نتایج جستجو برای: lapwapw lo
تعداد نتایج: 40393 فیلتر نتایج به سال:
As Table 1 shows, there is much more to competitive intelligence than just market research. The word assessment suggests an ongoing process using a variety of information streams and data gathering techniques including psychological profiling and new technology evaluation. This process helps decision makers better understand the development of their industry, the behavior and capabilities of th...
Graphics researchers are exploring a new frontier—a world of objects of much greater complexity than those typically accessible through geometric and physical modeling alone—objects that are alive. The modeling and simulation of living systems for computer graphics resonates with an emerging field of scientific inquiry called artificial life, or ALife, a discipline that transcends the tradition...
represents a study of the Italian piazza created using Lightscape and AutoCAD.
Mask of the Hive, a virtual embodiment of a simulated bee colony, an inherently decentralized interactive character, built under the Synthetic Characters behavioral framework.
Jini technology assumes a changing network, in terms of both the components that make up the network and the way these components interact. Networks are generally long-lived entities that, as they grow to include ever-larger populations of users and machines, become increasingly difficult to upgrade as a single entity. That’s why the Jini architecture is designed around support for incrementall...
Foretelling these attacks, the President’s Commission on Critical Infrastructure Protection (PCCIP) announced in October of 1997 that the increasing dependence of U.S. critical infrastructures on information and communications has made them vulnerable to information warfare attacks. The commission found that while the resources needed to conduct a physical attack against these infrastructures h...
over Honduras northeast toward Cuba, this scientific visualization was created in 1999 using infrared and visible cloud data from the NOAA Geostationary Operational Environmental Satellites.
In defending network resources any number of technologies might be applied. Firewalls, encryption technology, authentication devices, vulnerability checking tools, and other products can all offer improved security. But even when a computer system is equipped with stringent authentication procedures and firewalls, it is still susceptible to hackers who take advantage of system flaws and social ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید