نتایج جستجو برای: transcendental theme specifies political theme
تعداد نتایج: 143151 فیلتر نتایج به سال:
We develop two related themes, learning procedures and knowledge transfer. This paper introduces two methods for learning procedures and one for transferring previously-learned knowledge to a slightly different task. We demonstrate by experiment that transfer accelerates learning.
People have always used tools and technologies creatively. Technology appropriation concerns on how users adopt technologies for personal purposes. In this paper, we review the appropriation literature and explicate four varieties of this concept. Then we explore these varieties in the empirical setting of a citywide network of multipurpose interactive public displays. This network was designed...
25 This chapter starts with a brief discussion of the paucity of data and information on human development in the region and the challenges these gaps pose. It then summarizes the status of core human-development measures for the region compared to those for other regions of the world and over time, based primarily on the HDI. The chapter introduces three deficits that are considered to be defi...
Even as firms continue to invest substantially to develop and maintain their information technology assets, the means of judging the impact of those investments remain highly fragmented. The focus of scholars and their assessment methods varies substantially. To gain better insight into the business value returned from the spending of companies for information technology, an investigation invol...
We present a general non-oscillation criterion for a second order two-term scalar nonlinear differential equation in the spirit of a classic result by Atkinson [1]. The presentation is simpler than most and can serve to unify many such criteria under one common theme that eliminates the need for specfic techniques in each of the classical cases (sublinear, linear, and superlinear). As is to be ...
Existing cryptographic systems use strong passwords but several techniques are vulnerable to rubber-hose attacks, wherein the user is forced to reveal the secret key. This paper specifies a defense technique against rubberhose attacks by taking advantage of image sequence-based theme selection, dependent on a user’s personal construct and active implicit learning. In this paper, an attempt to a...
youssef ismael – iraqi great artist – is one of the nobles in playwriting either in writing or in criticism. al – aani has enjoyed beresht’s theories and ideas while his idea were based on political requirements which was dominant in that era; he wanted to choose a frame for playwriting which considered all types of people of the society. the present article which is analytical – descriptive, s...
This document specifies an IPv4-to-IPv6 transition mechanism, in addition to those already specified in [TRANS]. This solution attempts to provide transparent routing, as defined in [NAT-TERM], to end-nodes in V6 realm trying to communicate with end-nodes in V4 realm and vice versa. This is achieved using a combination of Network Address Translation and Protocol Translation. The scheme describe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید