### Table 2. Negative theory N: pattern description.

2002

"... In PAGE 6: ... Since polymers with an NMA value above the range 70 - 80 can be viewed as having a very good cellular response and those with an NMA values below the range 50 - 60 can be viewed as having a poor cellular response, we experimented with several models corresponding to several threshold values t and t apos; in these ranges. The positive theory P for t = 77 (Table 1) and the negative theory N for t apos; = 55 ( Table2 ) provided t he best combinatorial separation of the strong class from the weak one and therefore, the chosen model was based on these thresholds. The polymers with intermediary NMA values (above 55 and below 77) may display properties specific for both weak and strong classes, and consequently, they are considered as a quot;buffer quot; of medium value.... ..."

### Table 1: Partial Composite Pattern and Iterator Pattern Theories

1999

"... In PAGE 5: ... Table1 contains #28partial#29 theories associated with the two patterns. #12 C denotes the theory of the Composite pattern and #12 I denotes the theory of the Iterator pattern.... ..."

Cited by 1

### Table 1. Partial Composite Pattern and Iterator Pattern Theories

"... In PAGE 4: ...Remove: class ! bool GetChild: class int ! bool Operation: class ! bool Variable: class object ! bool Inherit: class class ! bool The signature for the Iterator pattern is: CreateIterator: ! bool New: class ! bool First: ! bool Next: ! bool IsDone: ! bool CurrentItem: ! bool Variable: class object ! bool Inherit: class class ! bool Table1 contains (partial) theories associated with the two patterns. C denotes the theory of the Composite pat- tern and I denotes the theory of the Iterator pattern.... ..."

### Table 1. Correlation between pattern mining and grounded theory strategies

"... In PAGE 4: ... Grounded theory prescribes iterative approach to data analysis and collection. Existing approaches employed for pattern mining overlap with the ones prescribed by grounded theory (see Table1 ). The above arguments clearly show that grounded theory seems particularly suitable for formally supporting pattern mining processes.... ..."

### Table 1 Syntax for terms and patterns.

"... In PAGE 2: ...1 Syntax The basic building blocks used for modelling cryptography are terms and patterns. The syntax for these are listed in Table1 where N and V denote the disjoint sets... ..."

### Table 5 Positive theory consisting of 42 high-risk patterns. Prevalence Pattern parameters Pattern description

### Table 2. Analogy between set theory and category theory

2001

"... In PAGE 17: ...Table2 . In addition to the terms already discussed there is a concept of `natural isomorphism apos; between functors.... ..."

Cited by 3

### Table 2: Term pairs with minimum probe distance in the Theory data set

2000

Cited by 26

### Table 2: Term pairs with minimum probe distance in the Theory data set

2002

Cited by 6