• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,806
Next 10 →

Table 10. Effects of complementary programs on enrollment of children having achieved primary school

in Decomposing the Channels of Influence of Conditional Transfers in a Structural Model of Educational Choice
by Elisabeth Sadoulet, Frederico Finan, Alain De Janvry 2002
"... In PAGE 23: ... This sole program would increase the enrollment rate by 6 percentage points for children from uneducated households and by 3.3 percentage points for children from the most educated households ( Table10 ). This program would also increase the enrollment rate by 5.... ..."
Cited by 1

Table 1. Taxonomy of Di cult POMDPs Avoiding Acting

in A POMDP Approximation Algorithm that Anticipates the Need to Observe
by Valentina Bayer, Thomas Dietterich 2000
"... In PAGE 2: ... The di culty here is that there is a delayed opportunity to observe. Table1 summarizes these four examples. \Immedi- ate quot; and \Delayed quot; refer to the need or opportunity to observe.... In PAGE 2: ... \Immedi- ate quot; and \Delayed quot; refer to the need or opportunity to observe. This paper presents a new algorithm for approximate solution of POMDPs that works well when there is a delayed need to observe (lower left box, Table1 ). The core idea is to de ne a new POMDP, the even-odd POMDP, in which the full state of the environment is observable at all times t where t is even.... ..."

Table 1: Fail-over time and lost packet count for Parallel-Dual and Serial-Dual ISMD. The timings are against the increasing traffic load. The packet size is fixed at 512 bytes. The packet loss is more in Serial-Dual compared to the Parallel-Dual configuration because in this configuration the Slave cannot act as a warm replica of the Master during normal operation.

in Duplex: A Reusable Fault Tolerance Extension Framework for Network Access Devices
by Srikant Sharma, Jiawu Chen, Wei Li, Kartik Gopalan, Tzi-cker Chiueh
"... In PAGE 16: ... As a result, the slave device in this configuration is no longer a warm replica of the master device, and all the packets buffered at the master device at the time of its failure are lost. Fortunately, this additional packet loss count becomes relatively less significant as the input traffic load increases, as shown in Table1 . The peak packet loss count is around 73 Kpkts at the maximum load of 100Mbps and it from 30 Kpkts to 42 Kpkts for a traffic load of 50 to 70 Mbps.... ..."

Table 1: Optimization opportunities

in Transparent dynamic optimization: The design and implementation of Dynamo
by Vasanth Bala, Evelyn Duesterwald, Sanjeev Banerjia 1999
"... In PAGE 53: ... The actual runtime improvements that we measured are specific to the PA micro-architecture and may vary on different machines. Table1 shows the number of optimization opportunities found in each program. The shaded columns denote the optimizations that are done at the conservative level; all optimizations are performed at the aggressive level.... In PAGE 54: ...00% 25.00% go m88ksim compress li ijpeg perl vortex boise deltablue Average aggressive conservative no optimization Figure 23: Overall Dynamo speedup with optimization contribution Table1 does not show to what extent the exploited optimization opportunities cause actual performance improvements. Figure 23 shows the performance improvements that are solely due to optimization.... ..."
Cited by 46

Table 3: Insights and Opportunities

in References
by Steve Sawyer
"... In PAGE 9: ...Insights and Opportunities Responding to the second question we discuss some of the insights and opportunities that a social perspective on software development provides. Table3 summarizes this discussion. Table 3: Insights and Opportunities... ..."

Table 8 Opportunities and Threats

in Analysis of Market for WiMAX Service CICT Acknowledgement
by Ling Bai 2007
"... In PAGE 7: ...able 7 Strengths and Weaknesses......................................................................... 91 Table8 Opportunities and Threats.... ..."

Table 1: Private enrolment as percentage of total enrolment

in Is The Non-State Education Sector Serving The
by Needs Of The, Pauline Rose
"... In PAGE 5: ...The data indicate that over the 1990s the relative size of the private education sector has remained more-or-less unchanged ( Table1 ). At the primary level, this could be partly due to the massive increase in enrolments in some countries as a result of the EFA agenda, with large numbers of children joining government primary schools where fees were no longer being paid.... ..."

Table 1: Opportunities for

in The Evolving Face of TeleMedicine E-Health: Opening Doors and Closing
by Gaps In Health, H. Joseph Wen 2003
"... In PAGE 9: ... of personal information on the Internet is a growing ed in their paperwork worlds and are slow to adopt ersonalize physician-patient relationship further and ality and compassion from the healing arts. As summarized in Table1 , e-health opens up a world of opportunities for healthcare stakeholders. However, the challenges are that any new technology needs to do a prudent job of protecting patient information privacy and security in the meantime improves healthcare service quality.... ..."
Cited by 1

TABLE XII ENROLLMENT FIGURES BY GENDER Gender Enrollment

in Computer Science Education: An Information Resource For Curriculum Development And Program Enhancement
by Rene McCauley, Bill Manaris, Session Ta

TABLE XIII ENROLLMENT FIGURES BY ETHNICITY Ethnicity Enrollment

in Computer Science Education: An Information Resource For Curriculum Development And Program Enhancement
by Rene McCauley, Bill Manaris, Session Ta
Next 10 →
Results 1 - 10 of 5,806
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University