Results 1 - 10
of
6,854
Table 3.3: Factors Influencing the Costs and Returns to Private quot;Fee-for-Service/Product quot; Extension Delivery. FACTORS INFLUENCING THE COSTS AND RETURNS ITEM
Table 5 is a list of the types of software applications currently available for installation on hand held devices. An extensive list of software products accessible through all mediums by Handheld devices is provided in APPENDIX B: AVAILABLE SOFTWARE USED BY HANDELD DEVICES IN THE CONSTRUCTION INDUSTRY.
"... In PAGE 4: ... ________________ 22 Table 4 Operating System on current Handheld devices. __________________________ 23 Table5 Types of On-Device Software Available for Handheld Devices._______________ 24 Table 6 Wireless Technology Comparisons of Main Features ______________________ 32 Table 7: Currently available Speech Technology software for Handheld devices.... ..."
Table 4: Data structure for a medium.
"... In PAGE 10: ...ay be put on the reception of messages. Further, it is not difficult to incorporate noise into our model. However, such extensions, interesting though they may be, overshoot the objective of this paper: to simulate a turntaking protocol based on the work of Sacks et al. We arrive at the data-structure displayed in Table4 on the following page. It works as follows: what just has been said can be get ( heard ) from the set what-just-has-been-said .... ..."
Table 3.2:Types of Private Extension Providers, their Objectives and Target Markets. TYPE OF PRIVATE
Table 3: An annotated list of emulated Mach system calls. The relative level of di culty is indicated by (+) for di cult, (=) for medium, and (-) for easy. The location of the emulation refers to whether the call was emulated entirely in the Mach emulation extension (E) or whether some SPIN services, native or dynamically linked, were required (S). The degree of completion of the emulation indicates whether the call is fully supported. The values range from supported but completely spoofed (1) to fully supported (3).
1996
"... In PAGE 7: ...Ports Devices Threads Miscellaneous vm write mach reply port device read thread rendezvous host kernel version vm read mach task self device read inband thread switch processor set default vm inherit mach thread self device read request thread create host processor set priv vm region mach host self device read overwrite thread set state host info vm statistics mach port move member device read overwrite request thread resume set softclock vm map task set special port device write poke softclock vm allocate mach port allocate device write request get mach time vm deallocate mach port deallocate device write inband vm protect mach port insert right device write request inband task create mach port allocate name device set status task info task get special port device get status task terminate task get master port device open device close Table 1: A list of emulated Mach system calls. Table3 in Appendix A provides an annotated list with data on the implementation of each call. 4.... ..."
Cited by 1
Table 1: Recurrence rates from cervical carcinoma Tumour Extension
1995
"... In PAGE 6: ...reatment. Each of the n = 313 patients underwent radical abdominal hysterectomy. This study aimed to identify factors known at the time of primary treatment that contribute to the risk of recurrent cancer. The ratios yi=ni, where the yi-s denote the numbers of patients with recurrence out of totals ni, are outlined in Table1 . The factors used to model tumour prognosis are the tumour extension E (0-cervix only, 1-border zone involved, 2-parametria involved), the mitotic activity M (0-low, 1-medium, 2-high) and the number of lymph node stations involved L (0-none, 1-one, 2-two, 3-more than two involved).... ..."
Cited by 2
Table 1 Privatization routes for medium-size and large enterprises
"... In PAGE 15: ... Having evolved from central planning apos;s need to economize on transaction costs, many are monopolies. Table1 summarizes the various methods used by the more advanced reformers to privatize medium and large industrial firms and estimates the extent of privatization in each country under each method.6 What lessons have emerged from attempts to privatize this important yet problematic sector? A.... In PAGE 19: ... The other countries, which lacked a benefactor of West Germany apos;s economic strength, could only move slowly-or adopt radically different divestiture techniques. In 6 years (1990 through 1995) Hungary was able to transfer only about 40 percent of its state-owned assets to private hands through formal sales programs ( Table1 , and Pistor and Turkewitz, 1996). With extensive assistance from former Treuhandanstalt officials, Estonia sold most of its enterprises in three years (1992-95).... ..."
Table of Multimedia Extensions Extension Type Description
Results 1 - 10
of
6,854