• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 10,504
Next 10 →

TABLE statement:

in unknown title
by unknown authors

Table 1. Behavioural Classes and their corresponding Behaviours

in interactions in
by Rafael Gomez, Vesna Popovic, Sam Bucolo
"... In PAGE 6: ... Each Behavioural Class contained Behaviours, which are used to define each category into more detail. The Behavioural Classes and their Behaviours are shown on Table1 (Gomez et al., 2004).... ..."

Table 1. NGO ICT policy goals and the issues they address.

in Risk-driven conceptual modeling of outsourcing decisions
by Pascal Van Eck, Roel Wieringa, Jaap Gordijn 2004
"... In PAGE 9: ... This means for instance that the behaviour aspect is in- volved with the processes an outsourced system executes and not with processes needed for maintenance such as described by ASL and ITIL. 6 Example: NGO Outsourcing Concerns Table1 lists the goals with respect to which we will decide what concerns us in the outsourcing options. For each cell in the matrix, we ask whether it will help bring us closer to the goals, and what the risk is that it take us farther away from the goals.... ..."
Cited by 3

Table 1 Contribution of monetary policy shocks to the forecast error variance

in The Monetary Transmission Mechanism in the Euro Area: More Evidence from the VAR Analysis
by Gert Peersman, Frank Smets, Working Orking, P Ppaper, Frank Frank, Frank Smets
"... In PAGE 13: ...12 Graph 2 shows the historical contribution of the monetary policy shocks to the short-term interest rate in the euro area and the US, whereas Table1 provides the contribution of the monetary policy shocks to the variance of the forecast error of output, prices, the interest rate and the exchange rate at various horizons. From Graph 2, it is clear that periods of easy monetary policy in the euro area can be situated at the end of 1984 and in 1991.... In PAGE 13: ...5 2.0 Table1 shows that, as in most of the VAR literature, the contribution of policy shocks to output and price developments is rather limited. This is to be expected as the monetary policy shocks capture deviations of the short-term interest rate from average monetary policy behaviour over the estimation period.... ..."

Table 4: Behavioural method to simulate complex behaviours

in Virtual Humans' Behaviour: Individuals, Groups, and Crowds
by Daniel Thalmann, Soraia Raupp Musse, Marcelo Kallmann
"... In PAGE 8: ...Table4... ..."

Table 3: One part of the learnt policy. The six middle entries of the rows are the feature values corresponding to those features listed and numbered in Table 2. (The values of Feature 7 are not shown as these are always zero here). The column marked by the label `BId apos; denotes the number of the module that was chosen by a pure exploitation policy under the con- ditions described by the respective feature values. For example, in State 1 the robot used the behaviour \examine object quot; (Controller 3) with the pure exploitation strategy.

in Module Based Reinforcement Learning for a Real Robot
by Zsolt Kalmár, Csaba Szepesvári, András Lorincz
"... In PAGE 25: ...espectively, with nearly equal std-s of 34.78 and 34.82, respectively. One part of the learned policy is shown in Table3 , where 10 states were selected from the 25 explored ones together with their learnt associated behaviours. Theoretically, the total number of states is 27 = 128, but as learning concentrates on feature-con gurations that really occur this num-... ..."

Table5:Codesizeforthenetworkingcasestudy. The number of C statements (counted with the number of semicolons) that are needed to implement the TCP msgList abstraction within infoLinux is shown in the upper table. The lower table presents the code size for implementing the congestion-control policy, infoVegas, at user-level.

in Transforming Policies into Mechanisms with Infokernel
by Andrea C. Arpaci-dusseau, Remzi H. Arpaci-dusseau, Nathan C. Burnett, Timothy E. Denehy, Thomas J. Engle, Haryadi S. Gunawi, James A. Nugent, Florentina I. Popovici 2003
Cited by 25

Table 2: Correlation coefficients measuring relationship between gate level stuck-at fault model and behavioural level fault models.

in unknown title
by unknown authors
"... In PAGE 4: ... The correlation coefficient measures the covariance of two data sets divided by the product of their standard deviations. Table2 reports the results we obtained when correlating the gate-level stuck-at with statement coverage and bit+condition coverage. Moreover, we report the correlation coefficient for a new high-level fault model we described in the following.... In PAGE 6: ... 4 b). According to Table2 for the considered benchmarks, the bit+condition+state coverage metric improves correlation with respect to gate stuck-at fault coverage. We plan to perform a new set of experiments on models with bigger control part, in order to extend the analysis to other high-level fault models and to better investigate our initial conclusions.... ..."

Table 1 Behavioural semantics

in An Observational Model for Spatial Logics
by Emilio Tuosto A, Hugo Torres Vieira B
"... In PAGE 6: ... For the moment, ranges over A (like ); later, we will extend the observables of CCSa0 a0 so that the structural congruence rule will have a wider application. Noteworthy, rules in Table1 do not give any transition out of anchor processes. The reason is that anchor processes only have \structural quot; transitions and do not expose any \behavioural quot; observation.... ..."

Table 1. Behaviour detection

in A.: Software Requirements Negotiation Using the Software Quality Function Deployment
by João Ramires, Pedro Antunes, Ana Respício 2005
"... In PAGE 8: ...ith the initial bid. MEG does not enforce the stakeholders to accept that value. Now, we turn our attention to the mechanisms built in MEG to create difficulties to Win-Lose and Lose-Lose attitudes. MEG allows Lose-Lose attitudes using a block- ing mechanism (mentioned in Table1 ). Basically, the blocking mechanism allows one stakeholder to lead the negotiation to a suspended state (LL), so that the process stops until the stakeholder removes that condition or the SQFD task is concluded without consensus.... ..."
Cited by 2
Next 10 →
Results 21 - 30 of 10,504
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University