نتایج جستجو برای: stealth properties
تعداد نتایج: 870525 فیلتر نتایج به سال:
The development of the Earned Schedule (ES) method by Lipke in 2003 has been shown to be an important extension to the Earned Value Management (EVM) method, increasing the utility of EVM data for project schedule analysis, control and oversight. As ES provides a reliable time-based indicator of Schedule Performance, the objective of this paper is to investigate whether the SPI(t) exhibited simi...
Introduction: The National Research Council Decadal Study on Terrestrial Analogs to Mars recommended the Bishop Tuff, exposed in the Volcanic Tableland, Bishop, California (Fig. 1), as an analog [1] because some Martian volcanoes and the Stealth region of southwestern Tharsis are thought to be composed of pyroclastic deposits [2–4]. Recent data from the Spirit rover also suggest that the Columb...
Manymalicious programs are just previously-seen programs that have had someminor changes made to them. A slightly different variant hardly qualifies as a stealth attack: being 99% the same as a known piece of malware should be a dead giveaway. This white paper describes a method for searching database of programs for a match. The methods are adapted from ordinary text search and analysis; the k...
Level design for stealth games requires the ability to explore and understand the possible paths players may take through a given scenario and how they are impacted by different design choices. Good tool support can help by demonstrating the existence of such paths, but for rapid, interactive design, the relative difficulty of possible solutions also needs to be quantified, in a way that correl...
Question Wording & Indices for the CCES data: p. 2 Question Wording & Indices for the KN data: p. 4 Figure R1: Specification of the Three-Factor (SEM) Measurement Model: p. 6 Figure R2: Range of MOC Treatment x Stealth Interaction: p. 7 Table R1: Predicting Two Types of Political Participation (CCES): p. 8 Table R2: Predicting Two Types of Political Participation (KN): p. 9 Table R3: Participat...
The extent to which opportunities afforded by e-learning are embraced by an institution can depend in large measure on whether it is perceived as enabling and transformative or as a major and disruptive distraction. Most case studies focus on the former. This paper describes how e-learning was introduced into the latter environment. The sensitivity of competing pressures in a research intensive...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید