### Table 4 contains a possible structuring according to step 1 incorporating ideas from the structu- res discussed before. 1

### Table 2 Number of steps required to solve all possible permutations for a tree with n = 4 and m = 2. n11 n10 n01 n00 C Steps S Steps Z Steps

2000

"... In PAGE 9: ... For both of this cases the number of success steps is S = 0. Table2 shows the number of success steps for a system with n = 4 and m = 2. As Table 2 shows, the number of success steps is always 2.... In PAGE 9: ... Table 2 shows the number of success steps for a system with n = 4 and m = 2. As Table2 shows, the number of success steps is always 2. The total average number of success steps for any tree of size n with m RTS stations is simply Rule 5 from Table 1, i.... In PAGE 10: ...1) In addition to our example, there are ve other possible ways to distribute two stations with an RTS to send in four positions. Table2 shows all six cases and the number of collision steps Ci associated with each of them. To calculate C(4; 2), we sum each individual permutation and divide this result by six.... In PAGE 11: ...11 RTS to send (m = 2), we can plot a cost table with all the six permutation cases, as shown in Table2 . The number of idle steps at the root node can be expressed as the number of idle steps for the right subtree, plus the number of idle steps for the left subtree.... ..."

Cited by 33

### Table 1: Steps in the design of veterinary or food safety surveillance programmes, the possible application of risk assessment steps to obtain risk-based surveillance programmes and the epidemiological contributions providing the basis for risk assessments

2005

"... In PAGE 4: ... This relatively broad definition allows for the application of risk assessment approaches at all steps of the design of surveillance systems for early detection and management of diseases or hazards of interest. Table1 illustrates the different steps during design where surveillance can be based on risk assessment principles. These options for risk-based design will be illustrated in the later sections of this article.... In PAGE 5: ... The identification and selection of hazards are key steps in the design of surveillance systems, and they will be guided by the objectives of the surveillance. In risk assessment, the equivalent steps are hazard identification and hazard characterisation ( Table1 ). Consequences of hazard expo- sure should also be included in the characterisation of a hazard.... ..."

### TABLE I POSSIBLE ONE-STEP STATE TRANSITION FROM STATE X1 =(q1,i1) TO STATE X2 =(q2,i2)

2006

Cited by 2

### Table 8.1 shows the different possibilities for combining steps and vendors, using LiDO 1.2 and KODO 2.2.4, and their results.

in de graad van

2001

### Table 1. Design space; i::j::k denotes a set of possible values from i to k in steps of j.

"... In PAGE 2: ... Design space The first element of the simulation paradigm is the definition of the design space. This tutorial demonstrates spatial sampling and regression modeling for the design space described in Table1 . Param- eters within a set are varied together to avoid fundamental design imbalances.... ..."

### Table 1: Design space; i::j::k denotes a set of possible values from i to k in steps of j.

"... In PAGE 10: ...from Table1 , and application characteristics (e.... ..."

### Table 4. Our new Naive Bayes procedure. Assignments are over all possible index values. Steps 1 through 3 distinguish TWCNB from WCNB.

2003

"... In PAGE 8: ...forms from the information retrieval community, Steps 1-3 in Table4 , improves the performance of Naive Bayes text classification. For example, the transform described in Step 1 converts text, which can be closely modeled by a power law, to look more multinomial.... ..."

Cited by 42

### Table 4. Our new Naive Bayes procedure. Assignments are over all possible index values. Steps 1 through 3 distinguish TWCNB from WCNB.

2003

"... In PAGE 8: ...forms from the information retrieval community, Steps 1-3 in Table4 , improves the performance of Naive Bayes text classi cation. For example, the transform described in Step 1 converts text, which can be closely modeled by a power law, to look more multinomial.... ..."

Cited by 42

### Table 5.1: A summary of possible approaches to implement the general-case cluster solution Steps Approach Pros. Cons.

2006