Results 21 - 30
of
24,020
Table 1. --N-gram databases
"... In PAGE 4: ... The present C3, C7, C15, and CU sct sizes were chosen because they are substantially different from each other (unlike the C7, C12, C14, and C23 of the earlier studies). Table1 presents the twelve combinations of the CxLx factors examined. Table 1.... In PAGE 5: ...ccurrence of type r. The unit of measurement for entropy is the bit. Entropy was maximized, within the given prior constraint of directionality, in an effort to minimize the potentially detrimental effects of information loss caused by the classification process. After the classification schemes had been determined, the n-grammed databases found in Table1 were created. Data was next collected about the occurrence of intervals across the songs using the BD file (Table 3).... ..."
Table 3. Effects of transaction costs factors on telecommunication services acquirement process.
241
"... In PAGE 13: ... Table3 summarizes our discussion with an intuitive assessment based on our discussion of transaction cost levels at the various phases of the service acquirement process. Table 3.... ..."
Table 3: Relative advantages and disadvantages of HP-2PL and OCC-W50. Note that we have only identified the factors that may affect the system performance. The extent of the performance impacts (on which each of the factor exerts) depends on various system parameters, such as the system workload, the data access time, and the degree of data contention among transactions. Furthermore, in the discussion of the impact on system performance, we have ignored the effect of disk scheduling, data caching, and priority scheduling of the CPU and disk. The significance of such factors will be very different when their impact considerations are combined with those for disk scheduling, data caching, and priority scheduling. For example, disk accesses are slow and unpredictable. The response time of a disk request depends on the position of the disk head (and thus on the previous disk access) and how the disk schedules requests. Typical disk access time is in the order of milliseconds with a relatively large variance. Moreover, disk requests are served one at a time, and preemption is not possible. Therefore, it is possible that a disk request (and the issuing transaction) is blocked by a few others due to disk contention (even if there is no data conflict among the transactions). Disk access delay and, more importantly, its variance, are amplified by the chain of requests. These factors are detrimental to satisfying the transaction deadlines [CSKT91]. On the other hand, the probability of cache hit can significantly affect the impact of the disk scheduling on the performance of the protocols.
2002
"... In PAGE 11: ... Harmful waits occur more likely to non-real-time transactions because they are more likely being blocked due to their low priorities. We summarize the advantages and disadvantages of HP-2PL and OCC-W50 in Table3 . In the table, we use a... ..."
Cited by 1
Table 4: Effectiveness analysis for heuristics with critical threshold requirements
1992
"... In PAGE 15: ...ontaining faults. This minimal threshold is referred to as the critical threshold. After the critical level is decided, suspicious statements are thus highlighted by the heuristic. In Table4 , Rows c and b are the critical thresholds: the ratio of the rank of the critical level to the number of ranked levels and the ratio of suspicious statements within and below the critical level to statements involved in the heuristic (i.... In PAGE 15: ... Because H14 would consider results of other heuristics, a precise critical threshold is hard to define for it. In Table4 , Rows a and b for H14 indicate the number of predicate statements in a tested program divided by the number of the executable statements and the number of the statements highlighted by H1, respectively. Row c tells the effectiveness of using H14 to locate faulty predicate statements.... In PAGE 15: ... A unique threshold, which makes the suggested domain reasonably small and consistently contain faults, is highly desirable. In Table4 , critical thresholds for various heuristics in Row b range from 1% to 91%. A standard threshold cannot be decided within this wide scope.... ..."
Cited by 7
Table 4: Effectiveness analysis for heuristics with critical threshold requirements
1992
"... In PAGE 15: ...ontaining faults. This minimal threshold is referred to as the critical threshold. After the critical level is decided, suspicious statements are thus highlighted by the heuristic. In Table4 , Rows c and b are the critical thresholds: the ratio of the rank of the critical level to the number of ranked levels and the ratio of suspicious statements within and below the critical level to statements involved in the heuristic (i.... In PAGE 15: ... Because H14 would consider results of other heuristics, a precise critical threshold is hard to define for it. In Table4 , Rows a and b for H14 indicate the number of predicate statements in a tested program divided by the number of the executable statements and the number of the statements highlighted by H1, respectively. Row c tells the effectiveness of using H14 to locate faulty predicate statements.... In PAGE 15: ... A unique threshold, which makes the suggested domain reasonably small and consistently contain faults, is highly desirable. In Table4 , critical thresholds for various heuristics in Row b range from 1% to 91%. A standard threshold cannot be decided within this wide scope.... ..."
