• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 32,132
Next 10 →

Table 4 contains a possible structuring according to step 1 incorporating ideas from the structu- res discussed before. 1

in unknown title
by unknown authors

Table 2 Number of steps required to solve all possible permutations for a tree with n = 4 and m = 2. n11 n10 n01 n00 C Steps S Steps Z Steps

in Collision Avoidance and Resolution Multiple Access (CARMA)
by Rodrigo Garces, J.J. Garcia-Luna-Aceves 2000
"... In PAGE 9: ... For both of this cases the number of success steps is S = 0. Table2 shows the number of success steps for a system with n = 4 and m = 2. As Table 2 shows, the number of success steps is always 2.... In PAGE 9: ... Table 2 shows the number of success steps for a system with n = 4 and m = 2. As Table2 shows, the number of success steps is always 2. The total average number of success steps for any tree of size n with m RTS stations is simply Rule 5 from Table 1, i.... In PAGE 10: ...1) In addition to our example, there are ve other possible ways to distribute two stations with an RTS to send in four positions. Table2 shows all six cases and the number of collision steps Ci associated with each of them. To calculate C(4; 2), we sum each individual permutation and divide this result by six.... In PAGE 11: ...11 RTS to send (m = 2), we can plot a cost table with all the six permutation cases, as shown in Table2 . The number of idle steps at the root node can be expressed as the number of idle steps for the right subtree, plus the number of idle steps for the left subtree.... ..."
Cited by 33

Table 1: Steps in the design of veterinary or food safety surveillance programmes, the possible application of risk assessment steps to obtain risk-based surveillance programmes and the epidemiological contributions providing the basis for risk assessments

in unknown title
by unknown authors 2005
"... In PAGE 4: ... This relatively broad definition allows for the application of risk assessment approaches at all steps of the design of surveillance systems for early detection and management of diseases or hazards of interest. Table1 illustrates the different steps during design where surveillance can be based on risk assessment principles. These options for risk-based design will be illustrated in the later sections of this article.... In PAGE 5: ... The identification and selection of hazards are key steps in the design of surveillance systems, and they will be guided by the objectives of the surveillance. In risk assessment, the equivalent steps are hazard identification and hazard characterisation ( Table1 ). Consequences of hazard expo- sure should also be included in the characterisation of a hazard.... ..."

TABLE I POSSIBLE ONE-STEP STATE TRANSITION FROM STATE X1 =(q1,i1) TO STATE X2 =(q2,i2)

in Performance analysis of delayed acknowledgment scheme in UWB-based high-rate WPAN
by Hongyuan Chen, Zihua Guo, Richard Yuqi Yao, Xuemin (Sherman) Shen, Yanda Li 2006
Cited by 2

Table 8.1 shows the different possibilities for combining steps and vendors, using LiDO 1.2 and KODO 2.2.4, and their results.

in de graad van
by Universitaire Instelling Antwerpen, Departement Wiskunde-informatica, Kris Van Echelpoel, Promotor Prof, Dr. Serge Demeyer, Stagebegeleider Bernard, De Ruyck 2001

Table 1. Design space; i::j::k denotes a set of possible values from i to k in steps of j.

in OPTIMIZATION COUNTERS GROWING SIMULATION COSTS STEMMING FROM THE EXPONENTIALLY INCREASING SIZE OF DESIGN SPACES. THE AUTHORS DEMONSTRATE HOW TO OBTAIN A MORE COMPREHENSIVE UNDERSTANDING OF THE DESIGN SPACE BY SELECTIVELY SIMULATING A MODEST NUMBER OF DESI
by Benjamin C. Lee, David M. Brooks, Microarchitectural Design Space
"... In PAGE 2: ... Design space The first element of the simulation paradigm is the definition of the design space. This tutorial demonstrates spatial sampling and regression modeling for the design space described in Table1 . Param- eters within a set are varied together to avoid fundamental design imbalances.... ..."

Table 1: Design space; i::j::k denotes a set of possible values from i to k in steps of j.

in A Tutorial in Spatial Sampling and Regression Strategies for Microarchitectural Analysis
by Benjamin C. Lee, David M. Brooks
"... In PAGE 10: ...from Table1 , and application characteristics (e.... ..."

Table 4. Our new Naive Bayes procedure. Assignments are over all possible index values. Steps 1 through 3 distinguish TWCNB from WCNB.

in Tackling the Poor Assumptions of Naive Bayes Text Classifiers
by Jason D. M. Rennie, Lawrence Shih, Jaime Teevan, David R. Karger 2003
"... In PAGE 8: ...forms from the information retrieval community, Steps 1-3 in Table4 , improves the performance of Naive Bayes text classification. For example, the transform described in Step 1 converts text, which can be closely modeled by a power law, to look more multinomial.... ..."
Cited by 42

Table 4. Our new Naive Bayes procedure. Assignments are over all possible index values. Steps 1 through 3 distinguish TWCNB from WCNB.

in Tackling the Poor Assumptions of Naive Bayes Text Classifiers
by Jason D. M. Rennie, Lawrence Shih, Jaime Teevan, David R. Karger 2003
"... In PAGE 8: ...forms from the information retrieval community, Steps 1-3 in Table4 , improves the performance of Naive Bayes text classi cation. For example, the transform described in Step 1 converts text, which can be closely modeled by a power law, to look more multinomial.... ..."
Cited by 42

Table 5.1: A summary of possible approaches to implement the general-case cluster solution Steps Approach Pros. Cons.

in APPROVAL SHEET
by Xiuduan Fang, Malathi Veeraraghavan (advisor, Marty Humphrey (chair, Alfred Weaver 2006
Next 10 →
Results 11 - 20 of 32,132
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University