نتایج جستجو برای: commanding

تعداد نتایج: 721  

Journal: :World Review of Political Economy 2023

The financialization hypothesis (FH) is a popular leitmotiv which argues that the financial system conquers commanding heights of capitalist economy. It maintains finance gained independence from productive-capital and began to dominate it. FH bases this argument on several empirical claims concerning size strategic role entities. This article offers critique crucial analytical FH. overrates im...

2012
B. Watts

A 1985 graduate of the Coast Guard Academy, Captain Watts has served six sea tours with the Navy and Coast Guard, most recently commanding USCGC Steadfast (WMEC 623). A qualified Surface Warfare Officer and Cutterman, he holds advanced degrees from the Naval War College, Old Dominion University, American Military University, and the Naval Postgraduate School, and he is currently a doctoral cand...

1999
Kristin F. Wilson

AWARD NUMBER DAMD17-97-1-7308 TITLE: Characterization of Heregulin-Stimulated Signal Transduction Pathways to the Nucleus PRINCIPAL INVESTIGATOR: Kristin F. Wilson CONTRACTING ORGANIZATION: Cornell University Ithaca, New York 14853-2801 REPORT DATE: September 1998 TYPE OF REPORT: Annual PREPARED FOR: Commanding General U.S. Army Medical Research and Materiel Command Fort Detrick, Maryland 21702...

2015
Gordon Briggs Ian McConnell Matthias Scheutz

Future autonomous robots will likely encounter situations in which humans end up commanding the robots to perform tasks that robot ought to object. A previous study showed that robot appearance does not seem to affect human receptiveness to robot protest produced in response to inappropriate human commands. However, this previous work used robots that communicate the objection to the human in s...

Journal: :JCS 2014
T. Blesslin Sheeba P. Rangarajan

The side-channel attacks are one of the effortless and commanding attacks against cryptographic implementation and their intention vary from protocols, modules, primitives and system. As a result of this attack, a serious threat to the security of cryptographic module was encountered. In effect, realization of the cryptographic algorithm has to take some countermeasure to resist against this ty...

2000
Joel F. Bartlett

Using the example of an electronic photo album, a novel user input method for digital appliances is introduced. Based on tilting and gesturing with the device, the Rock ’n’ Scroll input method is shown to be sufficient for scrolling, selection, and commanding an application without resorting to buttons, touch screens, spoken commands or other input methods. User experiments with a prototype sys...

2012
Lesley Farrell

These sorts of questions, despite their many embedded definitional, philosophical and pragmatic problems, are commanding urgent attention in educational discourses and research policies now circulating in the UK and Europe, Canada and the US, Australia and other parts of the world. This attention has been translated into powerful material exercises that shape what is considered to be worthwhile...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید