نتایج جستجو برای: virtual office
تعداد نتایج: 195437 فیلتر نتایج به سال:
Neuromuscular principles in the visual system and their potential role in visual discomfort p. 10 Forget about aesthetics in chair design : ergonomics should provide the basis for comfort p. 19 Effects of the office environment on health and productivity 1 : auditory and visual distraction p. 26 Effects of using dynamic office chairs on posture and EMG in standardized office tasks p. 34 Video d...
In this paper, the concept of object deputy model is introduced to realize flexible objectbases. The model was required to realize advanced database applications, such as geographic databases, virtual office systems and distant education systems which are currently developed in our group. The model can also treat well-known problems of object-oriented data models: realization of flexible views,...
Twenty years ago, fieldbus systems have been developed for the factory floor and are widely introduced in industrial automation installations in the meantime. In the nineties Ethernet-based technologies have been successfully introduced to office automation followed by the usage of Internetbased applications. Today industrial automation is getting penetrated by the same IT technologies used in ...
This paper lays out a computational model for analyzing the relative efficacy of different CI architectures for teams with access to different types of databases (ITT). Then using this model, a virtual experiment is conducted. Aspects of this virtual experiment are patterned off of behavior and technology surrounding the knowledge wall. Results suggest that bringing ITT in to traditionally stru...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware of or take it for granted. However, good security practice by user populations is a critical element of an organization’s information assurance strategy. This is reflected in government information assurance teaching mandates such as DoD Directive 8570.1, which outlines objectives and requirements...
It is possible to realize systems supporting cooperative work among users in distance location utilizing recent network technology. Most current computer supported cooperative work (CSCW) systems, however, offer identical display views to all the users through video in order to simulate real world. We use database functions and non-video based communication tools to realize such cooperative wor...
We present a semantically rich graph representation for indoor robotic navigation. Our graph representation encodes: semantic locations such as offices or corridors as nodes, and navigational behaviors such as enter office or cross a corridor as edges. In particular, our navigational behaviors operate directly from visual inputs to produce motor controls and are implemented with deep learning a...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware of or take it for granted. However, good security practice by user populations is a critical element of an organization’s information assurance strategy. This is reflected in government information assurance teaching mandates such as DoD Directive 8570.1, which outlines objectives and requirements...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware of or take it for granted. However, good security practice by user populations is a critical element of an organization’s information assurance strategy. This is reflected in government information assurance teaching mandates such as DoD Directive 8570.1, which outlines objectives and requirements...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید