نتایج جستجو برای: todays

تعداد نتایج: 850  

2007
Hellmuth Stachel

The goal of my presentation is to explain what Descriptive Geometry is good for and in which way the Descriptive Geometry education is carried out in European countries. By definition, Descriptive Geometry is a method to study 3D geometry through 2D images. It provides insight into structure and metrical properties of spatial objects, processes and principles. According to this, Descriptive Geo...

2013
Wan Fauziah Wan Yusoff Tan Shen Mohammad Talha Mohamed Idris

This paper review the conventional setting of Herzberg Two-Factors Theory and compare with current research finding that implemented the theory. This paper discuss findings from various countries and industries have found contrariwise with the theory, where Extrinsic Factors that should only turn up with job dissatisfactions or neutralize feelings towards jobs have indeed effected respondents’ ...

2003
Ingmar Glauche Wolfram Krause Rudolf Sollacher Martin Greiner

Wireless multi-hop ad hoc communication networks represent an infrastructure-less and self-organized generalization of todays wireless cellular networks. Connectivity within such a network is an important issue. Continuum percolation and technologydriven mutations thereof allow to address this issue in the static limit and to construct a simple distributed protocol, guaranteeing strong connecti...

2015
Richard Wigmans

The Universe contains several billion neutrinos for each nucleon. In this paper, we follow the history of these relic neutrinos as the Universe expanded. At present, their typical velocity is a few hundred km/s and, therefore, their spectra are affected by gravitational forces. This may have led to a phenomenon that could explain two of todays great mysteries: The large-scale structure of the U...

2005
Georg Ringwelski Matthias Hoche

Constraint Propagation can be speeded up significantly by choosing a good execution order for propagators. A propagator is an implicit representation of a constraint which is widely used in todays powerful constraint solvers. In this paper we evaluate different ways to find good execution orders automatically during runtime. We extend previous work in this area by two new techniques: fair-sched...

2010
Ioana Hulpus Manuel Fradinho Conor Hayes Leif Hokstad William Seager Mick Flanagan

A major challenge in todays fast pace world is the acquisition of competence in a timely and efficient manner, whilst keeping the individual highly motivated. This paper presents a novel based on the use of serious games driven by Case Based Reasoning (CBR) tailored by Threshold Concepts (TC) to present the learner with the most efficient choice of game scenarios to address their present compet...

2000
JoAnne Holliday Divyakant Agrawal Amr El Abbadi

As mobility permeates into todays computing and communication arena, we envision application infrastructures that will increasingly rely on mobile technologies. Traditional database applications and information service applications will need to integrate mobile entities: people and computers. In this paper, we develop a distributed database framework for mobile environments. A key requirement i...

2009
Manuel Egele Engin Kirda Christopher Krügel

Malicious web sites perform drive-by download attacks to infect their visitors with malware. Current protection approaches rely on blackor whitelisting techniques that are difficult to keep up-to-date. As todays drive-by attacks already employ encryption to evade network level detection we propose a series of techniques that can be implemented in web browsers to protect the user from such threa...

2002
Sven Ziemer

Todays Web Applications are complex distributed applications, that deploy their functionality to the World Wide Web. In many cases Web Applications have been developed by using an adhoc and unsystematic development process. As a conesquence these applications have a high probability of failure during operation. In order to develop high quality Web Application both the development process and th...

2003
Shaomeng Li Jim Tørresen Oddvar Søråsen

One of the most important areas of a network intrusion detection system (NIDS), stateful inspection, is described in this paper. We present a novel reconfigurable hardware architecture implementing TCP stateful inspection used in NIDS. This is to achieve a more efficient and faster network intrusion detection system as todays’ NIDSs show inefficiency and even fail to perform while encountering ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید