نتایج جستجو برای: bray methods
تعداد نتایج: 1875247 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Even though having some credibility in trans-disciplinary research (see e.g., Stehr and von Storch 1995, Bray and von Storch 1999, von Storch 2009, Bray and von Storch 2009 or Stehr and von Storch 2010), we may not have fully grasped the conceptions and arguments of S. Keller. What stuck to us was the complaint that the IPCC, mainly under the influence of Bert Bolin, would have failed to issue ...
In his invited speech at the second international workshop on "Visual Interfaces to Digital Libraries" held in conjunction with the Joint Conference on Digital Libraries (JCDL) [1] in 2002, Tim Bray, founder of Antarcti.ca Systems (http://antarctica.net), demonstrated how little search engine user interfaces have changed their appearance over the last five years. A revisit of Google'sTM or Yaho...
The methodology in the seismic design of slopes has evolved with technological advancement and development geotechnical engineering, methods great limitations such as pseudostatic analysis to rigorous that require a lot information for better understanding behavior soil dynamic analysis. This article develops procedure, comparison application simplified earthquake-induced displacement methods, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید