Results 21 - 30
of
10,504
Table 1. Behavioural Classes and their corresponding Behaviours
"... In PAGE 6: ... Each Behavioural Class contained Behaviours, which are used to define each category into more detail. The Behavioural Classes and their Behaviours are shown on Table1 (Gomez et al., 2004).... ..."
Table 1. NGO ICT policy goals and the issues they address.
2004
"... In PAGE 9: ... This means for instance that the behaviour aspect is in- volved with the processes an outsourced system executes and not with processes needed for maintenance such as described by ASL and ITIL. 6 Example: NGO Outsourcing Concerns Table1 lists the goals with respect to which we will decide what concerns us in the outsourcing options. For each cell in the matrix, we ask whether it will help bring us closer to the goals, and what the risk is that it take us farther away from the goals.... ..."
Cited by 3
Table 1 Contribution of monetary policy shocks to the forecast error variance
"... In PAGE 13: ...12 Graph 2 shows the historical contribution of the monetary policy shocks to the short-term interest rate in the euro area and the US, whereas Table1 provides the contribution of the monetary policy shocks to the variance of the forecast error of output, prices, the interest rate and the exchange rate at various horizons. From Graph 2, it is clear that periods of easy monetary policy in the euro area can be situated at the end of 1984 and in 1991.... In PAGE 13: ...5 2.0 Table1 shows that, as in most of the VAR literature, the contribution of policy shocks to output and price developments is rather limited. This is to be expected as the monetary policy shocks capture deviations of the short-term interest rate from average monetary policy behaviour over the estimation period.... ..."
Table 4: Behavioural method to simulate complex behaviours
"... In PAGE 8: ...Table4... ..."
Table 3: One part of the learnt policy. The six middle entries of the rows are the feature values corresponding to those features listed and numbered in Table 2. (The values of Feature 7 are not shown as these are always zero here). The column marked by the label `BId apos; denotes the number of the module that was chosen by a pure exploitation policy under the con- ditions described by the respective feature values. For example, in State 1 the robot used the behaviour \examine object quot; (Controller 3) with the pure exploitation strategy.
"... In PAGE 25: ...espectively, with nearly equal std-s of 34.78 and 34.82, respectively. One part of the learned policy is shown in Table3 , where 10 states were selected from the 25 explored ones together with their learnt associated behaviours. Theoretically, the total number of states is 27 = 128, but as learning concentrates on feature-con gurations that really occur this num-... ..."
Table5:Codesizeforthenetworkingcasestudy. The number of C statements (counted with the number of semicolons) that are needed to implement the TCP msgList abstraction within infoLinux is shown in the upper table. The lower table presents the code size for implementing the congestion-control policy, infoVegas, at user-level.
2003
Cited by 25
Table 2: Correlation coefficients measuring relationship between gate level stuck-at fault model and behavioural level fault models.
"... In PAGE 4: ... The correlation coefficient measures the covariance of two data sets divided by the product of their standard deviations. Table2 reports the results we obtained when correlating the gate-level stuck-at with statement coverage and bit+condition coverage. Moreover, we report the correlation coefficient for a new high-level fault model we described in the following.... In PAGE 6: ... 4 b). According to Table2 for the considered benchmarks, the bit+condition+state coverage metric improves correlation with respect to gate stuck-at fault coverage. We plan to perform a new set of experiments on models with bigger control part, in order to extend the analysis to other high-level fault models and to better investigate our initial conclusions.... ..."
Table 1 Behavioural semantics
"... In PAGE 6: ... For the moment, ranges over A (like ); later, we will extend the observables of CCSa0 a0 so that the structural congruence rule will have a wider application. Noteworthy, rules in Table1 do not give any transition out of anchor processes. The reason is that anchor processes only have \structural quot; transitions and do not expose any \behavioural quot; observation.... ..."
Table 1. Behaviour detection
2005
"... In PAGE 8: ...ith the initial bid. MEG does not enforce the stakeholders to accept that value. Now, we turn our attention to the mechanisms built in MEG to create difficulties to Win-Lose and Lose-Lose attitudes. MEG allows Lose-Lose attitudes using a block- ing mechanism (mentioned in Table1 ). Basically, the blocking mechanism allows one stakeholder to lead the negotiation to a suspended state (LL), so that the process stops until the stakeholder removes that condition or the SQFD task is concluded without consensus.... ..."
Cited by 2
Results 21 - 30
of
10,504