• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 274
Next 10 →

Table 2 Proposed detectors and their underlying assump- tions.

in Pattern Analysis and Applications manuscript No. 2333
by Bayesian Approach To, Rozenn Dahyot, Pierre Charbonnier, Fabrice Heitz
"... In PAGE 9: ... Table2 reviews the difierent proposed detectors. Their acronyms recall the underlying hypotheses about the noise model and the distribution of latent variables (i.... ..."

Table 1.2 Construction of all groundings of a rst-order formula under Assump- tions 1{3.

in 1 Markov Logic: A Unifying Framework for Statistical Relational Learning
by Pedro Domingos, Matthew Richardson

Table 5. Possible results as a function of the number of eyes, under no assump- tions (left) and under the assumption of enough shared liberties (right). Stars mark cases that depend on the assumption.

in Eyespace Values in Go
by Howard A. Landman 1996
"... In PAGE 26: ... In order to simplify the analysis in what follows, we will usually assume that the number of shared liberties is su ciently large that the outside liberty count can be ignored, so that whichever side makes the most eyes wins the battle or, if the eyes made are equal and less than two, both sides live in seki. Table5 shows the possible results of a semeai as a function of the number of Black and White eyes, in the fully general case and after the simplifying assumption has been made. After this simpli cation, the result depends only on the di erence between the... ..."
Cited by 9

Table 5. Possible results as a function of the number of eyes, under no assump- tions (left) and under the assumption of enough shared liberties (right). Stars mark cases that depend on the assumption.

in Eyespace Values in Go
by Howard A. Landman
"... In PAGE 26: ... In order to simplify the analysis in what follows, we will usually assume that the number of shared liberties is sufficiently large that the outside liberty count can be ignored, so that whichever side makes the most eyes wins the battle or, if the eyes made are equal and less than two, both sides live in seki. Table5 shows the possible results of a semeai as a function of the number of Black and White eyes, in the fully general case and after the simplifying assumption has been made. After this simplification, the result depends only on the difference between the number of Black eyes and White eyes.... ..."

Table 6.10: Results of modular veri cation for properties concerning safety of the magnets (see Appendix A, page 83, for the full commitments and assump- tions)

in Modulare Verifikation von Zustandsgraphen
by Martin Weiß

Table 5. Possible results as a function of the number of eyes, under no assump- tions (left) and under the assumption of enough shared liberties (right). Stars mark cases that depend on the assumption.

in Eyespace Values in Go
by Howard A. Landman
"... In PAGE 26: ... In order to simplify the analysis in what follows, we will usually assume that the number of shared liberties is su ciently large that the outside liberty count can be ignored, so that whichever side makes the most eyes wins the battle or, if the eyes made are equal and less than two, both sides live in seki. Table5 shows the possible results of a semeai as a function of the number of Black and White eyes, in the fully general case and after the simplifying assumption has been made. After this simpli cation, the result depends only on the di erence between the number of Black eyes and White eyes.... ..."

Table 1.2: Static quark model predictions. The experimental results are also listed for comparison.The agreement in Table 1.2 is quite good considering the simplicity of the assump- tions used in formulating SQM. However it is clear that further corrections to SQM are

in A Precision Measurement of the Magnetic Moment of the Omega Minus Hyperon
by Of The Omega Minus Hyperon, Noah Benjamin Wallace, Noah Benjamin Wallace 1995

Table 2: The Single-Request Modi ed Order Promis- ing Procedure. Theorem 1 Under the resource non-sharing assump- tion, a modi ed Order Promising algorithm (MOPA) is linear on the number of states and actions. Proof: After an edge is traversed for the rst time, both of its end nodes have quot;examined quot; ags set to true. This memorization quot;trick quot; prevents repeated ex-

in Applying AI to Manufacturing: Linear Order Promising and Production Planning
by Yury Smirnov
"... In PAGE 4: ... These algorithms utilize the advantages of the newly intro- duced manufacturing modeling style and may be used as the back-end of an e-commerce system tailored to- wards re-con gurable products. A modi cation of a simple, recursive order promis- ing algorithm (OPA) is presented in Table2 , it pro- vides an earliest possible date that a considered order can be satis ed. The di erence between State and Ac- tion nodes is re ected in the date selection mechanism.... ..."

Table I. The tradeoff between disk space utilization and disk bandwidth utilization. The first column lists the fraction of information still alive when the log wraps on it. The second column lists the fraction of raw disk bandwidth that can be utilized to write new information (this assumes that half the bandwidth is used to read back the old contents of the log; of the remaining half, some is used to rewrite live information and the rest is used to write new in- formation). The third column contains disk space utilization, computed under the assump- tion of exponentially-distributed file lifetimes.

in Beating the I/O Bottleneck: A Case for Log-Structured File Systems
by John Ousterhout, Fred Douglis 1989
Cited by 133

Table I. The tradeoff between disk space utilization and disk bandwidth utilization. The first column lists the fraction of information still alive when the log wraps on it. The second column lists the fraction of raw disk bandwidth that can be utilized to write new information (this assumes that half the bandwidth is used to read back the old contents of the log; of the remaining half, some is used to rewrite live information and the rest is used to write new in- formation). The third column contains disk space utilization, computed under the assump- tion of exponentially-distributed file lifetimes.

in Beating the I/O Bottleneck: A Case for Log-Structured File Systems
by John Ousterhout Fred, Fred Douglis 1989
Cited by 133
Next 10 →
Results 1 - 10 of 274
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University