Assertion list
method (primary) → ReceivesAction

Results from Ascent++: 360
methodReceivesAction described in detail 0.71
methodReceivesAction shown in fig 0.70
methodReceivesAction invoked 0.69
methodReceivesAction described 0.69
methodReceivesAction applied 0.68
methodReceivesAction executed 0.66
methodReceivesAction implemented 0.66
methodReceivesAction employed 0.66
methodReceivesAction known in the art 0.66
methodReceivesAction developed 0.65
methodReceivesAction performed 0.64
methodReceivesAction tested 0.64
methodReceivesAction based 0.64
methodReceivesAction illustrated in fig 0.64
methodReceivesAction described with reference 0.63
methodReceivesAction included in the study 0.63
methodReceivesAction explained in detail 0.63
methodReceivesAction shown 0.63
methodReceivesAction obtained 0.62
methodReceivesAction received 0.62
methodReceivesAction chosen 0.62
methodReceivesAction discussed 0.62
methodReceivesAction accomplished 0.62
methodReceivesAction described in section 0.61
methodReceivesAction reviewed 0.61
methodReceivesAction derived 0.61
methodReceivesAction accessed 0.61
methodReceivesAction used in the study 0.61
methodReceivesAction described in fig 0.61
methodReceivesAction investigated 0.61
methodReceivesAction used to collect datum 0.60
methodReceivesAction performed in suitable order 0.60
methodReceivesAction based on the assumption 0.60
methodReceivesAction selected 0.60
methodReceivesAction used in conjunction 0.60
methodReceivesAction created 0.60
methodReceivesAction made 0.60
methodReceivesAction conducted 0.60
methodReceivesAction provided 0.60
methodReceivesAction proposed 0.60
methodReceivesAction evaluated 0.59
methodReceivesAction provided by class 0.59
methodReceivesAction applied to datum 0.59
methodReceivesAction explained 0.59
methodReceivesAction described with respect 0.59
methodReceivesAction intended for use 0.59
methodReceivesAction implemented in software 0.59
methodReceivesAction determined 0.59
methodReceivesAction analyzed 0.59
methodReceivesAction verified 0.59
methodReceivesAction disclosed in u.s. pat 0.59
methodReceivesAction shown in figure 0.58
methodReceivesAction declared 0.58
methodReceivesAction used in testing 0.58
methodReceivesAction limited 0.58
methodReceivesAction documented 0.58
methodReceivesAction identified 0.58
methodReceivesAction prepared 0.58
methodReceivesAction tried 0.58
methodReceivesAction set 0.58
methodReceivesAction compared 0.58
methodReceivesAction recommended 0.58
methodReceivesAction described in previous section 0.58
methodReceivesAction used in present study 0.58
methodReceivesAction declared in interface 0.58
methodReceivesAction based on the principle 0.58
methodReceivesAction studied 0.58
methodReceivesAction synchronized 0.57
methodReceivesAction inherited 0.57
methodReceivesAction described in chapter 0.57
methodReceivesAction set forth in claim 0.57
methodReceivesAction calculated 0.57
methodReceivesAction designed 0.57
methodReceivesAction adopted 0.57
methodReceivesAction described herein 0.57
methodReceivesAction run 0.57
methodReceivesAction discussed in chapter 0.57
methodReceivesAction assessed 0.57
methodReceivesAction described in present invention 0.56
methodReceivesAction described in the following 0.56
methodReceivesAction read 0.56
methodReceivesAction used by researcher 0.56
methodReceivesAction described in paragraph 0.56
methodReceivesAction required 0.56
methodReceivesAction reached 0.56
methodReceivesAction written 0.56
methodReceivesAction changed 0.56
methodReceivesAction followed 0.56
methodReceivesAction maintained 0.56
methodReceivesAction shown in table 0.56
methodReceivesAction used in addition 0.56
methodReceivesAction removed 0.56
methodReceivesAction applied to problem 0.56
methodReceivesAction protected 0.56
methodReceivesAction discussed in detail 0.56
