• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 15,219
Next 10 →

Table 1. Summary of Service Frameworks Service framework Examples of services Fedora Services Framework [11] - Open URL Access Point

in Developing a Student-Friendly Repository for Teaching Principles of Repository Management
by Palakorn Achananuparp, Robert B. Allen
"... In PAGE 3: ...ollections. An important question is the kinds of services we should include in the system. As there are numerous of repository services being implemented in various frameworks, there is the need to consolidate them into logical categories. Table1 shows the example services Figure 1. The main collection management page ... ..."

Table 2. Organisation of Data Stack = {Frame}. accessible via OpenStack

in Reflection in Oberon
by Christoph Steindl 1997
"... In PAGE 4: ...rogram data is organised hierarchically, e.g., the stack is a sequence of stack frames, which are sequences of variables, which may be sequences of record elds and so on. Table2... ..."
Cited by 3

Table A3-1 Fixed-income trading systems (continued)

in Contents
by Stijn Claessens, Thomas Glaessner, Daniela Klingebiel

Table 4 Accessing Web Page with Multiple Web Browser Windows Opened Concurrently

in Disassembling Web Site Response Time
by Thiam Kian Chiew, Karen Renaud
"... In PAGE 14: ... To study the effect of the number of Web browser windows opened concurrently, we accessed the JSP and HTML home pages with both five and ten Web browser windows opened. Table4 shows the results for accessing JSP and HTML home pages with five and ten browser windows opened concurrently. Table 4 Accessing Web Page with Multiple Web Browser Windows Opened Concurrently ... ..."

Table 3. File access patterns. The Accesses column indicates the percentages of all accesses that were read-only, write-only, or read/write. An access consists of opening a file, reading and/or writing it, and then closing the file. These access types reflect actual file usage, not the mode in which the file was opened. An access is considered read/write only if the file was both read and written during the access. The Bytes column shows the percentage of bytes transferred in each type of access. The last two columns divide each kind of access into three groups based on degree of sequentiality: Whole-file refers to accesses where the entire file was transferred sequentially from start to finish; Other Sequential refers to accesses that were not whole-file but where a single sequential run of data was transferred between open and close; and Random includes all other accesses. The numbers in parentheses are the minimum and maximum values measured for the individual traces. For example, the upper-right entry indi- cates that, of all bytes transferred in read-only accesses, 89% were transferred in whole-file reads; the minimum value measured for a trace was 46%, while the maximum was 96%.

in Measurements of a Distributed File System
by Mary Baker John, John H. Hartman, Michael D. Kupfer, Ken W. Shirriff, John K. Ousterhout 1991
Cited by 394

Table 3. File access patterns. The Accesses column indicates the percentages of all accesses that were read-only, write-only, or read/write. An access consists of opening a file, reading and/or writing it, and then closing the file. These access types reflect actual file usage, not the mode in which the file was opened. An access is considered read/write only if the file was both read and written during the access. The Bytes column shows the percentage of bytes transferred in each type of access. The last two columns divide each kind of access into three groups based on degree of sequentiality: Whole-file refers to accesses where the entire file was transferred sequentially from start to finish; Other Sequential refers to accesses that were not whole-file but where a single sequential run of data was transferred between open and close; and Random includes all other accesses. The numbers in parentheses are the minimum and maximum values measured for the individual traces. For example, the upper-right entry indi- cates that, of all bytes transferred in read-only accesses, 89% were transferred in whole-file reads; the minimum value measured for a trace was 46%, while the maximum was 96%.

in Measurements of a Distributed File System
by Mary Baker John, John H. Hartman, Michael D. Kupfer, Ken W. Shirriff, John K. Ousterhout 1991
Cited by 394

Table 3. File access patterns. The Accesses column indicates the percentages of all accesses that were read-only, write-only, or read/write. An access consists of opening a file, reading and/or writing it, and then closing the file. These access types reflect actual file usage, not the mode in which the file was opened. An access is considered read/write only if the file was both read and written during the access. The Bytes column shows the percentage of bytes transferred in each type of access. The last two columns divide each kind of access into three groups based on degree of sequentiality: Whole-file refers to accesses where the entire file was transferred sequentially from start to finish; Other Sequential refers to accesses that were not whole-file but where a single sequential run of data was transferred between open and close; and Random includes all other accesses. The numbers in parentheses are the minimum and maximum values measured for the individual traces. For example, the upper-right entry indi- cates that, of all bytes transferred in read-only accesses, 89% were transferred in whole-file reads; the minimum value measured for a trace was 46%, while the maximum was 96%.

in Measurements of a Distributed File System
by Mary G. Baker, John H. Hartman, Michael D. Kupfer, Ken W. Shirriff, John K. Ousterhout 1991
Cited by 394

TABLE III THE FEATURES OF LAMP AND OTHER STATE-OF-THE-ART QUESTION ANSWERING SYSTEMS System Data Source Result Format Open Domain Web Accessible

in
by unknown authors

Table 3. File access patterns. The Accesses column indicates the percentages of all accesses that were read-only, write-only, or read/write. An access consists of opening a file, reading and/or writing it, and then closing the file. These access types reflect actual file usage, not the mode in which the file was opened. An access is considered read/write only if the file was both read and written during the access. The Bytes column shows the percentage of bytes transferred in each type of access. The last two columns divide each kind of access into three groups based on degree of sequentiality: Whole-file refers to accesses where the entire file was transferred sequentially from start to finish; Other Sequential refers to accesses that were not whole-file but where a single sequential run of data was transferred between open and close; and Random includes all other accesses. The numbers in parentheses are the minimum and maximum values measured for the individual traces. For example, the upper-right entry indi- cates that, of all bytes transferred in read-only accesses, 89% were transferred in whole-file reads; the minimum value measured for a trace was 46%, while the maximum was 96%.

in Abstract Measurements of a Distributed File System
by Mary G. Baker, John H. Hartman, Michael D. Kupfer, Ken W. Shirriff, John K. Ousterhout

Table 4: Openness of OSS communities

in Toward an Understanding of the Motivation of Open Source Software Developers
by Yunwen Ye, Kouichi Kishida 2003
"... In PAGE 9: ... Although all OSS communities are open to certain forms of participation and access, the different control structure inherent in each OSS community due to considerations of system quality [13] creates different degrees of openness that allows the legitimate participation and access of community members. Table4 shows the possible combinations of openness in two dimensions: product (row) and process (column). In the product dimension, open release means that only formally released versions are accessible to all community members; and open development means that all interim developing versions are accessible.... ..."
Cited by 17
Next 10 →
Results 11 - 20 of 15,219
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University