• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,162
Next 10 →

Table 1. Summary of NOAA OLE enforcement actions and their applicable State laws.

in Acting, Regional Administrator
by National Marine, Fisheries Service, Responsible Official, Robert D. Mecum, For Further, Information Jason Gasper 2006
"... In PAGE 17: ... Federal access to these sources of information would require the following regulatory and administrative changes: (1) The State of Alaska legislature would need to amend the State confidentiality statute to allow NOAA OLE and NMFS access to confidential angler and operator information. Without this information, NOAA OLE cannot seize angler license information and logbooks for inspection and evidence, enter logbook and license data in Federal court, or perform post season audits of data to pursue violators ( Table1 ). NMFS would also need access to angler and charter operator registration and logbook information to provide the necessary program support (e.... In PAGE 17: ... (2) NOAA OLE would need to be deputized by the State of Alaska Commission of Public Safety. NOAA OLE needs the authority to inspect logbooks, angler licenses, or catch cards ( Table1 ). Without this authority, anglers and charter operators are not obligated to show ... ..."

Table 1A Table 1B, which shows the sections of each law that were violated, depicts the dissimilarity

in unknown title
by unknown authors
"... In PAGE 13: ...xamine the types of violations (e.g., reporting versus emissions). Finally, we will compare the penalties. Comparing Laws and Sections Violated Table1 A shows that in the Audit docket close to 70% of the violations were of EPCRA, while another 15% were violations of RCRA and TSCA, and only 6% were violations of CWA. In contrast, Standard Administrative violations fell under EPCRA only 10% of the time, and EPCRA or RCRA or TSCA only 30% of the time, while over 25% of the violations fell under CWA.... ..."

Table 1. Administrative commands

in Discretionary and Mandatory Controls for Role-Based Administration
by Jason Crampton
"... In PAGE 3: ... In this paper, we will write parameterized administrative requests as function calls and refer to them as administrative commands (in the style of Harrison-Ruzzo-Ullman commands [6]). Table1 summarizes the ten administrative commands. It should be noted that we have only stated the immediate effect of an administrative command.... ..."

Table 2: Administrative operations

in An Administration Concept for the Enterprise Role-Based Access Control Model
by Axel Kern, Andreas Schaad, Jonathan Moffett
"... In PAGE 3: ...Table 2: Administrative operations Table2 lists the operations which can be specified in admin- istrative permissions. All operations are valid on the object level.... ..."

Table 1: Transport Traffic and Schedule Length Scaling Laws Strategy TT SL

in On the Scalability of Hierarchical Cooperation for Dense Sensor Networks
by Tamer ElBatt
"... In PAGE 6: ... 4.2 Performance Comparison In this section, we compare the scaling laws associated with var- ious cooperation strategies addressed in this paper and summarized in Table1 . This is of paramount importance to judge their rela- tive performance, their advantages and limitations, and finally po- tential avenues for extending this work.... In PAGE 6: ... This, in turn, motivated us to exam- ine the entire space of strategies bounded by the two extremes, via varying the cooperation set size i, using the two-phase cooperation framework. Although the linear SL scaling law still persists under two-phase cooperation, Table1 shows that varying the parameter i from 1 to N varies the scaling laws between the two extreme strategies. This, in turn, suggests that the parameter i creates room for optimizing the TT and SL for a given network size.... ..."

Table 1: Transport Traffic and Schedule Length Scaling Laws Strategy TT SL

in On the Scalability of Hierarchical Cooperation for Dense Sensor Networks
by Tamer ElBatt
"... In PAGE 6: ... 4.2 Performance Comparison In this section, we compare the scaling laws associated with var- ious cooperation strategies addressed in this paper and summarized in Table1 . This is of paramount importance to judge their rela- tive performance, their advantages and limitations, and finally po- tential avenues for extending this work.... In PAGE 6: ... This, in turn, motivated us to exam- ine the entire space of strategies bounded by the two extremes, via varying the cooperation set size i, using the two-phase cooperation framework. Although the linear SL scaling law still persists under two-phase cooperation, Table1 shows that varying the parameter i from 1 to N varies the scaling laws between the two extreme strategies. This, in turn, suggests that the parameter i creates room for optimizing the TT and SL for a given network size.... ..."

Table 1. Administrative Issues

in unknown title
by unknown authors

Table 24: New Institutional Arrangements for Improving Access to Justice

in unknown title
by unknown authors 2004
"... In PAGE 4: ...able 21: TMA Revenue Structure-F apos;u njab Sample ................................................................................... 29 Table 23: Examples of Allocation of Legal apos; Powers, Pre-pd Post-Abolition of the Executive Magistracy 36 Table24 : New Institutional Arrangements for Improving Access to Justice .... ..."

Table 3 Judge n %

in Abstract Estimating Upper and Lower Bounds on the Performance of Word-Sense Disambiguation Programs
by William Gale, Kenneth Ward Church, David Yarowsky

Table 7 Cross-judge utility agreement (J) Judge 1 Judge 2 Judge 3 Overall

in Centroid-based summarization of multiple documents
by Dragomir R. Radev A, Hongyan Jing B, MaƂgorzata Stys B, Daniel Tam A 2003
Next 10 →
Results 1 - 10 of 4,162
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University