• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 27,899
Next 10 →

Table 3 summarizes the drug discovery and development process with a breakdown of the costs involved and the corresponding timeframe2.

in Introduction to Drug Discovery
by unknown authors
"... In PAGE 5: ... QSAR and PM can be used to obtain an understand why some leads bind to the target. Table3 . Methods used in the drug finding process.... ..."

Table 7: Closed Discovery Set Sizes.

in Text Mining: Generating Hypotheses from MEDLINE
by Padmini Srinivasan 2004
"... In PAGE 24: ... We now look at the number of ranked terms identified by each of our closed discovery processes. These are given in Table7 . Cell values indicate total number of terms in the set shown to the user after duplicate terms have been removed.... ..."
Cited by 23

Table 2 - Discovery of FCP-2 capabilities

in unknown title
by unknown authors
"... In PAGE 7: ...able 1 - SCSI and Fibre Channel protocol functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Table2 - Discovery of FCP-2 capabilities .... In PAGE 28: ...7 Discovery of FCP capabilities A number of Fibre Channel protocol capabilities require the knowledge and agreement of both the target and the initiator that such capabilities may or shall be used. Table2 provides references to the discovery process for each of the Fibre Channel protocol capabilities. 4.... ..."

Table 2 - Discovery of FCP-2 capabilities

in unknown title
by unknown authors
"... In PAGE 10: ...able 1 - SCSI and Fibre Channel protocol functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Table2 - Discovery of FCP-2 capabilities .... In PAGE 31: ...7 Discovery of FCP capabilities A number of Fibre Channel protocol capabilities require the knowledge and agreement of both the target and the initiator that such capabilities may or shall be used. Table2 provides references to the discovery process for each of the Fibre Channel protocol capabilities. 4.... ..."

Table 2 - Discovery of FCP-4 capabilities

in unknown title
by unknown authors 2003
"... In PAGE 10: ...able 1 - SCSI and Fibre Channel Protocol functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Table2 - Discovery of FCP-4 capabilities .... In PAGE 31: ...8 Discovery of FCP capabilities A number of Fibre Channel Protocol capabilities require the knowledge and agreement of both the target FCP_Port and the initiator FCP_Port that such capabilities may or shall be used. Table2 provides references to the discovery process for each of the Fibre Channel Protocol capabilities. 4.... ..."

Table 2 - Discovery of FCP-3 capabilities

in unknown title
by unknown authors 2003
"... In PAGE 9: ...able 1 - SCSI and Fibre Channel Protocol functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Table2 - Discovery of FCP-3 capabilities .... In PAGE 29: ...8 Discovery of FCP capabilities A number of Fibre Channel Protocol capabilities require the knowledge and agreement of both the target FCP_Port and the initiator FCP_Port that such capabilities may or shall be used. Table2 provides references to the discovery process for each of the Fibre Channel Protocol capabilities. 4.... ..."

Table 2 - Discovery of FCP-2 capabilities

in unknown title
by unknown authors
"... In PAGE 8: ...able 1 - SCSI and Fibre Channel protocol functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Table2 - Discovery of FCP-2 capabilities .... In PAGE 29: ...7 Discovery of FCP capabilities A number of Fibre Channel protocol capabilities require the knowledge and agreement of both the target and the initiator that such capabilities may or shall be used. Table2 provides references to the discovery process for each of the Fibre Channel protocol capabilities. 4.... ..."

Table I. Path length of cache discovery process After discovering where the cache is, the remote page retrieval process (as illustrated in Figure 10) is invoked if there exists a cached copy of the data in remote memory, but not local memory. Table II shows the average path length of each step in the remote page retrieval process.

in Dynamo: Design, Implementation, and Evaluation of Cooperative Persistent Object Management in a Local Area Network
by Jiong Yang, Wei Wang, Silvia Nittel, Richard Muntz, Vince Busam

Table 1: Examples of detected protein modules: k - size of cliques, N - number of proteins included in the module, cor - average correlation of expression. The false discovery rates are shown for representative biological processes and cellular components.

in Functional and Transcriptional Coherency of Modules in the Human Protein Interaction Network
by Matthias E. Futschik, Gautam Chaurasia, Anna Tschaut, Jenny Russ, M. Madan Babu, Hanspeter Herzel

Table 2: The occurrences of unexpected discoveries

in Unexpected Discoveries: How Designers Discover Hidden Features In Sketches
by Masaki Suwa , John Gero, Terry Purcell 1999
"... In PAGE 9: ... The fact that a significant portion of the perceptual actions, 28%, belonged to UXDs clearly shows its importance in the design process of our architect. Table2 shows the occurrences of each type of UXDs. 107 UXDs belong to quot;relation-type quot;, 36 to quot;visual- feature-type quot;, and 28 to quot;implicit-space-type quot;.... ..."
Cited by 5
Next 10 →
Results 11 - 20 of 27,899
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University