Results 21 - 30
of
9,786
Table 4 Traditional geographic information literacy concepts and abilities: Top 10 from the online survey
"... In PAGE 10: ... The tables show modal values as well as mean values. Inspection of Table4 reveals that all top 10 traditional concepts and abilities were ranked as essential. Inspection of Table 5 shows that only one concept was rated as essential in the top 10 list of digital geographic information concepts and abilities, namely Searching the Internet for geographic information.... ..."
Table 1: CTL: concept forming operators symbols, for instance, that two concept symbols denote disjoint sets or that they cover the interpretation of another concept (see Table 4). Additionally to the operators listed in the four tables, most systems also o er some \escape quot; mechanism to the host system in the form of test functions and host data-types. We have omitted these from the description of the languages because this escape mechanism does not belong to the core of the terminological languages.In the rst column of the tables, we specify the abstract syntax, which we use in the paper. In the second column we specify the concrete syntax that is similar to the actual syntax used in systems such as classic, kris, and loom. In the third column, the formal meaning of the operators is speci ed using a set-theoretic semantics. This kind of semantics is based on interpretations I = hD; [[ ]]Ii, where
1994
"... In PAGE 9: ...otation for roles, i.e. [[R]]I(d) = fej(d; e) 2 [[R]]Ig. For example, given the concept symbol Workstation, intended to denote all workstations, and the role symbol disk-drive, intended to denote the disk drives on a given workstation, according to Table1 the expression (Workstation u 0 disk- drive) denotes all disk-less workstations. If we want to restrict the interpretation of the symbol Diskless-Workstation to the interpretation of (Workstation u 0 disk-drive), the terminological axiom Diskless-Workstation : = (Workstation u 0 disk-drive) can be used.... In PAGE 16: ...15 Result of System Test : : : back classic kris loom meson sb-one 1 (a) PErr CErr CErr CErr CErr PErr (b) PErr CErr CErr CErr CErr CErr (c) PErr CErr CErr CErr CErr CErr (d) | CErr CErr CErr CErr CErr 2 (a) Corr Corr Corr Corr CErr CErr (b) Corr Corr Corr Corr CErr CErr 3 (a) Corr Corr Corr Corr CErr Corr (b) Corr Corr Corr Corr CErr Corr 4 (a) Corr CErr Incorr Corr CErr | (b) Incorr CErr Incorr | | | 5 (a) Corr CWarn CWarn CWarn CErr CWarn (b) CErr | | | CErr Corr 6 (a) Corr CErr Corr Corr CErr CErr (b) Incorr CErr Corr Corr | CErr (c) Corr CErr Corr Corr Corr CErr 7 (a) CErr CErr CErr (Corr) (Corr) (Corr) (b) CErr CErr CErr (Corr) (Corr) (Corr) (c) CErr CErr CErr (Corr) CErr (Corr) (d) CErr CErr CErr (Corr) CErr (Corr) 8 (a) CErr CErr Incorr Corr | Corr PErr error message of underlying programming system CErr case is error in system interpretation and an error message is issued CWarn case is no error in system interpretation but a warning is issued Corr case is no error in system interpretation and handled correctly without warning (Corr) system accepts input but does not classify these concepts according to one of the possible semantics Incorr case is not handled correctly | not applicable Table1 0: Problematic cases: test results malicious attitude. As in Section 5.... In PAGE 20: ...19 Result of System Test : : : back classic kris loom meson sb-one 1 (a) Y Y Y Y Y Y (b) Y Y N Y Y Y (c) Y Y Y Y Y Y (d) N | | | N N 2 (a) Y Y Y Y Y Y (b) N | Y N Y Y 3 (a) N | Y N Y Y (b) N | | N Y N (c) N | | N | Y (d) N | | N | N (e) N | N/Y N | | 4 (a) | | | N N | (b) | | | N | | 5 (a) | | | Y N Y (b) | | N/Y Y | Y (c) | | N/Y N | N 6 (a) | N N/Y N | | (b) | Y N/Y N | | 7 (a) | | | N Y | Y inference drawn N inference not drawn N/Y result depends on the selected subsumption algorithm in kris Table1 1: TBox inferences: test results 5.4 Summary of Qualitative Results The above results show that the ongoing process of specifying a common lan- guage for terminological representation and reasoning systems [28, p.... In PAGE 24: ... measured on MacIvory. ytest has been aborted zsystem reported internal error Table1 2: Hard cases: runtime of subsumption tests performance for worst-case examples give us the right idea of how systems will behave in applications. In order to get a feeling of the runtime performance under realistic conditions, we asked other research groups for terminological knowledge bases they use in their projects.... In PAGE 25: ... The exact number of auxiliary concepts may di er from system to system, though. Name Original de- primi- arti- P de- primi- Language ned tive cial ned tive concepts roles CKB sb-one 23 57 58 138 2 46 Companies back 70 45 81 196 1 39 FSS sb-one 34 98 75 207 0 47 Espresso sb-one 0 145 79 224 11 41 Wisber turq 50 81 152 283 6 18 Wines classic 50 148 237 435 0 10 Table1 3: Real knowledge bases: structural description In Figure 2, the runtime for classifying the knowledge bases is plotted against the number of concepts de ned in the di erent knowledge bases. The number of concepts were counted after the translation, i.... ..."
Cited by 41
Table 1: CTL: concept forming operators symbols, for instance, that two concept symbols denote disjoint sets or that they cover the interpretation of another concept (see Table 4). Additionally to the operators listed in the four tables, most systems also o er some \escape quot; mechanism to the host system in the form of test functions and host data-types. We have omitted these from the description of the languages because this escape mechanism does not belong to the core of the terminological languages.In the rst column of the tables, we specify the abstract syntax, which we use in the paper. In the second column we specify the concrete syntax that is similar to the actual syntax used in systems such as classic, kris, and loom. In the third column, the formal meaning of the operators is speci ed using a set-theoretic semantics. This kind of semantics is based on interpretations I = hD; [[ ]]Ii, where
1994
"... In PAGE 9: ...otation for roles, i.e. [[R]]I(d) = fej(d; e) 2 [[R]]Ig. For example, given the concept symbol Workstation, intended to denote all workstations, and the role symbol disk-drive, intended to denote the disk drives on a given workstation, according to Table1 the expression (Workstation u 0 disk- drive) denotes all disk-less workstations. If we want to restrict the interpretation of the symbol Diskless-Workstation to the interpretation of (Workstation u 0 disk-drive), the terminological axiom Diskless-Workstation : = (Workstation u 0 disk-drive) can be used.... In PAGE 16: ...15 Result of System Test : : : back classic kris loom meson sb-one 1 (a) PErr CErr CErr CErr CErr PErr (b) PErr CErr CErr CErr CErr CErr (c) PErr CErr CErr CErr CErr CErr (d) | CErr CErr CErr CErr CErr 2 (a) Corr Corr Corr Corr CErr CErr (b) Corr Corr Corr Corr CErr CErr 3 (a) Corr Corr Corr Corr CErr Corr (b) Corr Corr Corr Corr CErr Corr 4 (a) Corr CErr Incorr Corr CErr | (b) Incorr CErr Incorr | | | 5 (a) Corr CWarn CWarn CWarn CErr CWarn (b) CErr | | | CErr Corr 6 (a) Corr CErr Corr Corr CErr CErr (b) Incorr CErr Corr Corr | CErr (c) Corr CErr Corr Corr Corr CErr 7 (a) CErr CErr CErr (Corr) (Corr) (Corr) (b) CErr CErr CErr (Corr) (Corr) (Corr) (c) CErr CErr CErr (Corr) CErr (Corr) (d) CErr CErr CErr (Corr) CErr (Corr) 8 (a) CErr CErr Incorr Corr | Corr PErr error message of underlying programming system CErr case is error in system interpretation and an error message is issued CWarn case is no error in system interpretation but a warning is issued Corr case is no error in system interpretation and handled correctly without warning (Corr) system accepts input but does not classify these concepts according to one of the possible semantics