نتایج جستجو برای: windows dimensions

تعداد نتایج: 186217  

Journal: :CoRR 2005
David Carter Luiz Fernando Capretz

Computer users are currently bound to the “desktop” metaphor. This metaphor’s longevity is a testament to the strength of its design. Of course, over twenty-some years improvements have been made to that original design, but the basic elements (e.g. icons, pop-up and pull-down menus) that implement the what-you-see-is-what-you-get idea have remained the same. Nevertheless, our everyday life is ...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

<p>This study develops an analytical method with numerical results for the design of optical slab waveguides communication system applications. An waveguide structure made silicon on dioxide material is designed and analyzed. The effective index mode studied against variations in dimensions. Transmission reflection coefficients are compared to wavelength dimensions waveguide. Variations s...

Journal: :The Iowa Review 1977

Journal: :Journal of the Japan Society of Colour Material 1993

2006
Ah Chung Tsoi Markus Hagenbuchner Alessandro Sperduti

Neural networks have been one of the main techniques used widely in data mining. There are a number of popular neural network architectures, e.g. multilayer perceptrons, self organising maps, support vector machines. However, most of these techniques have been applied to problems in which the inputs are vectors. In other words, the inputs to these neural network architectures are expressed in t...

Customer service level is of prime importance in today competitive world and has various dimensions with delivery quality being one of the most important ones. Delivery quality has several parameters such as deliver time window options, time window size, etc. In this paper we focus on one of these parameters, namely time window setting. It has a direct impact upon customer satisfaction and busi...

Journal: :Iowa Journal of Literary Studies 1978

Journal: :History of the Human Sciences 2018

Journal: :EURASIP J. Wireless Comm. and Networking 2010
Ricardo Moraes Paulo Portugal Francisco Vasques Ricardo Felipe Custódio

The timing behavior of the EDCA mechanism defined in the IEEE 802.11e standard is analyzed. More specifically, the target of this paper is to evaluate the limitations of the highest priority level of the EDCA mechanism (voice category) when supporting real-time (RT) communication. By RT communication, we mean small-sized packets generated in periodic intervals that must be delivered before the ...

2007
Wenbo Mao Colin Boyd

Authentication protocols are known to be error prone. In this paper we identify non-methodical use of decryption as a typical design feature which is found in many published authentication protocols and is responsible for various problems in these protocols. We reason that authentication protocols can be greatly strengthened by the methodical use of decryption.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید