• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 30,781
Next 10 →

Table 2-2. Implementation limits

in Operation safety
by unknown authors 2000

Table 4: Some limitations of the implementation.

in Integrating Communication, Cooperation, and Awareness: The DIVA Virtual Office Environment
by Markus Sohlenkamp, Greg Chwelos 1994
Cited by 49

Table 1: Summary of router architectures used in experiments. Feature Implementation Buffer Limit

in An SLA Perspective on the Router Buffer Sizing Problem
by Joel Sommers, Albert Greenberg, et al.
"... In PAGE 3: ... 3.1 Router Architectures The three router configurations used in our tests and summarized in Table1 each have significantly different capabilities with respect to the specific line/interface card attached to the bottleneck link, the amount of memory available for packet buffers, and how par- ticular features are implemented (e.g.... ..."

Table 2. Summary of cost estimates for implementing the annual limit using existing State resources.

in Acting, Regional Administrator
by National Marine, Fisheries Service, Responsible Official, Robert D. Mecum, For Further, Information Jason Gasper 2006
"... In PAGE 24: ... This person would also provide assistance to NOAA OLE with the collection of evidence, administrative correspondence, preparation of cases, and maintaining the database by working closely with NMFS programmers and ADF amp;G staff as needed. The expected annual cost for a GS- 9 part time NMFS staff person is approximately $50,000 ( Table2 ). Programmer time would also be required to build and maintain a Federal database.... ..."

Table 2. Approximate practical limitations (on stock systems) for various methods to implement flow of control.

in unknown title
by unknown authors
"... In PAGE 2: ... Worse, some operating systems have a fixed and fairly low limit on the number of processes that can be created. Table2 in Section 4 summa- rizes these practical limitations on several stock systems. 2.... In PAGE 2: ... But in prac- tice, we found that many platforms impose hard limits on the maximum number of pthreads that can be created in a process. Table2 in Section 4 shows the practical limitations on pthreads on several stock systems. In particular, operating system kernels tend to see kernel threads as a special kind of process rather than a unique en- tity.... In PAGE 8: ...igure 4. Context switching time vs. number of flows on a x86 Linux machine. Table2 illustrates approximate practical limitations (on stock systems). It shows the approximate maximum num- ber of processes a user can create in a processor and the... ..."

Table 1 lists all of the benchmark programs, both integer and floating-point, showing the number of lines of source code, the HLI size in KBytes, and the ratio of the HLI size to the code size. This ratio shows the average number of bytes needed for the HLI for each source code line. We have only a few integer programs due to current implementation limitations of the SUIF front-end tools.4

in High-Level Information -- An Approach for Integrating Front-End and Back-End Compilers
by Sangyeun Cho, Jenn-yuan Tsai , Yonghong Song , Bixia Zheng, Stephen J. Schwinn, Xin Wang, Qing Zhao, Zhiyuan Li , David J. Lilja, Pen-chung Yew 1998
"... In PAGE 7: ...mgrid CFP95 1725 35 21 141.apsi CFP95 21921 442 21 mean , , , 27 Table1 . Benchmark program characteristics.... ..."
Cited by 4

Table 1 lists all of the benchmark programs, both integer and floating-point, showing the number of lines of source code, the HLI size in KBytes, and the ratio of the HLI size to the code size. This ratio shows the average number of bytes needed for the HLI for each source code line. We have only a few integer programs due to current implementation limitations of the SUIF front-end tools.4

in High-Level Information - An Approach for Integrating Front-End and Back-End Compilers
by Sangyeun Cho, Jenn-yuan Tsai, Yonghong Song, Bixia Zheng, Stephen J. Schwinn, Xin Wang, Qing Zhao, Zhiyuan Li, David J. Lilja, Pen-Chung Yew
"... In PAGE 7: ...mgrid CFP95 1725 35 21 141.apsi CFP95 21921 442 21 mean ? ? ? 27 Table1 . Benchmark program characteristics.... ..."

Table 4.1. Time spent executing LimitLESS software for DTABQ and Improved DTABQ implementations, problem size 6.

in A Case Study of Shared Mmeory and Message Passing: The Triangle Puzzle
by Professor M. Frans Kaashoek, Kevin A. Lew, Kevin A. Lew 1995

Table 4.1. Time spent executing LimitLESS software for DTABQ and Improved DTABQ implementations, problem size 6.

in The Triangle Puzzle
by Kevin A. Lew, Professor M. Frans Kaashoek, Kevin A. Lew 1995

Table 1: Frequency Coverage By Band Band No. Frequency Range, GHz

in System Design Description
by Larry R. D’addario, Larry R. D’addario
"... In PAGE 3: ...2 Front End (FE) Assembly The required **frequency coverage (all atmospheric windows from 31.3 to 950 GHz) is achieved in 10 separate bands, as listed in Table1 . The band edge frequencies were chosen to provide good coverage of the windows while limiting the **edge frequency ratio for each band to lt; 1:35, considered the largest feasible value.... In PAGE 13: ....1.1.3 Frequency ranges and tuning resolution The flrst LO range for each band is immediately determined by the RF range ( Table1 ) and IF range (Table 2). At the RF band edges, it is acceptable to convert only to the IF band edges; and for the SIS bands (both 2SB and DSB cases) either sideband may be used to reach an RF band edge.... ..."
Next 10 →
Results 1 - 10 of 30,781
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University