نتایج جستجو برای: account manipulation

تعداد نتایج: 329576  

Journal: :e & i Elektrotechnik und Informationstechnik 2020

1998
Jiro Tanaka Hideki Mitsunobu Takashi Oshiba

We describes a method for manipulating a threedimensional object without considering conventional three independent orthogonal views. We apply the direct manipulation method to operate the threedimensional object. We propose \augmented manipulation" method which is an enhanced direct manipulation technique by using additional information. We implement three-dimensional modeling tool \Claymore" ...

2006
Enrique G. Mendoza Vincenzo Quadrini José-Víctor Ríos-Rull

Large global financial imbalances need not be the harbinger of a world financial crash as many authors believe. Instead, we show that large and persistent global imbalances can be the outcome of financial integration when countries have different financial markets characteristics. In particular, countries with more advanced financial markets accumulate foreign liabilities vis-a-vis countries wi...

2017
Ariel Rosenfeld Odaya Kardashov Orel Zang

Mobile applications are being used every day by more than half of the world’s population to perform a great variety of tasks. With the increasingly widespread usage of these applications, the need arises for efficient techniques to test them. Many frameworks allow automating the process of application testing, however existing frameworks mainly rely on the application developer for providing te...

2000
Jong-Wha Lee Changyong Rhee Robert Barro Sunghyun Kim Steven Radelet Jeffrey Sachs

This paper analyzes the macroeconomic adjustment process of the Korean financial crisis in a broad international perspective. In particular, the impacts of the crisis on GDP growth, inflation, current account balance, and employment are analyzed using a crosscountry data set, which compiled 150 financial crisis episodes from all developing countries that have received conditional financial assi...

2011

Statistics are complied upon reports provided by data suppliers which are usually obliged to give their data by law. These laws include goals of these data reports and guidelines for providing them. Even in the case, however, when these data reports fulfil all requirements, we would not be sure that we have got the right picture of economic processes because, as a result of characteristics and ...

Journal: :RFC 2011
Christer Holmberg

This specification defines a new Session Initiation Protocol (SIP) response code, 199 Early Dialog Terminated, that a SIP forking proxy and a User Agent Server (UAS) can use to indicate to upstream SIP entities (including the User Agent Client (UAC)) that an early dialog has been terminated, before a final response is sent towards the SIP entities. Information about the current status of this d...

2012
Sheng Wei Lin Louis Yi-Shih Lo Wen-Miao Liu

Past research has extensively studied individuals’ knowledge-sharing behavior. Identifying the effective mechanisms that motivate individuals to share their valuable knowledge has become an important issue and a major challenge for researchers and practitioners. Past studies fail to consider the readiness of conversion of motivational mechanism to economic benefits of knowledge sharing on knowl...

2013
Silvia González Javier Sedano Urko Zurutuza Enaitz Ezpeleta Diego Martínez Álvaro Herrero Emilio Corchado

The Secure Shell Protocol (SSH) is a well-known standard protocol for remote login and used as well for other secure network services over an insecure network. It is mainly used for remotely accessing shell accounts on Unix-liked operating systems to perform administrative tasks. For this reason, the SSH service has been for years an attractive target for attackers, aiming to guess root passwor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید