• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 11,455
Next 10 →

Table 1 displays the system performances for different initial conditions, assuming that agents do not model the knowledge bases on servers. After ten system runs, statistical process- ing were performed on data, by calculating the mean and the standard deviation.

in Agent-Based Framework with Optimized Knowledge Queries
by Florin Leon Mihai, Mihai Horia, Zaharia Dan Gâlea
"... In PAGE 3: ...Table1 : System performances when agents do not model the knowledge bases on servers. Figure 1: The influence of knowledge item types on the average number of static agent answers.... ..."

TABLE 3. Distribution of items and search results by research area.

in unknown title
by unknown authors 2003

TABLE 11. Distribution of items and search results by research area and document type.

in unknown title
by unknown authors 2003

Table 3: Filled Investment Recommendation Template. BOinvestmentrecommendationBQ BOauthorBQ Henrik Oppermann BO/authorBQ

in Knowledge Processes and Ontologies
by Steffen Staab, Hans-Peter Schnurr, Rudi Studer, York Sure
"... In PAGE 8: ...nformal knowledge items (e.g., cf. Table3 ). One may note that these different degrees of formality are often combined, e.... ..."

Table 3. Change in control items with no media stimuli Pre-

in Knows Little, Learns Less? An experimental study of the impact of the media on learning during the 2001 British general election.
by David S
"... In PAGE 10: ... The five items on civic knowledge asked the truth or falsity of statements about the number of members of parliament, the longest time between general elections, and whether there were separate elections for the European parliament. The results in Table3 show that there were some positive gains on three of the nine control items, but the size of these effects were less than that for the policy items where we provided media information, and there were no significant knowledge gains on the other items. [Table 3 about here] ... In PAGE 10: ... The results in Table 3 show that there were some positive gains on three of the nine control items, but the size of these effects were less than that for the policy items where we provided media information, and there were no significant knowledge gains on the other items. [ Table3 about here] ... ..."

Table 1 is a simplification, and it disregards factors that may influence the difficulty of exploiting these vulnerabilities. For instance, source code for the iVotronic firmware would certainly facilitate development of the attacks described below, though it is probably not a necessary precondition. In any given circumstance, other items or knowledge may be necessary or helpful to execute an exploit.

in Table of Contents
by Alec Yasinsac, David Wagner, Matt Bishop, Ted Baker, Breno Medeiros, Gary Tyson, Michael Shamos, Mike Burmester 2007
"... In PAGE 37: ...Table1... In PAGE 37: ...Table1... In PAGE 37: ...ime, but we believe such a simple exploit is not revealing. Several laboratory attacks, e.g. [11, 12] provide convincing evidence that academically identified buffer overflows in voting systems can be Conditions to Exploit a PEB Virus Must be a malicious, sophisticated intruder They must acquire: - one or more voting terminal(s) - one or more PEB(s) The virus must: - be effectively injected - propagate - execute its designed attack - delete any trace Accomplish all of this undetected Table1... ..."

Table 3: Some possible updates on the item I6 after the visit to I4

in unknown title
by unknown authors
"... In PAGE 3: ... The update of the user knowledge about an item can be: incremental or fixed (the degree of user knowledge is set to a fixed degree of knowledge), absolute (it uses an absolute labelSEM) or relative (it uses the degree of user knowledge about the visited item), each-time or first-time (it is run only the first time the item in the head is visited). Table 2 shows the available update predicates and Table3 includes examples of updates to the item I6 after I4 is visited. To help the author, the system generates by default a set of Ru for each CSL.... ..."

Table 6: Items for Measurement of Implementation Predictor Constructs

in information technology strategy as implementation predictors in Norwegian organisations
by Petter Gottschalk
"... In PAGE 12: ...91 Management support for the implementation New Management expectations of the implementation Management participation in the implementation Management monitoring of the implementation Management knowledge about the implementation Management time needed for the implementation Management enthusiasm for the implementation .93 Table6 : Items for Measurement of Implementation Predictor Constructs Construct Measurement of Construct... In PAGE 13: ...631** .529** Table6 : Items for Measurement of Implementation Predictor Constructs Construct Measurement of Construct... ..."

Table 1: Language and Grammar Item Subject Strongly

in ISSN 1823:1144 The Instructional Design Evaluation of a Courseware of a Malaysian Virtual University
by Adelina Asmawi, Rafiza Abdul Razak, Universiti Malaya 2006
"... In PAGE 3: ... That meant their experience in using the computer was concentrated more on surfing the net or playing computer games. Language and Grammar Table1 shows that there was no apparent difficulty in understanding the language or grammar used in the courseware even though most students were not sure about items 4 and 6 which were related to the consistency and correctness of spellings and punctuations. This could be because they lacked the knowledge on English spellings and punctuations.... ..."

TABLE 2. Categorized items from the first part of the model perception questionnaire.

in Computerized Molecular Modeling - The New Technology For Enhancing Model Perception Among Chemistry Educators And Learners
by Nitza Barnea, Yehudit J. DORI
Next 10 →
Results 11 - 20 of 11,455
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University