• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 34,386
Next 10 →

TABLE I Initial Operating Condition for Line Thermal Overload and Transformer Overload Independent Parameters Dependent Parameters

in Composite Security Boundary Visualization
by Guozhong Zhou, James D. Mccalley

Table 1. Passive properties and quantal content in control and overload conditions.*

in unknown title
by unknown authors 2004
"... In PAGE 4: ... The present study corroborates and extends these findings. In our experiment, the combination of compen- satory overload and voluntary wheel-cage activity re- duced MEPP amplitude by H1101125% ( Table1 ). Since MEPP amplitude is directly related to the size of ACh quanta and postsynaptic density of ACh receptors,17 and given that the amount of ACh contained within each vesicle is constant,16 the decline in MEPP am- plitude might seem to contradict a previously re- ported, exercise-induced increase in ACh receptor quantity at the motor endplate.... ..."
Cited by 2

Table 2: Loss probability versus delay for di erent overload conditions

in A Self-Tuning Regulator for Adaptive Overload Control in Communication Networks
by Jean-chrysostome Bolot 1992
"... In PAGE 4: ... We note that this is a direct consequence of the fact that the delay has been explicitly taken into account in the design of the adaptive controller. Table2 presents values of the loss probability for dif- ferent values of the load and di erent values of the delay. The loss probability for the adaptive controller is almost independent of the delay and the load.... ..."
Cited by 4

Table 3: Comparison of Real-Time Scheduling Paradigms in Overload Conditions

in 1 Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms
by Chenyang Lu, John A. Stankovic, Gang Taoc, Sang H. Son

Table 5 - Average and Median of the Latency Estimation Error under Overloaded Server

in Evaluating web user perceived latency using server side measurements
by Marik Marshak, Hanoch Levy 2003
"... In PAGE 10: ... Table 5 summarizes the median and average of the latency estimation errors for MTA. The behavior of the latency estimation error is similar for the tests run under normal server load and overload sever as Figure 6, Figure 8 and Table5 depict, except to the long tail for the overload case. The reason for that is that for an overloaded server there are periods of time in which the queue latency increases rapidly in short time.... ..."
Cited by 4

Table 2 Detection conditions for several fault classes.

in Comparison of Fault Classes in Specification-Based Testing
by Vadim Okun , et al.
"... In PAGE 11: ...The notation SF is used to represent the detection condition for an arbitrary fault belonging to fault class F . The detection conditions for fault classes CRF, CNF, ENF, CCF, and CDF are summarized in Table2 . There, x is a clause in S, y is another valid clause 3 , and X is an expression in S.... In PAGE 11: ... 4 Proof. By Table2 , we must establish that, for a predicate P and a clause x occurring in P , dP x y ! dP x x holds, where y 6 = x is another valid clause. Rewriting with (9), we have ((x apos; y) ^ dP dx ) ! ((x apos; x) ^ dP dx ) Since x apos; x = 1, and in view of (7), the Theorem holds.... In PAGE 12: ... Proof. By Table2 , we must establish that, for a predicate P , with a clause x occurring in a subpredicate E of P , dP xx ! dP E E holds. Rewriting with (9), we have ((x apos; x) ^ dP dx ) ! ((E apos; E) ^ dP dE ) Since the exclusive-or of a predicate with its negation is trivially true, this can be rewritten as dP dx ! dP dE Since clause x is a subpredicate of E, the theorem follows from Lemma 1.... In PAGE 13: ... Proof. By Table2 , we must establish that, for a predicate P and a clause x occurring in P , ((dP x x^y _ dP x x_y) $ dP x y) ^ (dP x x^y _ dP x x_y) where y 6 = x is another valid clause. By (9), the detection conditions for CRF, CCF, and CDF are dP x y = (x apos; y) ^ dP dx dP x x^y = (x apos; (x ^ y)) ^ dP dx = x y ^ dP dx by (2) dP x x_y = (x apos; (x _ y)) ^ dP dx = xy ^ dP dx by (4) The disjunction of the detection conditions for CCF and CDF is dP x x^y _ dP x x_y = (x y ^ dP dx _ xy ^ dP dx ) = (x apos; y) ^ dP dx (10) Additionally, x y ^ dP dx _ xy ^ dP dx = x _ y _ x _ y _ dP dx = 1 (11) In view of (10) and (11), the Theorem holds.... ..."

Table 2: Necessary conditions for events Step 3: Update the tables of semantic relations. With this constraint, we have intro- duced a new predicate symbol overloaded. Hence, we must add the lines enter ; overloaded leave ; : overloaded to Table 3. This in turn introduces two new events enter and leave, which causes us to add the lines door open ; enter

in Detecting Feature Interactions - A Heuristic Approach
by Maritta Heisel, Jeanine Souquières 1998
"... In PAGE 7: ... Un- derlined parts show changements of constraints because of detected interactions. Table2 shows the necessary conditions for the events. The events establishing the predicates and their nega- tions are given in Table 3.... In PAGE 9: ...stop ; : call move ; passes by stop ; : passes by press ; call from up stop ; : call from up press ; call from down stop ; : call from down stop ; halted move ; : halted stop ; at move ; : at end close ; door closed open ; : door closed press door button ; open requested release door button ; : open requested open ; door open begin close ; : door open Table 3: Events establishing predicate literals call) = : call) = f: call from up; : call from downg passes by) = f: at; : halted; door closed; : door openg : passes by) = call from up) = fcallg : call from up) = call from down) = fcallg : call from down) = halted) = fat; : passes byg : halted) = fpasses by; : at; door closed; : door openg at) = fhalted; : passes byg : at) = door closed) = f: door openg : door closed) = fhalted; at; : passes byg open requested) = : open requested) = door open) = f: door closed; : passes by; halted; atg : door open) = Table 4: Relations between predicate literals to Table2 . Table 4 must be changed in the following way: We add the lines overloaded) = fdoor open; : door closed; halted; at; : passes byg : overloaded) = According to the equivalences p 2 q) , q 2 )p , : q 2 : p) the entries of all predicates related to overloaded must be updated.... ..."
Cited by 3

TABLE IV UTILITY IN OVERLOAD.

in www.ee.kth.se Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters
by Björn Johansson, Constantin Adam, Mikael Johansson, Rolf Stadler, Björn Johansson, Constantin Adam, Mikael Johansson, Rolf Stadler 2006

Table 1. Execution time on a local sub-grid for the self-localization service. Devoted resources and overloaded laptop are not real situations

in A Grid Architecture for Comfortable Robot Control
by Stéphane Vialle, Amelia De Vivo, Fabrice Sabatier
"... In PAGE 8: ... It can also run redundant computations on different servers and get the first available result. Table1 shows experimental performance on a local sub-grid for the self- localization module. We run redundant computations for critical tasks on several servers and wait for the first to finish.... ..."

Table 9 shows the LU performance on several platforms. The LIB column is overloaded to convey both the DGEMM used (A for ATLAS, S for system), and the blocking factor chosen (for instance, A(40) in this column indicates a run using ATLAS apos;s DGEMM, using a blocking factor of 40).

in Automatically Tuned Linear Algebra Software
by R. Clint Whaley, Jack J. Dongarra 1998
"... In PAGE 23: ... Table9 : Double precision LU timings on various platforms The reader may notice that the LU times are not in general as good as the GEMM timings. The rst reason is that we have made sure to include the platforms where either the vendor was faster, or our win was marginal, so we can see any adverse e ects in detail.... ..."
Cited by 247
Next 10 →
Results 1 - 10 of 34,386
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University