نتایج جستجو برای: stealth properties

تعداد نتایج: 870525  

Journal: :International Journal of Women's Health and Wellness 2016

2004
Neil Gunningham Patricia Healy

Exposure to pesticides poses a serious, albeit largely incalculable, threat to the health of agricultural workers worldwide. Incremental reforms to the regulatory status quo at national level may somewhat mitigate the problem. However, this paper argues that greater opportunities for improving agricultural occupational safety and health and pesticide safety lie outside the boundaries of the tra...

2006
MOKHTAR HASSAÏNE

We consider the problem of a self-interacting scalar field nonminimally coupled to the three-dimensional BTZ metric such that its energymomentum tensor evaluated on the BTZ metric vanishes. We prove that this system is equivalent to a self-dual system composed by a set of two first-order equations. The self-dual point is achieved by fixing one of the coupling constant of the potential in terms ...

2014

More than 100 of the worlds most potent fighter aircraft are depicted in superbly detailed cutaway drawings: from the canvas-and-string contraptions of World War I to the amazing stealth fighters that are taking air combat into the 21st century. Accompanied by fascinating technical and developmental descriptions, each drawing reveals and clearly identifies the aircrafts airframe structures, eng...

Journal: :IACR Cryptology ePrint Archive 2017
Tim Ruffing Pedro Moreno-Sanchez

The public nature of the blockchain has been shown to be a severe threat for the privacy of Bitcoin users. Even worse, since funds can be tracked and tainted, no two coins are equal, and fungibility, a fundamental property required in every currency, is at risk. With these threats in mind, several privacy-enhancing technologies have been proposed to improve transaction privacy in Bitcoin. Howev...

Journal: :J. Information Science 2000
Blaise Cronin

The chances of firms achieving, or being subjected to, strategic surprise have escalated with the growth of internetworking technologies and the opportunities these afford for various forms of information warfare (IW) and net terrorism. The more a business depends on sophisticated information systems, the greater its vulnerability to stealth attack. Defensive IW will soon become a necessary cos...

1993
Phillip Krueger Davender Babbar

Over the past several years, distributed systems composed of computer workstations have become common. To make full use of their often enormous aggregate computing capacity, distributed schedulers must be developed that are appropriate to the unique features of these systems. In this paper, we show that the approach (referred to as conservative) commonly used by distributed schedulers designed ...

Journal: :The Biological bulletin 2013
K Lucas S P Colin J H Costello K Katija E Klos

Unlike most medusae that forage with tentacles trailing behind their bells, several species forage upstream of their bells using aborally located tentacles. It has been hypothesized that these medusae forage as stealth predators by placing their tentacles in more quiescent regions of flow around their bells. Consequently, they are able to capture highly mobile, sensitive prey. We used digital p...

2015
Qihan Xu

Enemy observers, such as cameras and guards, are common elements that provide challenge to many stealth and combat games. Defining the exact placement and movement of such entities, however, is a non-trivial process, requiring a designer balance level-difficulty, coverage, and representation of realistic behaviours. In this work we explore systems for procedurally generating both camera and gua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید