• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 4,195
Next 10 →

Table 5 Compulsory Education

in Policies to Free a Trapped Economy
by Elizabeth M. Caucutt, Krishna B. Kumar
"... In PAGE 29: ... The optimality conditions that characterize enrollments are now irrelevant. Table5 presents the outcome in this case. Column 1 shows the outcome with compulsory education alone, while column 2 does the revenue neutral experiment.... ..."

Table 9 Sources of education on IS

in unknown title
by unknown authors
"... In PAGE 6: ... External courses and similar arrangements were used by 16 % of the respondents. Summary of the sources for education is on Table9 . In the same table we can see the hopes of the respondents concerning the future sources of edp-knowledge.... ..."

Table 2 Educational Efficiency

in Decentralization in Argentina
by Cindy Huang, Diego Mir, Victoria Murillo, Gustav Ranis, Nadir Habibi, Cindy Huang, Diego Mir, Victoria Murillo, Gustav Ranis, Mainak Sarkar, Frances Stewart 2001
"... In PAGE 28: ... It should be noted that the OLS regression results are highly significant, with the exogenous variables explaining fifty-five percent of the variation in IMR. Table2 summarizes the results for EDUC, our second human development indicator. OWNLOCAL is always positive, and significant.... ..."

Table 2. Educational experience

in 8:35 Keynote address: “Introducing new variables and constraints into computer architecture education,”
by Edward F. Gehringer, Workshop Organizer, Fayé A. Briggs, Intel Corporation 2002
"... In PAGE 44: ... Hardware/Software Laboratories To provide architectural concepts with hands-on skills, integration, team-work and hence to enhance the quality of the graduates, we added pre-lab, in-lab and post-lab assignments to complement the classroom activities. Table2 summarizes the educational experience gained from these laboratories. Table 2.... In PAGE 120: ... Examples of contemporary processors 4 Advanced processors 25. Introduction to multiprocessor systems 2 Total hours 90 Table2 . Syllabus of the second year course on Computer Organization.... ..."

Table 4 Financial Education

in unknown title
by unknown authors 2001
"... In PAGE 11: ...ecrease in AMND. Additional hours beyond 18 are linked with a $0.54 increase in AMND. Figure 1 is derived from regression coefficients, and depicts this relationship. Table4 presents the second step of the Heckman two-step regression on deposit frequency. Each additional hour in the range of 1 to 6 hours is associated with a 2 percentage... ..."
Cited by 1

Tables Education Geographical

in Towards Responsive Development for Rural ICTs
by Siddhartha Raja, Gauresh Rajadhyaksha

Table 2: Education Attribute

in Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
by Dil Muhammad, Akbar Hussain

TABLE 1: Educational Level

in unknown title
by unknown authors

Table 3 EI, LI, and LH Rate Statistics

in An evaluation of software-based release consistent protocols
by Pete Keleher, Alan L. Cox, Hya Dwarkadas, Willy Zwaenepoel 1995
"... In PAGE 14: ... In all cases, speedup was calculated with reference to the same code run single-threaded with the TreadMarks library calls removed. Table3 shows rate statistics for the three protocols. We use rate statistics rather than totals in order to make meaningful comparisons between applications that vary widely in running times.... In PAGE 19: ... The use of LH apos;s updates reduces the overall number of di s requested by more than half. However, Table3 shows that LH reduces access misses by only 22% from LI. Many of Barnes apos; access misses require more than a single di in order to bring the page up to date.... In PAGE 21: ... These extra messages do not occur under the lazy protocols because invalidations are only carried by synchronization messages, and the processes that are reading the shared data are doing so outside of anysynchronization. Table3 shows that LH sends more messages than LI. The extra messages are barrier ushes that are often useless because many of the di s communicated by the ushes have already been received via lock grant messages.... ..."
Cited by 30

Table 1: Calculated tprocess and Li values

in Multicast Performance Modeling and Evaluation for High-Speed Unidirectional Torus Networks *†
by Sarp Oral, Alan D. George
"... In PAGE 13: ... The reason is simply that separate addressing consists of a series of unicast message transmissions from source to destination nodes so there are no intermediate nodes that are needed to relay the multicast message to other nodes. Table1 presents the tprocess and Li values for short message sizes. tprocess is independent of the multicast message and group size but strictly dependent on the performance of the host machine.... ..."
Next 10 →
Results 11 - 20 of 4,195
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University