### Table 2: Distribution of how building blocks are con- structed in example runs.

1997

"... In PAGE 5: ...1 that this constructive streak is extremely small. Table2 shows the distribution of how building blocks are constructed in a set of example runs. Column one shows the number of generations until an optimal solution is found; column two shows the total num- ber of building blocks that existed during each run, summed over all individuals and all generations; and column three shows the number of building blocks con- structed (i.... ..."

Cited by 7

### Table 3 Summary Statistics for Daily Integrated Volatility Statistics DM/$ Rate Yen/$ Rate Nikkei 225

"... In PAGE 15: ...eturns, we refer to Andersen et al. (2000a). Next we transform the three ve-minute return series into daily time series of integrated volatilities, as approximated by the quadratic variations in equation (2). Table3 provides the standard set of summary statistics for each series. The means of the integrated volatil- ity for the two exchange rates imply an annualized standard deviation of approximately 11.... In PAGE 16: ...rocedure.The parameter estimates for the three series are reported in Table 4.15 With the exception of the slightly higher values for , the estimates are almost identical to the ones reported here. As expected the estimates for the long-run means, or , are all fairly close to the sample means for the three integrated volatility series reported in Table3 . Also, not surprisingly, the estimates of the variance-of-variance parameter, or , have the largest standard errors among all of the parameters.... ..."

### Table 6 Conditional probability tables of BN con- structed from deceptive trap G191tness function.

1998

"... In PAGE 6: ...Table 6 Conditional probability tables of BN con- structed from deceptive trap G191tness function. The BN whose graph is shown in Figure 2 and whose con- ditional probability tables are shown in Table6 is constructed from the G191tness function G105 shown in Table 5. In order to make this BN deceptive, the G83G117G43G92c52G44 table is replaced with a new ta- ble G83G117G43G92 c51 c52G44 as follows.... In PAGE 6: ... After some calculation we get G83G117G43G92c52 G64 G51G44 G63 G51G61G56G55G58G60. It turns out that for example G83G117G43G92 c51 c52 G64 G51G44 G64 G51G61G56G55 and G83G117G43G92 c51 c52 G64 G52G44 G64 G51G61G55G57 gives a fully deceptive BN when the two other tables in Table6 are kept the same. What happens if we consider a four-bit trap function? Let G110 G64 G55, G125 G64 G54, G100 G64 G55, and G101 G64 G56 in Equation 5, giving the function G105G43G69G44 G64 G29 c55 c54G43G54 G3 G120G43G69G44G44 if G120G43G69G44 G23 G54 G56G43G120G43G69G44 G3 G54G44 if G120G43G69G44 G65 G54 G61 The result of running Construct, as shown in Table 7, is quite similar to that for the three-bit trap function.... In PAGE 6: ... First, the graph in Figure 2 is fully connected, indicating interactions between all ran- dom variables. Second, the conditional probability tables in Table6 and in Table 7 contain more varied and extreme Y1 Y3 Y2 Figure 2 Graph of BN constructed from deceptive trap G191tness function with three bits. G108 G69 G64 BinG43G108G44 G120G43G69G44 G105G43G69G44 G105G43G69G44 G46 G102 G102G102G43G108G44 0 000 0 1 4 55 1 001 1 3 6 403 2 010 1 3 6 403 3 011 2 5 8 2981 4 100 1 3 6 403 5 101 2 5 8 2981 6 110 2 5 8 2981 7 111 3 0 3 20 Table 8 Hill G191tness function deG191ned over bit string con- sisting of three bits.... ..."

Cited by 1

### Table 9 Conditional probability tables of BN con- structed from hill G191tness function with three bits.

1998

"... In PAGE 6: ... Somewhat surprisingly, the same graph was in- duced as for the corresponding trap function, shown in Fig- ure 2. However, the conditional probability tables, shown in Table9 , are different. The most prominent differences are the following.... ..."

Cited by 1

### Table 2: Necessary corners of a parallelogram con- structed from data segments AB and CD for detect- ing intersection

"... In PAGE 5: ... Suppose AB and CD are two data segments output by the segmenta- tion process and their slopes are kAB and kCD. All possible cases are listed in Table2 . Let us examine the drop search in case 1.... In PAGE 6: ... The details are provided in the Appendix. The case analysis in Table2 determines the corner points whose features should be collected according to different slopes of two data segments for detecting intersection be- tween a query region and a parallelogram. But due to seg- mentation errors, some true events in data may be missed by the above detection.... In PAGE 6: ...rue events. The analysis is presented in Section 5. Specific features to be collected for other cases can be given in the same manner as above. In the case analysis shown by Table2 , we notice that at most three corner points are needed (for example, in the case of jump search of case 2), and in some case only one corner point is enough (for example, in the case of drop search of case 2). The expected number of corner points depends on the case distribution in data segments.... ..."

### Table 1: Frequency Component Con- structed using Pseudo-Random Num- ber Generator

"... In PAGE 8: ... Table1 0: Monthly Annuity Payments Based on a $100,000 House and an Annuitant Age 65 at Purchase Monthly Annuity Pay- ments Contract Interest Rate 11.... ..."

### Table 2. Eleven complex commands con- structed from the seven basic motions

"... In PAGE 7: ...ifferent motions. These seven elements are shown in Table 1. Using these basic ele- ments alone the system would be limited to seven different commands, so in order to provide a greater number of commands more complex commands are constructed from these motion elements. These complex commands are used for our recognition exper- iments and are shown in Table2 . Although we have used 11 complex commands this could easily extended to a larger number of commands.... In PAGE 7: ... Data and experimental procedure The experimental data was collected from 35 sub- jects. Each subject was asked to draw each of the commands in Table2 five times using a standard camera equipped mobile phone, a Nokia N90. The majority of subjects had no previous experience in performing this task.... ..."

### Table 1 compares the size of the universal trees con- structed by U-TREE with the lower bound from Theo- rem 1.

1997

Cited by 1

### lables constitute the first names. And then, we con- structed the English-Korean biographical dictionary by connecting the first name and the last name. The method of constructing the bilingual biographical dic- tionary can be summarized as follows:

2002

Cited by 1