methodReceivesAction updated 0.56
methodReceivesAction based on the idea 0.55
methodReceivesAction modified 0.55
methodReceivesAction sent 0.55
methodReceivesAction configured 0.55
methodReceivesAction collected 0.55
methodReceivesAction overloaded 0.55
methodReceivesAction recognized 0.55
methodReceivesAction chained 0.55
methodReceivesAction overridden 0.55
methodReceivesAction exposed 0.55
methodReceivesAction deployed 0.55
methodReceivesAction suited 0.55
methodReceivesAction combined 0.55
methodReceivesAction mixed 0.54
methodReceivesAction introduced 0.54
methodReceivesAction attempted 0.54
methodReceivesAction used in biology 0.54
methodReceivesAction incorporated 0.54
methodReceivesAction defined 0.54
methodReceivesAction pre 0.54
methodReceivesAction detected 0.54
methodReceivesAction structured 0.54
methodReceivesAction easy to use 0.54
methodReceivesAction triggered 0.54
methodReceivesAction described in u.s. pat 0.54
methodReceivesAction easy to implement 0.54
methodReceivesAction performed at temperature 0.53
methodReceivesAction contemplated 0.53
methodReceivesAction listed in table 0.53
methodReceivesAction generalized 0.53
methodReceivesAction used in example 0.53
methodReceivesAction described in the literature 0.53
methodReceivesAction used in the research 0.53
methodReceivesAction used in the united states 0.53
methodReceivesAction detailed 0.53
methodReceivesAction based on information 0.53
methodReceivesAction improved 0.53
methodReceivesAction used by professional 0.53
methodReceivesAction connected 0.53
methodReceivesAction processed 0.53
methodReceivesAction used in combination 0.53
methodReceivesAction observed 0.52
methodReceivesAction transferred 0.52
methodReceivesAction used in industry 0.52
methodReceivesAction described in claim 0.52
methodReceivesAction developed in the future 0.52
methodReceivesAction added 0.52
methodReceivesAction used in physics 0.52
methodReceivesAction viewed 0.52
methodReceivesAction known to one skilled 0.52
methodReceivesAction increased 0.52
methodReceivesAction implemented by class 0.52
methodReceivesAction put 0.52
methodReceivesAction measured 0.52
methodReceivesAction used in study 0.52
methodReceivesAction outlined 0.52
methodReceivesAction sufficient to create an average… 0.51
methodReceivesAction used by company 0.51
methodReceivesAction used in research 0.51
methodReceivesAction finished 0.51
methodReceivesAction compiled 0.51
methodReceivesAction easy to perform 0.51
methodReceivesAction optimized 0.51
methodReceivesAction taught 0.51
methodReceivesAction used in patient 0.51
methodReceivesAction supported 0.51
methodReceivesAction demonstrated 0.50
methodReceivesAction flawed 0.50
methodReceivesAction devised 0.50
methodReceivesAction used in europe 0.50
methodReceivesAction displayed 0.50
methodReceivesAction extended 0.50
methodReceivesAction taken into account 0.50
methodReceivesAction adequate to create an average s… 0.50
methodReceivesAction used in laboratory 0.50
methodReceivesAction designed for use 0.50
methodReceivesAction adequate to generate a normal c… 0.50
methodReceivesAction approved 0.50
methodReceivesAction used by author 0.50
methodReceivesAction used by the system 0.50
methodReceivesAction controlled 0.50
methodReceivesAction easy to apply 0.49
methodReceivesAction offered 0.49
methodReceivesAction referred 0.49
methodReceivesAction used in application 0.49
methodReceivesAction used in the project 0.49
methodReceivesAction used by people 0.49
methodReceivesAction proven effective 0.49
methodReceivesAction used in chemistry 0.49
methodReceivesAction described in example 0.49
methodReceivesAction used in many natural disciplines 0.48
methodReceivesAction proposed in the literature 0.48
methodReceivesAction avoided 0.48
methodReceivesAction highlighted 0.48