Incorr case is not handled correctly | not applicable Table1 0: Problematic cases: test results malicious attitude. As in Section 5.... In PAGE 20: ...19 Result of System Test : : : back classic kris loom meson sb-one 1 (a) Y Y Y Y Y Y (b) Y Y N Y Y Y (c) Y Y Y Y Y Y (d) N | | | N N 2 (a) Y Y Y Y Y Y (b) N | Y N Y Y 3 (a) N | Y N Y Y (b) N | | N Y N (c) N | | N | Y (d) N | | N | N (e) N | N/Y N | | 4 (a) | | | N N | (b) | | | N | | 5 (a) | | | Y N Y (b) | | N/Y Y | Y (c) | | N/Y N | N 6 (a) | N N/Y N | | (b) | Y N/Y N | | 7 (a) | | | N Y | Y inference drawn N inference not drawn N/Y result depends on the selected subsumption algorithm in kris Table1 1: TBox inferences: test results 5.4 Summary of Qualitative Results The above results show that the ongoing process of specifying a common lan- guage for terminological representation and reasoning systems [28, p.... In PAGE 24: ... measured on MacIvory. ytest has been aborted zsystem reported internal error Table1 2: Hard cases: runtime of subsumption tests performance for worst-case examples give us the right idea of how systems will behave in applications. In order to get a feeling of the runtime performance under realistic conditions, we asked other research groups for terminological knowledge bases they use in their projects.... In PAGE 25: ... The exact number of auxiliary concepts may di er from system to system, though. Name Original de- primi- arti- P de- primi- Language ned tive cial ned tive concepts roles CKB sb-one 23 57 58 138 2 46 Companies back 70 45 81 196 1 39 FSS sb-one 34 98 75 207 0 47 Espresso sb-one 0 145 79 224 11 41 Wisber turq 50 81 152 283 6 18 Wines classic 50 148 237 435 0 10 Table1 3: Real knowledge bases: structural description In Figure 2, the runtime for classifying the knowledge bases is plotted against the number of concepts de ned in the di erent knowledge bases. The number of concepts were counted after the translation, i.... ..."
Cited by 41
Table 1. CC2001 Information Management Areas
"... In PAGE 13: ... A handful of LIS programs have begun offering certificate programs in digital librarianship, but there is little agreement as to the content and scope of these programs, and little coordination between institutions, or between LIS and CS departments. While Computing Curriculum 2001 (CC2001, a joint effort of ACM and IEEE-CS published in late 2001, defining curricula for CS [62, 63] and related programs [64]) includes DLs as one of 14 knowledge modules in Information Management (see Table1 ), no further work has been supported to develop a DL curriculum beyond the brief CC2001 description. Table 1.... In PAGE 14: ... Figure 1. Curriculum framework The topics listed in Figure 1 are based on a careful analysis of the CC2001 discussion regarding the field of Information Management (see Table1 and www.... ..."
Table 1. TP-HDD Experiment Matrix (Legend: EBG=Elevation-Based Generic, PR=Photo Realistic, CC=Constant Color, FN=Fish Net)
"... In PAGE 6: ... While the formation of this set of candidate display concepts was based on subject pilot evaluations, the suggested collection of display concepts was broad enough to meet the objectives of the experiment. Subsequently, an adequate number of display-concepts (10) were retained for the core experiment (see Table1 ). Table 1.... ..."
Table 1. Definitional extensions of PSL
2003
"... In PAGE 6: ... The definitional extensions are grouped into parts according to the core theories that are required for their definitions. Table1 gives an overview of these groups together with example concepts that are defined in the extensions. The definitional extensions in a group contain definitions that are conservative with respect to the specified core theories; for example, all concepts in the Temporal and State Extensions have conservative definitions with respect to both the Complex Activities and Discrete States theories.... ..."
Cited by 4
Table 1: R amp;D elements, prototype tools, calibration and tuning results integrated into a demonstration prototype system as part of the Lop Nor Advanced Concept Demonstration (ACD)
"... In PAGE 5: ... In this case, because the two explosions are not collocated, some differences are evident in detailed waveform characteristics and amplitude level between the scaled and observed data, with the theoretically scaled having a broadband peak amplitude level which is about a factor of 2 smaller than the observed at this station. Integration of R amp;D elements and prototype into a demonstration system Table1 presents a listing of the key R amp;D elements, rapid prototyped tools, calibration and tuning results synthesized into a demonstration prototype system as part of this ACD. Our approach to integrating these elements was to use as a baseline, the monitoring system software that defines the core of both the IDC Release 3 upgrade delivery and the USNDC Phase 2 system.... In PAGE 5: ... We made numerous significant upgrades to many of the key elements of the core system, including the detection and feature extraction software (DFX) and the interactive analysis suite (ARS). When R amp;D elements or advanced concepts were implemented through direct changes to the core part of the system software they are categorized in Table1 as Software . Some of the advanced concepts required implementation in the form of a new tool or component.... In PAGE 5: ... Some of the advanced concepts required implementation in the form of a new tool or component. In that case they are flagged in Table1 as Prototype software . Finally a number of the changes were the result of tuning, calibration or reconfiguration.... ..."
Table 1 Concepts to create effective high-VT n-MOSFETs. The arrows indicate subthreshold leakage current (Ileak).
"... In PAGE 11: ... The reduction efficiency of (B1) is calculated in the same manner: r2 H11005 exp H20875KH20849H20881H9254 H11001 2H9023 H11002 H208812H9023H20850 S/ln10 H20876 . (5) Figure 14 Leakage reduction efficiency of various concepts in Table1 . Plotted using 0.... In PAGE 12: ... VTS and VTP denote the respective threshold voltages of QSP and QP. (a) OUT (0) IN (VDD) VDD VDL Active Standby VDD 0 VDL VDD VDD H11002 QSP(WS, VTS) QSP(WS, VTS) QP(WP, VTP) n core circuits (c) VDD VDL (b) QP(WP, VTP) H9278 H9278 H9278 H9254 Figure 16 Leakage reduction due to stacking MOSFETs using concepts (A1) and (C) in Table1 . The same parameters as in Figure 14 are used.... ..."
Table 1:Fundamental standard modeling abstractions
"... In PAGE 8: ... We claim that a core set of these fundamental modeling abstractions exists and they are largely adequate to express the design concepts, notions, and artifacts used across engineering domains. Table1 lists the elements of this set. 1.... ..."
Table 2 lists the additional, and in many cases more advanced, topics that we cover in place of some of the required core in our first course. KU Must be covered Covered?
2003
"... In PAGE 5: ...Algorithms and problem solving Yes PF3 Fundamental data structures No AL1 Basic algorithm analysis Yes AL3 Fundamental computing algorithms Yes AR1 Digital logic and digital systems Yes PL6 Object-oriented programming No SE1 Software design; OOA amp;D No SE2 Using APIs No SE3 Software tools and environments Yes SE5 Software requirements and specs No SE6 Software validation No Table 1: Mapping of CC2001 minimal set to our JIT design It is the topics in Table2 that allow us to build applications that students find exciting and for us to weave the web- centric thread that holds together the concepts from the core knowledge units. KU Topic PF5 Event-driven programming AR2 Machine level representation of data AR3 Assembly level machine organization AR4 Memory system organization and architecture OS1 Overview of operating systems OS2 Operating system principles OS4 Scheduling and dispatch OS8 File systems NC1 Introduction to net-centric computing NC4 The web as an example of client-server computing NC5 Building web applications HC2 Building a simple graphical user interface IM2 Database systems IM3 Data modeling IM4 Relational databases IM5 Database query languages IM6 Relational database design 6 Conclusion Our implementation of the breadth-first model is also important in that it illustrates the power of an alternative way of looking at the undergraduate education.... ..."
Cited by 3
Results 21 - 30
of
9,786