Cited by 7
Table 1:Main Sources of Unavailability in Existing Refrigerators
"... In PAGE 1: ... The sources of unavailability in existing cryogenic refrigeration systems have been investigated to find out, whether the installation of multiple refrigerators would increase the availability. Table1 shows the main causes of unavailability in order of the frequency of their occurrence. It turns out that concerning the four most frequent sources of unavailability the effect of multiple plants is either small, negligible or even detrimental.... ..."
Table 1 Summary of E1CD Surface Mutations Mutation
"... In PAGE 9: ... Single residue mutations were found not to be adequate for testing activity and binding performance. Mutant Production and Purification The results of the production and testing of 22 individual and sets of EI surface mutations are given in Table1 . For comparison, the activity, binding data, and fermentation yield/purification yield of the E.... In PAGE 9: ...nzyme protocol uses pH 8.0 buffer). The mutant with a pI gt;6 lost activity after ion-exchange chromatography. The amino acid sites Asp327 and Asp165 were found to be detrimental to enzyme stability and activity, (see Table1 ). Another mutant, EI-T248A/S251A/S130A/S121A/T129A/ S131A, demonstrated especially low protein yields, possibly owing to the cluster of hydroxyl residues 129, 130, and 131.... In PAGE 12: ...ydrolysis activity (Fig. 4). Replacement of Asp165 and Asp327 had a pro- found detrimental effect on both hydrolysis activity and stability during purification. Interestingly, one mutation set, Asp334Arg/Asp68Arg/ Asp119Arg, showed greater activity on cellulose than the wild-type enzyme (see Table1 ). Curiously, this improved mutant exhibited a lower pNPC activity than the wild type.... ..."
Table 6. Single equation estimations of environmental commitment with disaggregated democracy
2002
"... In PAGE 38: ...evels of participation. All observations with 0% participation were given an additional 0.001% in order to avoid mathematically undefined terms. Table6 reports our estimation results entering the three dimensions of democracy in lieu of the aggregate Polity variable. In most cases participation is the variable that tests significantly.... In PAGE 39: ... lt; Insert Table6 about here gt; 8.5 Is regime instability detrimental to environmental commitment? A number of studies regarding the effects of democracy distinguish between the level and stability of democracy.... In PAGE 61: ... Table6 (continued). # env.... ..."
Table 6 (continued).
2002
"... In PAGE 38: ...evels of participation. All observations with 0% participation were given an additional 0.001% in order to avoid mathematically undefined terms. Table6 reports our estimation results entering the three dimensions of democracy in lieu of the aggregate Polity variable. In most cases participation is the variable that tests significantly.... In PAGE 39: ... lt; Insert Table6 about here gt; 8.5 Is regime instability detrimental to environmental commitment? A number of studies regarding the effects of democracy distinguish between the level and stability of democracy.... In PAGE 60: ... Table6 . Single equation estimations of environmental commitment with disaggregated democracy variables.... ..."
Table 6. Single equation estimations of environmental commitment with disaggregated democracy
"... In PAGE 38: ...evels of participation. All observations with 0% participation were given an additional 0.001% in order to avoid mathematically undefined terms. Table6 reports our estimation results entering the three dimensions of democracy in lieu of the aggregate Polity variable. In most cases participation is the variable that tests significantly.... In PAGE 39: ... lt; Insert Table6 about here gt; 8.5 Is regime instability detrimental to environmental commitment? A number of studies regarding the effects of democracy distinguish between the level and stability of democracy.... In PAGE 61: ... Table6 (continued). # env.... ..."
Results 21 - 30
of
24,020