نتایج جستجو برای: lo

تعداد نتایج: 40393  

1999
Richard G. Vedder Michael T. Vanecek James J. Cappel

As Table 1 shows, there is much more to competitive intelligence than just market research. The word assessment suggests an ongoing process using a variety of information streams and data gathering techniques including psychological profiling and new technology evaluation. This process helps decision makers better understand the development of their industry, the behavior and capabilities of th...

1999
Demetri Terzopoulos

Graphics researchers are exploring a new frontier—a world of objects of much greater complexity than those typically accessible through geometric and physical modeling alone—objects that are alive. The modeling and simulation of living systems for computer graphics resonates with an emerging field of scientific inquiry called artificial life, or ALife, a discipline that transcends the tradition...

1999
Donald P. Greenberg

represents a study of the Italian piazza created using Lightscape and AutoCAD.

1999
George W. Fitzmaurice Ravin Balakrishnan Gordon Kurtenbach

Mask of the Hive, a virtual embodiment of a simulated bee colony, an inherently decentralized interactive character, built under the Synthetic Characters behavioral framework.

1999
Jim Waldo

Jini technology assumes a changing network, in terms of both the components that make up the network and the way these components interact. Networks are generally long-lived entities that, as they grow to include ever-larger populations of users and machines, become increasingly difficult to upgrade as a single entity. That’s why the Jini architecture is designed around support for incrementall...

1999
ANUP K. GHOSH

Foretelling these attacks, the President’s Commission on Critical Infrastructure Protection (PCCIP) announced in October of 1997 that the increasing dependence of U.S. critical infrastructures on information and communications has made them vulnerable to information warfare attacks. The commission found that while the resources needed to conduct a physical attack against these infrastructures h...

1999
Steve Bryson David Kenwright Michael Cox Robert Haimes

over Honduras northeast toward Cuba, this scientific visualization was created in 1999 using infrared and visible cloud data from the NOAA Geostationary Operational Environmental Satellites.

1999
David Ebert Edward Bedwell Stephen Maher Laura Smoliar Elizabeth Downing

1999
TERRANCE GOAN

In defending network resources any number of technologies might be applied. Firewalls, encryption technology, authentication devices, vulnerability checking tools, and other products can all offer improved security. But even when a computer system is equipped with stringent authentication procedures and firewalls, it is still susceptible to hackers who take advantage of system flaws and social ...

Journal: :Meridional. Revista Chilena de Estudios Latinoamericanos 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید