Results 1 - 10
of
5,806
Table 10. Effects of complementary programs on enrollment of children having achieved primary school
2002
"... In PAGE 23: ... This sole program would increase the enrollment rate by 6 percentage points for children from uneducated households and by 3.3 percentage points for children from the most educated households ( Table10 ). This program would also increase the enrollment rate by 5.... ..."
Cited by 1
Table 1. Taxonomy of Di cult POMDPs Avoiding Acting
2000
"... In PAGE 2: ... The di culty here is that there is a delayed opportunity to observe. Table1 summarizes these four examples. \Immedi- ate quot; and \Delayed quot; refer to the need or opportunity to observe.... In PAGE 2: ... \Immedi- ate quot; and \Delayed quot; refer to the need or opportunity to observe. This paper presents a new algorithm for approximate solution of POMDPs that works well when there is a delayed need to observe (lower left box, Table1 ). The core idea is to de ne a new POMDP, the even-odd POMDP, in which the full state of the environment is observable at all times t where t is even.... ..."
Table 1: Fail-over time and lost packet count for Parallel-Dual and Serial-Dual ISMD. The timings are against the increasing traffic load. The packet size is fixed at 512 bytes. The packet loss is more in Serial-Dual compared to the Parallel-Dual configuration because in this configuration the Slave cannot act as a warm replica of the Master during normal operation.
"... In PAGE 16: ... As a result, the slave device in this configuration is no longer a warm replica of the master device, and all the packets buffered at the master device at the time of its failure are lost. Fortunately, this additional packet loss count becomes relatively less significant as the input traffic load increases, as shown in Table1 . The peak packet loss count is around 73 Kpkts at the maximum load of 100Mbps and it from 30 Kpkts to 42 Kpkts for a traffic load of 50 to 70 Mbps.... ..."
Table 1: Optimization opportunities
1999
"... In PAGE 53: ... The actual runtime improvements that we measured are specific to the PA micro-architecture and may vary on different machines. Table1 shows the number of optimization opportunities found in each program. The shaded columns denote the optimizations that are done at the conservative level; all optimizations are performed at the aggressive level.... In PAGE 54: ...00% 25.00% go m88ksim compress li ijpeg perl vortex boise deltablue Average aggressive conservative no optimization Figure 23: Overall Dynamo speedup with optimization contribution Table1 does not show to what extent the exploited optimization opportunities cause actual performance improvements. Figure 23 shows the performance improvements that are solely due to optimization.... ..."
Cited by 46
Table 3: Insights and Opportunities
in References
"... In PAGE 9: ...Insights and Opportunities Responding to the second question we discuss some of the insights and opportunities that a social perspective on software development provides. Table3 summarizes this discussion. Table 3: Insights and Opportunities... ..."
Table 8 Opportunities and Threats
2007
"... In PAGE 7: ...able 7 Strengths and Weaknesses......................................................................... 91 Table8 Opportunities and Threats.... ..."
Table 1: Private enrolment as percentage of total enrolment
"... In PAGE 5: ...The data indicate that over the 1990s the relative size of the private education sector has remained more-or-less unchanged ( Table1 ). At the primary level, this could be partly due to the massive increase in enrolments in some countries as a result of the EFA agenda, with large numbers of children joining government primary schools where fees were no longer being paid.... ..."
Table 1: Opportunities for
2003
"... In PAGE 9: ... of personal information on the Internet is a growing ed in their paperwork worlds and are slow to adopt ersonalize physician-patient relationship further and ality and compassion from the healing arts. As summarized in Table1 , e-health opens up a world of opportunities for healthcare stakeholders. However, the challenges are that any new technology needs to do a prudent job of protecting patient information privacy and security in the meantime improves healthcare service quality.... ..."
Cited by 1
TABLE XII ENROLLMENT FIGURES BY GENDER Gender Enrollment
TABLE XIII ENROLLMENT FIGURES BY ETHNICITY Ethnicity Enrollment
Results 1 - 10
of
5,806