methodReceivesAction used by scientist 0.48
methodReceivesAction abandoned 0.48
methodReceivesAction used in the past 0.48
methodReceivesAction shared 0.48
methodReceivesAction focused 0.48
methodReceivesAction implemented by subclass 0.48
methodReceivesAction sought 0.48
methodReceivesAction introduced by milton erickson 0.48
methodReceivesAction disclosed 0.48
methodReceivesAction developed by researcher 0.48
methodReceivesAction formed 0.48
methodReceivesAction developed over last fifteen to … 0.48
methodReceivesAction appreciated 0.48
methodReceivesAction provided in another embodiment 0.47
methodReceivesAction provided in one embodiment 0.47
methodReceivesAction used in situation 0.47
methodReceivesAction based on experience 0.47
methodReceivesAction suggested 0.47
methodReceivesAction made possible 0.47
methodReceivesAction safe to use 0.47
methodReceivesAction performed by computer 0.46
methodReceivesAction provided in embodiment 0.46
methodReceivesAction retrieved 0.46
methodReceivesAction disclosed in another embodiment 0.46
methodReceivesAction overridden by subclass 0.46
methodReceivesAction simplified 0.46
methodReceivesAction established 0.46
methodReceivesAction used in design 0.46
methodReceivesAction illustrated 0.46
methodReceivesAction utilized to submit the request 0.46
methodReceivesAction enabled 0.46
methodReceivesAction reported 0.46
methodReceivesAction used in case 0.46
methodReceivesAction related 0.45
methodReceivesAction provided in another aspect 0.45
methodReceivesAction discovered 0.45
methodReceivesAction known in prior art 0.45
methodReceivesAction described in u.s. patent applic… 0.45
methodReceivesAction claimed in any one of claims 0.45
methodReceivesAction based in part 0.45
methodReceivesAction implemented in hardware 0.45
methodReceivesAction prohibited 0.45
methodReceivesAction provided in another aspect of t… 0.45
methodReceivesAction returned 0.45
methodReceivesAction used with child 0.45
methodReceivesAction deprecated 0.45
methodReceivesAction described in relation 0.45
methodReceivesAction prone to error 0.44
methodReceivesAction illustrated in figure 0.44
methodReceivesAction validated for accuracy 0.44
methodReceivesAction expanded 0.44
methodReceivesAction provided in one aspect 0.44
methodReceivesAction desired 0.44
methodReceivesAction invented 0.44
methodReceivesAction provided in one embodiment of t… 0.43
methodReceivesAction restricted 0.43
methodReceivesAction implemented in firmware 0.43
methodReceivesAction proven safe 0.43
methodReceivesAction excluded 0.43
methodReceivesAction easy to learn 0.43
methodReceivesAction easy to understand 0.43
methodReceivesAction proven 0.43
methodReceivesAction used in merger 0.43
methodReceivesAction illustrative in addition 0.43
methodReceivesAction explained with reference 0.43
methodReceivesAction implemented in combination 0.43
methodReceivesAction incorporated by reference 0.43
methodReceivesAction specified by the company 0.43
methodReceivesAction altered 0.42
methodReceivesAction performed in response 0.42
methodReceivesAction done at home 0.42
methodReceivesAction implemented in each stage type 0.42
methodReceivesAction implemented in system 0.42
methodReceivesAction performed by the system 0.42
methodReceivesAction extracted 0.42
methodReceivesAction used in connection 0.42
methodReceivesAction used in practice 0.42
methodReceivesAction moved 0.42
methodReceivesAction described in embodiment 0.42
methodReceivesAction described in the specification 0.42
methodReceivesAction biased 0.41
methodReceivesAction prescribed by the company 0.41
methodReceivesAction stored 0.41
methodReceivesAction advanced 0.41
methodReceivesAction replaced 0.41
methodReceivesAction accepted 0.41
methodReceivesAction performed by software 0.41
