نتایج جستجو برای: monitor

تعداد نتایج: 80052  

2001
Laila Craighero Luciano Fadiga Giacomo Rizzolatti Carlo Umiltà

Two experiments were performed to explore a possible visuomotor priming effect. The participants were instructed to fixate a cross on a computer screen and to respond, when the cross changed colour (“go” signal), by grasping one of two objects with their right hand. The participants knew in advance the nature of the to-be-grasped object and the appropriate motor response. Before (100 msec), sim...

Journal: :Neurocomputing 2001
Liam Paninski Michael J. Hawken

Neuroscientists have long been interested in how e$ciently we solve probabilistic sensory problems. In order to explore analogous questions in the motor domain, we observed the eye movements of human subjects attempting to track a visual target which moved stochastically across a computer screen. The subjects' behavior was then compared to a mathematicallyderived bound on the best performance p...

Journal: :CoRR 2012
A. B. Mutiara A. Muslim T. Oswari R. A. Miharja

For the realization of the vision and mission of Healthy Indonesia 2015, we need a health service with a broad and comprehensive scope.To provide health services, it can be realized by creating an integrated information system applications such as creating an electronic medical record that has the ability to process and store patient medical data. The specifications used medical record is an op...

2004
Jim Barbour

Radio is the ultimate auditory display: all information is conveyed aurally to a listener. Sound from a radio invokes visual images in the imagination of a listener, the theatre of the mind. Listening to a radio voice creates images of a person talking from a studio live to their audience, providing information and entertainment. However, much radio is pre-recorded, produced in a radio studio a...

2011
Leanid Krautsevich Aliaksandr Lazouski Fabio Martinelli Artsiom Yautsiukhin

In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-evaluate security policies each time when attributes change their values. Catching timely all attribute changes is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delaye...

2004
A. Chadyuk G. Borodkin G. Proskudina

The experience of creation and research of information analytic system is discussed. The system is oriented towards a solution of socioeconomic problems. The report describes “Monitor 2.1” system, which have been developed for The Ministry of Economy of Autonomous Republic of Crimea. The report contents the principles and approaches to the development of the next version of that system – “Monit...

Journal: :Softw., Pract. Exper. 2001
Hsin-Ta Chiao Shyan-Ming Yuan

class Condition { protected EMonitor AssociatedEMonitor; public Condition(Object object) throws IllegalArgumentException{ if(object instanceof EMonitor) AssociatedEMonitor = (EMonitor) object; else if(object instanceof EMonitoredInterface) AssociatedEMonitor = ((EMonitoredInterface) object).GetEMonitor(); else throw new IllegalArgumentException(); }

1999
Cynthia E. Irvine

For over twenty-five years, the Reference Monitor Concept [1] has proved itself to be a useful tool for computer security practitioners. It can also be used as a conceptual tool in computer security education. This paper describes a computer security education program at the Naval Postgraduate School that has used the Reference Monitor concept as a unifying principle for courses, laboratory wor...

Journal: :Journal of experimental psychology. Human perception and performance 2013
Verónica C. Ramenzoni Natalie Sebanz Günther Knoblich

How do we map joint actions we participate in onto joint actions we observe others performing, such as when a couple dancing tango observes another couple dancing tango? We investigated this question using a task in which participants were instructed to perform individual or joint movements in synchrony with individual or joint movements observed on a computer screen. The observed movements sta...

Journal: :CoRR 2007
Urmila Shrawankar Vilas M. Thakare

Whenever we think of cyber applications, we visualize the model that gives the idea that we are sitting in front of computer at home or workplace connected to internet and performing all the work that generally we have to go and do on a specific place for example e-shopping, ebanking, e-education etc. In case of e-shopping, we view all the products on the computer screen with all details by a s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید