نتایج جستجو برای: account manipulation
تعداد نتایج: 329576 فیلتر نتایج به سال:
We describes a method for manipulating a threedimensional object without considering conventional three independent orthogonal views. We apply the direct manipulation method to operate the threedimensional object. We propose \augmented manipulation" method which is an enhanced direct manipulation technique by using additional information. We implement three-dimensional modeling tool \Claymore" ...
Large global financial imbalances need not be the harbinger of a world financial crash as many authors believe. Instead, we show that large and persistent global imbalances can be the outcome of financial integration when countries have different financial markets characteristics. In particular, countries with more advanced financial markets accumulate foreign liabilities vis-a-vis countries wi...
Mobile applications are being used every day by more than half of the world’s population to perform a great variety of tasks. With the increasingly widespread usage of these applications, the need arises for efficient techniques to test them. Many frameworks allow automating the process of application testing, however existing frameworks mainly rely on the application developer for providing te...
This paper analyzes the macroeconomic adjustment process of the Korean financial crisis in a broad international perspective. In particular, the impacts of the crisis on GDP growth, inflation, current account balance, and employment are analyzed using a crosscountry data set, which compiled 150 financial crisis episodes from all developing countries that have received conditional financial assi...
Statistics are complied upon reports provided by data suppliers which are usually obliged to give their data by law. These laws include goals of these data reports and guidelines for providing them. Even in the case, however, when these data reports fulfil all requirements, we would not be sure that we have got the right picture of economic processes because, as a result of characteristics and ...
This specification defines a new Session Initiation Protocol (SIP) response code, 199 Early Dialog Terminated, that a SIP forking proxy and a User Agent Server (UAS) can use to indicate to upstream SIP entities (including the User Agent Client (UAC)) that an early dialog has been terminated, before a final response is sent towards the SIP entities. Information about the current status of this d...
Past research has extensively studied individuals’ knowledge-sharing behavior. Identifying the effective mechanisms that motivate individuals to share their valuable knowledge has become an important issue and a major challenge for researchers and practitioners. Past studies fail to consider the readiness of conversion of motivational mechanism to economic benefits of knowledge sharing on knowl...
The Secure Shell Protocol (SSH) is a well-known standard protocol for remote login and used as well for other secure network services over an insecure network. It is mainly used for remotely accessing shell accounts on Unix-liked operating systems to perform administrative tasks. For this reason, the SSH service has been for years an attractive target for attackers, aiming to guess root passwor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید