### Table 6 : De nition of ; and ?!

1996

"... In PAGE 9: ...haotic programs. The label is a sequence of multiset substitutions. The second, denoted hs; Mi ?! hs0; M0i, is the analogue for schedules, where is a sequence of multiset substitu- tions and quot; apos;s. The de nition of both relations is given in Table6 . We write 1 2 to denote the concatenation of 1 and 2.... ..."

Cited by 10

### Table 14: De nition of .

"... In PAGE 11: ...egion as 1 ? y. So we have a column multiplicity of two, i.e. two regions, y and 1 ? y. Based on this, we can de ne as in Table14 and F as in Table 15. Just as which the decomposition of binary functions, this leaves us with the problem of representing .... ..."

### Table 6: Comparison of DE1 and DE2 using FE, TS and cpu DE1 DE1 DE2 DE2 DE3

"... In PAGE 14: ... Comparison : We now compare DE and its modi ed versions, DE1, DE2 and DE3, using total FE, cpu and the total number of successes out of 900 runs for set A and 600 runs for set B. The results are summarized in Table6 . It is important to note that DE2 and DE3 were the only algorithms to locate the minimum value for ER10 with success rates about 20% on the average.... In PAGE 14: ... The best results were obtained by DE3 on set A and by DE1 on the sets B and B0. Table6 also shows that comparatively less success occurred for DE2 with t = 3 on both sets and therefore in our next comparison results using t = 4 are considered. For a further comparison we also ran DE(CR = 0:5; F = 1) and DE(CR = 0:5, F from (12)) on both A and B0.... In PAGE 14: ... These results for DE(CR = 0:5, F from (12)) are (892; 900) and (396; 406) respectively on A and B0. From these results and the results presented in Table6 it is clear that TS attained by DE and by all the modi ed DE methods both on A and B0 are very much the same. Therefore, it will be interesting to see how much improvement (say, on FE) has been achieved by the proposed modi cations, given the same level of success.... ..."

### Table 1 Four Example Ciphers Parameters Example 1 Example 2 Example 3 Example 4

"... In PAGE 14: ... The remaining part of this section proposes four example ciphers which we hope are secure enough for practical applications. Main parameters of the ciphers are collected in Table1 . For completeness, the de nitions of the parameters are summarized below the table.... ..."

### Table 1: Fluids in BCDD* Study.

1994

"... In PAGE 13: ... x LIST of TABLES Table1 : Fluids in BCDD Study.... In PAGE 16: ... A quantitative investigation was designed by BOEING-CANADA DE HAVILLAND DIVISION (BCDD) and was run at the NASA Lewis Research Center (LeRC) in 1991. The study pursued the measurement of lift (drag and pitching moment) on a 2D wing model covered with anti-icing fluid (the list of fluids was extensive and is reported in Table1 ). The wing geometry and the velocity schedule were selected to represent the ... ..."

### TABLE 20: UNIVARIATE LM TESTS FOR de = 1 and de = 0 LM on de = 1 LM on de = 0

2001

Cited by 1