### Table 1: Conversion rules to additions for primitive

"... In PAGE 2: ... What we are interested in this step is to extract all the operands from the converted addition expression. Table1 sum- marizes all possible conversion rules for basic oper- ations. Note that there exist three di#0Berent rules to convertamultiplication.... In PAGE 3: ... In addition, rule 7 can be used as a pre- processing step which guarantees that the number of operations is always within half of bit-size of the con- stant. We apply the rules in Table1 to the original ex- pression of tree to obtain a set of operands, some of which might need to negated #28e.g.... ..."

### Table I. Additional interaction primitives.

2007

Cited by 1

### Table 4 Additional Primitive Lie Algebras of Vector Fields in R2

1996

"... In PAGE 3: ... For instance, extensive symbolic algebra calculations using the realization of so(3; R) given by Case 4.2 in Table4 failed to yield any real-valued potentials, even after allowing for a possible rescaling of the wave function by a non-zero gauge factor, cf. (7).... In PAGE 15: ... However, the complexi cation (or analytic continuation) of each of these ve additional Lie algebras will, of course, be equivalent, under a complex di eomorphism, to one of the complex normal forms on our list. The complete list of these additional real forms along with their canonical complexi- cations appears in Table4 ; the required changes of variables needed to change them into the canonical form appears later in this section. Therefore, to complete the classi cation of all real Lie algebras of rst-order di erential operators, we need only determine the real cohomology spaces associated with these ve additional real forms, and, further, to determine what values of the cohomology parameters will produce quasi-exactly solvable algebras.... In PAGE 21: ... Theorem 11. Every nite-dimensional Lie algebra of rst order di erential opera- tors with vector eld part given by one of the ve additional primitive real forms listed in Table4 is a subalgebra of one of the pseudo-orthogonal Lie algebras given by (45). 6.... ..."

### Table 4 Additional Primitive Lie Algebras of Vector Fields in R2 Generators Dim Structure Complex Form

1995

"... In PAGE 3: ... For instance, extensive symbolic algebra calculations using the realization of so(3; R) given by Case 4.2 in Table4 failed to yield any real-valued potentials, even after allowing for a possible rescaling of the wave function by a non-zero gauge factor, cf. (7).... In PAGE 15: ... However, the complexi cation (or analytic continuation) of each of these ve additional Lie algebras will, of course, be equivalent, under a complex di eomorphism, to one of the complex normal forms on our list. The complete list of these additional real forms along with their canonical complex- i cation appear in Table4 ; the required changes of variables needed to change them into the canonical form appears later in this section. Therefore, to complete the classi cation of all real Lie algebras of rst-order di erential operators, we need only determine the real cohomology spaces associated with these ve additional real forms, and, further, to determine what values of the cohomology parameters will produce quasi-exactly solvable algebras.... In PAGE 21: ... Theorem 11. Every nite-dimensional Lie algebra of rst order di erential opera- tors with vector eld part given by one of the ve additional primitive real forms listed in Table4 is a subalgebra of one of the pseudo-orthogonal Lie algebras given by (45). 6.... ..."

### Table 3: New NetQL primitives for additional relational operations.

in Resource and Knowledge Discovery in Global Information Systems: A Multiple Layered Database Approach

1995

Cited by 18

### Table 3: New NetQL primitives for additional relational operations.

in Resource and Knowledge Discovery in Global Information Systems: A Multiple Layered Database Approach

1995

Cited by 18

### Table 1: The Constraint Primitives of SCREAMER

"... In PAGE 5: ... To assess the scope of SCREAMER and its extension, SCREAMER+, refer to tables 1 and 2. Table1 summarises the constraint primitives provided by SCREAMER, and ta- ble 2 summarises the additional primitives provided by SCREAMER+. The primitives of SCREAMER are documented in (Siskind, 1991); those of SCREAMER+ are de- scribed in the following section of this document.... ..."

### Table 1: The Constraint Primitives of SCREAMER

"... In PAGE 5: ... To assess the scope of SCREAMER and its extension, SCREAMER+, refer to tables 1 and 2. Table1 summarises the constraint primitives provided by SCREAMER, and ta- ble 2 summarises the additional primitives provided by SCREAMER+. The primitives of SCREAMER are documented in (Siskind, 1991); those of SCREAMER+ are de- scribed in the following section of this document.... ..."

### Table 1: The scan model is the EREW P-RAM mode with the addition of two scan primitives. These scan primitives improve the asymptotic running time of many algorithms by an O(lg n) factor. The algorithms not described in this paper are described elsewhere [7, 8]. Some of the algorithms are probabilistic.

1989

"... In PAGE 10: ... This paper is divided into two parts: algorithms and implementation. The rst part illus- trates how the scan primitives can be used in algorithm design, describes several interesting algorithms, and proves some of the results of Table1 . The second part describes a very simple hardware implementation of the two scan primitives, and describes how other scan operations can be implemented on top of these two scans.... ..."

Cited by 138

### Table 1: Examples of Jam Primitives

1996

"... In PAGE 13: ... A set of data transfer primitives is also added to take advantage of FUNi apos;s low-overhead remote DMA transfer. Examples of the Jam primitives and a brief description are given in Table1 . As in CMAM, each Jam primitive is supported in two priorities; high priority primitives have the additional su x reply.... ..."

Cited by 17