Results 1 - 10
of
284,500
Table 2. COCC Model - All con#0Dicts were picked up at either the client or the server
1999
"... In PAGE 7: ... Backward validation achieves cache consistency even with the highly concurrent access. Table2 demit demon-... ..."
Cited by 1
Table 6. Comparison of CUA and CAA Approach
Table 6. Comparison of CUA and CAA Approach
Table 3: Applicability of Server Actions to Sequences with Bad Performance
"... In PAGE 12: ...10 have to be long before they are considered useful enough to trigger a particular server action), the size of the full container document or the size of the base page. In Table3 , we list a series of possible server actions and the sequence criteria to be examined for each action. Table 3: Applicability of Server Actions to Sequences with Bad Performance... In PAGE 18: ... For this portion of the study we analyzed the characteristics of all sequence accesses in which the delay for the last object retrieval was more than 8 seconds. We sought to match the sequence characteristics identi ed for possible server actions in Table3 with the characteristics of accesses with bad performance in the set of logs. We considered all such accesses and did not limit our analysis to only those accesses from clients classi ed as poor.... ..."
Table 3: Ideas about the goals of science. Idea Level # Students
"... In PAGE 14: ...he mean level score for Cluster 1, concerning the goals of science, was 1.88 (SD = 0.44, Table 2), indicating that as a group these students are in transition from a simple view of science as quot;finding quot; answers to a view that scientists develop explanations. The common ideas that students expressed in response to these questions reflect that individual students had a mixed view of science as well ( Table3 ). All but one student said that scientists were interested in finding answers or solving problems, especially finding cures for diseases.... In PAGE 14: ...5, indicating that students are beginning to differentiate ideas (or answers) from experimental results. Five of the eight students apos; responses reflect a Level 2 idea that scientists try to develop explanations for how things work or why things happen ( Table3 ). Common to both levels of response was the idea that scientists gather information, mentioned by seven of the eight students in this sample.... ..."
Table 1. The idea of port transitions
"... In PAGE 2: ...eta-level terms (i. e. anything else in the calculus) will be shown in italics, like call , , or in blackboard font, like CD,A6. A3 Each transition pertains to a certain context, as indicated in Table1 . In the next step towards the new de nition of ports we shall make this dependency explicit, by adding a parameter to each event.... ..."
Table 1: Comparative study of the characteristics of di erent storage devices. scheduler can do local reordering of I/O requests that are pending and avoid unnecessary media switches by batching requests on the same media together. However, the amount of reorganization that it can do is very limited because it has no idea about other data that are required by the currently running queries. Also, the server process has no idea about the storage media that are currently loaded or the pages that are in cache and does not modify its data requests according to the cache state or the tertiary memory state. Lack of global planning and coordination can thus lead to bad I/O performance on the tertiary memory device.
1995
"... In PAGE 2: ... We will use the term media to refer to a storage unit. In Table1 we compare several tertiary memory devices with a magnetic disk. The characteristics shown are exchange time (time to unload one storage unit from the drive and then load a new unit and get it ready for reading), maximum seek time, data transfer rate, transfer time for 128 KB of data and the ratio between the worst case time (exchange time + full seek time + transfer time) and best case time (only transfer time) to access and read 128 KB of data from tertiary mem- ory.... ..."
Cited by 16
Table 2 he range of 606 Slices (for 3DES) and 9793 Slices (IDEA).
"... In PAGE 3: ... Area Analysis The Area of ciphers implemented is a measure of the number of CLB slices that are utilized. The results reported from the papers from which these ciphers were chosen are tabulated for Block ciphers and Stream ciphers in Table 1 and Table2 respectively. 1) Block Cipher Algorithm Properties #Slices RC6[1] Key-Variable, Plain Text-128 bits 7456 IDEA[2] Key- 128bits, Plain Text -64 bits 9793 3DES[3] Key-3*56 bits, Plain Text -64 bits 604 ICEBERG[4] Key- 128 bits, Plain Text -64 bits 4946 Table1 2) Stream Cipher Algorithm Properties #Slices TRIVIUM[5] Key-80 bits, IV-80 bits 41 GRAIN-128[5] Key-128 bits, IV-96 bits 48 MICKEY- Key-128 bits, ... ..."
Table 5: Linking to ideas or events in a different lesson or in a current lesson (%)
"... In PAGE 4: ...nd U.S. lessons. Table5 shows percentages of lessons that include ex- plicit linking by the teacher to ideas or events in a different lesson, and to ideas or events in the current lesson (Stigler et al.... ..."
Table 1: T-Test Results: Productivity versus Concurrency Level Concurrency Level n Mean Productivity Std. Dev.
2003
"... In PAGE 4: ... Rejecting this hypothesis is equivalent to concluding that there is a very low probability (denoted by the p-value) that any observed differences in average productivity between low and high concurrency groups is due to chance. The t-test results (shown in Table1 ) are compelling. As illustrated in Figure 1, low concurrency pairs (those working most independently) developed an average of 4.... ..."
Results 1 - 10
of
284,500