• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 9,399
Next 10 →

Table 5: Input assumptions in the residential sector. Service 1990* 2000 2010 Cooling 100 188 343 Heating

in Two-Level Mathematical Programming for Analyzing Subsidy Options to Reduce Greenhouse-Gas Emissions
by Go Hibino, Mikiko Kainuma, Yuzuru Matsuoka, Tsuneyuki Morita

Table 2: Top Services (Service Provider Sink)

in On the Design and Use of Internet Sinks for Network Abuse Monitoring
by Vinod Yegneswaran, Paul Barford, Dave Plonka 2004
"... In PAGE 10: ...2. Table2 provides a... ..."
Cited by 54

Table 1. Services in the PBX example. Service Description

in Towards Integration of Use Case Modelling and Usage-Based Testing
by Björn Regnell, Per Runeson, Claes Wohlin, Usage-based Testing
"... In PAGE 11: ... A service is a package of functional entities (features) offered to the users in order to satisfy one or more goals that the users have. Table1 , includes the services of our PBX example system. Users can be of different types, called actors.... In PAGE 26: ...erformed when needed. Below the steps are presented. Identify services. The services can be used directly as defined in the use case model, see Table1 . In our example the resulting service list is: NCC (Normal Call with Charging), CFU (Call Forward Unconditional) and RMR (Read Markings and Reset).... ..."

Table 8: Performance of Services

in Multi-Service Search and Comparison Using the MetaCrawler
by Erik Selberg , Oren Etzioni 1995
"... In PAGE 12: ....2.3 Performance Finally, we measure each service apos;s response time. Table8 summarizes our ndings. It is not surprising, although disappointing, to nd that average times vary from just under 10 seconds to just under 20.... ..."
Cited by 176

Table 5: Predictors of service utilisation Service

in INTELLECTUAL DISABILITY, CHALLENGING BEHAVIOUR AND COST IN CARE ACCOMMODATION: WHAT ARE THE LINKS?
by Adelina Comas-herrera Msc, Astin Msc, Jennifer Beecham Phd, Claude Pendaries, Adelina Comas-herrera, Msc Jack, Astin Msc, Jennifer Beecham Phd, Claude Pendaries Phd
"... In PAGE 11: ... For each of the services used by a substantial number of sample members we employed logistic regression methods to test for associations between service use, degree of intellectual disability and challenging behaviour, controlling for age, the (average) number of residents in the accommodation facility and whether the provider was an NHS Trust or an independent sector provider. Table5 shows, for each service, whether these factors increased or decreased the probability of using it. [TABLE 5 ABOUT HERE] ... ..."

Table 1: OGC service taxonomy Service Categories

in unknown title
by unknown authors 2003
"... In PAGE 7: ...Web browser user Interface workflow definition tool services catalogue workflow rule engine administration amp; control tool GSP Node system metadata: geo-processing amp; data definitions applications WFMS Clients Broker GSP nodes searchengine SERVICE BROKER Figure 2: The GSI system concept will serves as the mechanism supporting the searching for products by users, the selection of partners and the creation and control of the workflow [1, 12, 10]. Following the OCG service taxonomy categories ( Table1 ) [15], the broker will support the workflow with additional capabilities for control and management that can be placed into the System Management OGC categories [16]. The main components of the GSI architecture are the user (client), the broker and the GSI Table 1: OGC service taxonomy Service Categories... ..."
Cited by 1

Table 1: Example: Network Services Service

in An IP QoS architecture for 4G networks
by Janusz Gozdecki, Piotr Pacyna, Victor Marques, Rui L. Aguiar, Carlos Garcia, Jose Ignacio Moreno, Christophe Beaujean, Eric Melin, Marco Liebsch
"... In PAGE 6: ...Services will be ofered a the network operator independently on the user applications, but will be flexible enough to support user applications Each offered network service will be implemented with one of the three basic DiffServ per-hop behaviours (EF, AF, or BE), with associated bandwidth characteristics. Table1 lists the network services used in the tests. The network services include support for voice communications (e.... In PAGE 7: ... The operator may have a portfolio of packages composed by different criteria and targeting different groups of customers. An quot;Inexpensive service quot; can be supported at the network layer through S1, and S4 services ( Table1 ); and quot;Exclusive Pack quot;, can be composed of S1, S2, S3, and S6. The technical translation of this quot;service pack quot; into network level services is the quot;network view of the user profile quot;.... In PAGE 10: ... The main role of rate limitation was to prevent lower priority classes from being affected by higher priority classes, and is applied to all PHBs in each node. Here, we draw attention to the fact that it is very important to protect a class carrying network maintenance traffic (SIG traffic, Table1 ), because this traffic plays an important role in maintaining the network infrastructure, but does not have the highest priority. When the traffic does not exceed the configured rate, the performance of PRI and PRIs is the same since the TSW does not affect traffic characteristics.... ..."

TABLE IV SERVICE COVERAGE AND SERVICE COST COMPARISON

in Efficient and Guaranteed Service Coverage in Partitionable Mobile Ad-Hoc
by Karen H. Wang, Baochun Li 2002
Cited by 29

Table 2: Classification of Services. Service Description

in The Evolution of Storage Service Providers: Techniques and Challenges to Outsourcing Storage
by Ragib Hasan, William Yurcik, Suvda Myagmar 2005
Cited by 5

Table 1: Registration Services Registration service Entity

in Configuration Maintenance for Distributed Applications Management
by Hanan Lutfiyya, Andrew D. Marshall, Michael A. Bauer, Patrick Martin, Wendy Powley 1997
Cited by 3
Next 10 →
Results 11 - 20 of 9,399
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University