### TABLE I Initial Operating Condition for Line Thermal Overload and Transformer Overload Independent Parameters Dependent Parameters

### Table 1. Passive properties and quantal content in control and overload conditions.*

2004

"... In PAGE 4: ... The present study corroborates and extends these findings. In our experiment, the combination of compen- satory overload and voluntary wheel-cage activity re- duced MEPP amplitude by H1101125% ( Table1 ). Since MEPP amplitude is directly related to the size of ACh quanta and postsynaptic density of ACh receptors,17 and given that the amount of ACh contained within each vesicle is constant,16 the decline in MEPP am- plitude might seem to contradict a previously re- ported, exercise-induced increase in ACh receptor quantity at the motor endplate.... ..."

Cited by 2

### Table 2: Loss probability versus delay for di erent overload conditions

1992

"... In PAGE 4: ... We note that this is a direct consequence of the fact that the delay has been explicitly taken into account in the design of the adaptive controller. Table2 presents values of the loss probability for dif- ferent values of the load and di erent values of the delay. The loss probability for the adaptive controller is almost independent of the delay and the load.... ..."

Cited by 4

### Table 3: Comparison of Real-Time Scheduling Paradigms in Overload Conditions

### Table 5 - Average and Median of the Latency Estimation Error under Overloaded Server

2003

"... In PAGE 10: ... Table 5 summarizes the median and average of the latency estimation errors for MTA. The behavior of the latency estimation error is similar for the tests run under normal server load and overload sever as Figure 6, Figure 8 and Table5 depict, except to the long tail for the overload case. The reason for that is that for an overloaded server there are periods of time in which the queue latency increases rapidly in short time.... ..."

Cited by 4

### Table 2 Detection conditions for several fault classes.

"... In PAGE 11: ...The notation SF is used to represent the detection condition for an arbitrary fault belonging to fault class F . The detection conditions for fault classes CRF, CNF, ENF, CCF, and CDF are summarized in Table2 . There, x is a clause in S, y is another valid clause 3 , and X is an expression in S.... In PAGE 11: ... 4 Proof. By Table2 , we must establish that, for a predicate P and a clause x occurring in P , dP x y ! dP x x holds, where y 6 = x is another valid clause. Rewriting with (9), we have ((x apos; y) ^ dP dx ) ! ((x apos; x) ^ dP dx ) Since x apos; x = 1, and in view of (7), the Theorem holds.... In PAGE 12: ... Proof. By Table2 , we must establish that, for a predicate P , with a clause x occurring in a subpredicate E of P , dP xx ! dP E E holds. Rewriting with (9), we have ((x apos; x) ^ dP dx ) ! ((E apos; E) ^ dP dE ) Since the exclusive-or of a predicate with its negation is trivially true, this can be rewritten as dP dx ! dP dE Since clause x is a subpredicate of E, the theorem follows from Lemma 1.... In PAGE 13: ... Proof. By Table2 , we must establish that, for a predicate P and a clause x occurring in P , ((dP x x^y _ dP x x_y) $ dP x y) ^ (dP x x^y _ dP x x_y) where y 6 = x is another valid clause. By (9), the detection conditions for CRF, CCF, and CDF are dP x y = (x apos; y) ^ dP dx dP x x^y = (x apos; (x ^ y)) ^ dP dx = x y ^ dP dx by (2) dP x x_y = (x apos; (x _ y)) ^ dP dx = xy ^ dP dx by (4) The disjunction of the detection conditions for CCF and CDF is dP x x^y _ dP x x_y = (x y ^ dP dx _ xy ^ dP dx ) = (x apos; y) ^ dP dx (10) Additionally, x y ^ dP dx _ xy ^ dP dx = x _ y _ x _ y _ dP dx = 1 (11) In view of (10) and (11), the Theorem holds.... ..."

### Table 2: Necessary conditions for events Step 3: Update the tables of semantic relations. With this constraint, we have intro- duced a new predicate symbol overloaded. Hence, we must add the lines enter ; overloaded leave ; : overloaded to Table 3. This in turn introduces two new events enter and leave, which causes us to add the lines door open ; enter

1998

"... In PAGE 7: ... Un- derlined parts show changements of constraints because of detected interactions. Table2 shows the necessary conditions for the events. The events establishing the predicates and their nega- tions are given in Table 3.... In PAGE 9: ...stop ; : call move ; passes by stop ; : passes by press ; call from up stop ; : call from up press ; call from down stop ; : call from down stop ; halted move ; : halted stop ; at move ; : at end close ; door closed open ; : door closed press door button ; open requested release door button ; : open requested open ; door open begin close ; : door open Table 3: Events establishing predicate literals call) = : call) = f: call from up; : call from downg passes by) = f: at; : halted; door closed; : door openg : passes by) = call from up) = fcallg : call from up) = call from down) = fcallg : call from down) = halted) = fat; : passes byg : halted) = fpasses by; : at; door closed; : door openg at) = fhalted; : passes byg : at) = door closed) = f: door openg : door closed) = fhalted; at; : passes byg open requested) = : open requested) = door open) = f: door closed; : passes by; halted; atg : door open) = Table 4: Relations between predicate literals to Table2 . Table 4 must be changed in the following way: We add the lines overloaded) = fdoor open; : door closed; halted; at; : passes byg : overloaded) = According to the equivalences p 2 q) , q 2 )p , : q 2 : p) the entries of all predicates related to overloaded must be updated.... ..."

Cited by 3

### TABLE IV UTILITY IN OVERLOAD.

2006

### Table 1. Execution time on a local sub-grid for the self-localization service. Devoted resources and overloaded laptop are not real situations

"... In PAGE 8: ... It can also run redundant computations on different servers and get the first available result. Table1 shows experimental performance on a local sub-grid for the self- localization module. We run redundant computations for critical tasks on several servers and wait for the first to finish.... ..."

### Table 9 shows the LU performance on several platforms. The LIB column is overloaded to convey both the DGEMM used (A for ATLAS, S for system), and the blocking factor chosen (for instance, A(40) in this column indicates a run using ATLAS apos;s DGEMM, using a blocking factor of 40).

1998

"... In PAGE 23: ... Table9 : Double precision LU timings on various platforms The reader may notice that the LU times are not in general as good as the GEMM timings. The rst reason is that we have made sure to include the platforms where either the vendor was faster, or our win was marginal, so we can see any adverse e ects in detail.... ..."

Cited by 247