methodReceivesAction performed in embodiment 0.41
methodReceivesAction realized 0.41
methodReceivesAction divided into two groups 0.41
methodReceivesAction enrolled 0.41
methodReceivesAction provided in various embodiments 0.41
methodReceivesAction used by other companies 0.41
methodReceivesAction recorded 0.41
methodReceivesAction proven successful 0.41
methodReceivesAction disclosed in embodiment 0.41
methodReceivesAction never called 0.41
methodReceivesAction disclosed in u.s. patent applic… 0.41
methodReceivesAction implemented by computer 0.41
methodReceivesAction implemented in suitable hardware 0.41
methodReceivesAction provided by present invention 0.41
methodReceivesAction activated 0.40
methodReceivesAction described in patent document 0.40
methodReceivesAction permitted by law 0.40
methodReceivesAction outlined in fig 0.40
methodReceivesAction shown in u.s. pat 0.40
methodReceivesAction utilized with fewer backcrosses 0.40
methodReceivesAction ignored 0.40
methodReceivesAction addressed 0.40
methodReceivesAction provided in an embodiment of th… 0.40
methodReceivesAction replicated 0.40
methodReceivesAction used in other embodiments 0.40
methodReceivesAction performed in part 0.40
methodReceivesAction used in experiment 0.40
methodReceivesAction difficult to implement 0.40
methodReceivesAction described in another embodiment 0.40
methodReceivesAction enrolled in the study 0.40
methodReceivesAction illustrated in accompanying dra… 0.40
methodReceivesAction enhanced 0.40
methodReceivesAction implemented in connection 0.40
methodReceivesAction provided by the invention 0.40
methodReceivesAction difficult to apply 0.40
methodReceivesAction described in first embodiment 0.40
methodReceivesAction performed by client 0.40
methodReceivesAction performed by the system of fig 0.40
methodReceivesAction performed in alternate embodime… 0.40
methodReceivesAction used in finance 0.40
methodReceivesAction published 0.40
methodReceivesAction implemented in computing device 0.40
methodReceivesAction shown in example 0.39
methodReceivesAction allowed 0.39
methodReceivesAction known to the art 0.39
methodReceivesAction used in acquisition 0.39
methodReceivesAction used in corporate development 0.39
methodReceivesAction used in equity research 0.39
methodReceivesAction used in investment banking 0.39
methodReceivesAction used in private equity 0.39
methodReceivesAction integrated 0.39
methodReceivesAction described in the context 0.39
methodReceivesAction performed by computing device 0.39
methodReceivesAction performed by device 0.39
methodReceivesAction performed by one or more proces… 0.39
methodReceivesAction presented for use 0.39
methodReceivesAction revised 0.39
methodReceivesAction carried out in desired environm… 0.39
methodReceivesAction described in co 0.39
methodReceivesAction described in patent 0.39
methodReceivesAction performed by processor 0.39
methodReceivesAction performed by server 0.39
methodReceivesAction used by philosophy 0.39
methodReceivesAction shown to be accurate 0.38
methodReceivesAction produced 0.38
methodReceivesAction conceived 0.37
methodReceivesAction criticized 0.36
methodReceivesAction validated for precision 0.35
methodReceivesAction considered safe 0.35
methodReceivesAction guaranteed 0.35
methodReceivesAction validated for linearity 0.35
methodReceivesAction generated by script 0.35
methodReceivesAction generated by macro 0.34
methodReceivesAction learned 0.34
methodReceivesAction selected for the study 0.34
methodReceivesAction generated by the use of automat… 0.34
methodReceivesAction shown in the video 0.34
methodReceivesAction validated for robustness 0.32
methodReceivesAction validated for specificity 0.32
methodReceivesAction muddled 0.31
methodReceivesAction specified 0.31
methodReceivesAction agreed 0.31
methodReceivesAction claimed 0.30