quality of the graduates, we added pre-lab, in-lab and post-lab assignments to complement the classroom activities. Table2 summarizes the educational experience gained from these laboratories. Table 2.... In PAGE 120: ... Examples of contemporary processors 4 Advanced processors 25. Introduction to multiprocessor systems 2 Total hours 90 Table2 . Syllabus of the second year course on Computer Organization.... ..."
Table 4 Financial Education
2001
"... In PAGE 11: ...ecrease in AMND. Additional hours beyond 18 are linked with a $0.54 increase in AMND. Figure 1 is derived from regression coefficients, and depicts this relationship. Table4 presents the second step of the Heckman two-step regression on deposit frequency. Each additional hour in the range of 1 to 6 hours is associated with a 2 percentage... ..."
Cited by 1
Table 2: Education Attribute
Table 3 EI, LI, and LH Rate Statistics
1995
"... In PAGE 14: ... In all cases, speedup was calculated with reference to the same code run single-threaded with the TreadMarks library calls removed. Table3 shows rate statistics for the three protocols. We use rate statistics rather than totals in order to make meaningful comparisons between applications that vary widely in running times.... In PAGE 19: ... The use of LH apos;s updates reduces the overall number of di s requested by more than half. However, Table3 shows that LH reduces access misses by only 22% from LI. Many of Barnes apos; access misses require more than a single di in order to bring the page up to date.... In PAGE 21: ... These extra messages do not occur under the lazy protocols because invalidations are only carried by synchronization messages, and the processes that are reading the shared data are doing so outside of anysynchronization. Table3 shows that LH sends more messages than LI. The extra messages are barrier ushes that are often useless because many of the di s communicated by the ushes have already been received via lock grant messages.... ..."
Cited by 30
Table 1: Calculated tprocess and Li values
"... In PAGE 13: ... The reason is simply that separate addressing consists of a series of unicast message transmissions from source to destination nodes so there are no intermediate nodes that are needed to relay the multicast message to other nodes. Table1 presents the tprocess and Li values for short message sizes. tprocess is independent of the multicast message and group size but strictly dependent on the performance of the host machine.... ..."
Results 11 - 20
of
4,195