Results 11 - 20
of
11,455
Table 1 displays the system performances for different initial conditions, assuming that agents do not model the knowledge bases on servers. After ten system runs, statistical process- ing were performed on data, by calculating the mean and the standard deviation.
"... In PAGE 3: ...Table1 : System performances when agents do not model the knowledge bases on servers. Figure 1: The influence of knowledge item types on the average number of static agent answers.... ..."
TABLE 11. Distribution of items and search results by research area and document type.
2003
Table 3: Filled Investment Recommendation Template. BOinvestmentrecommendationBQ BOauthorBQ Henrik Oppermann BO/authorBQ
"... In PAGE 8: ...nformal knowledge items (e.g., cf. Table3 ). One may note that these different degrees of formality are often combined, e.... ..."
Table 3. Change in control items with no media stimuli Pre-
"... In PAGE 10: ... The five items on civic knowledge asked the truth or falsity of statements about the number of members of parliament, the longest time between general elections, and whether there were separate elections for the European parliament. The results in Table3 show that there were some positive gains on three of the nine control items, but the size of these effects were less than that for the policy items where we provided media information, and there were no significant knowledge gains on the other items. [Table 3 about here] ... In PAGE 10: ... The results in Table 3 show that there were some positive gains on three of the nine control items, but the size of these effects were less than that for the policy items where we provided media information, and there were no significant knowledge gains on the other items. [ Table3 about here] ... ..."
Table 1 is a simplification, and it disregards factors that may influence the difficulty of exploiting these vulnerabilities. For instance, source code for the iVotronic firmware would certainly facilitate development of the attacks described below, though it is probably not a necessary precondition. In any given circumstance, other items or knowledge may be necessary or helpful to execute an exploit.
2007
"... In PAGE 37: ...Table1... In PAGE 37: ...Table1... In PAGE 37: ...ime, but we believe such a simple exploit is not revealing. Several laboratory attacks, e.g. [11, 12] provide convincing evidence that academically identified buffer overflows in voting systems can be Conditions to Exploit a PEB Virus Must be a malicious, sophisticated intruder They must acquire: - one or more voting terminal(s) - one or more PEB(s) The virus must: - be effectively injected - propagate - execute its designed attack - delete any trace Accomplish all of this undetected Table1... ..."
Table 3: Some possible updates on the item I6 after the visit to I4
"... In PAGE 3: ... The update of the user knowledge about an item can be: incremental or fixed (the degree of user knowledge is set to a fixed degree of knowledge), absolute (it uses an absolute labelSEM) or relative (it uses the degree of user knowledge about the visited item), each-time or first-time (it is run only the first time the item in the head is visited). Table 2 shows the available update predicates and Table3 includes examples of updates to the item I6 after I4 is visited. To help the author, the system generates by default a set of Ru for each CSL.... ..."
Table 6: Items for Measurement of Implementation Predictor Constructs
"... In PAGE 12: ...91 Management support for the implementation New Management expectations of the implementation Management participation in the implementation Management monitoring of the implementation Management knowledge about the implementation Management time needed for the implementation Management enthusiasm for the implementation .93 Table6 : Items for Measurement of Implementation Predictor Constructs Construct Measurement of Construct... In PAGE 13: ...631** .529** Table6 : Items for Measurement of Implementation Predictor Constructs Construct Measurement of Construct... ..."
Table 1: Language and Grammar Item Subject Strongly
in ISSN 1823:1144 The Instructional Design Evaluation of a Courseware of a Malaysian Virtual University
2006
"... In PAGE 3: ... That meant their experience in using the computer was concentrated more on surfing the net or playing computer games. Language and Grammar Table1 shows that there was no apparent difficulty in understanding the language or grammar used in the courseware even though most students were not sure about items 4 and 6 which were related to the consistency and correctness of spellings and punctuations. This could be because they lacked the knowledge on English spellings and punctuations.... ..."
TABLE 2. Categorized items from the first part of the model perception questionnaire.
Results 11 - 20
of
11,455