Computer Science
epub |eng | | Author:Kripa Shanker & Ravi Shankar & Rahul Sindhwani

( Category: Computer Science March 18,2020 )
epub |eng | | Author:Jan Willmann & Philippe Block & Marco Hutter & Kendra Byrne & Tim Schork

2 Methodology 2.1 General Principle and Curvature Conventions The practice of land-forming to cast shell structures becomes an inspiration in the Sub-Additive process: the Philips pavilion at the Brussels Expo ...
( Category: Computer Science March 18,2020 )
epub, pdf |eng | 2013-01-08 | Author:Craig S. Lent [Craig S. Lent]

( Category: Human-Computer Interaction March 18,2020 )
epub |eng | | Author:Przemysław Ignaciuk & Andrzej Bartoszewicz

(5.160) where u(kT) specifies the number of packets to be sent by the source. For the purpose of exposition, we assume that there is no bandwidth available at the node ...
( Category: Computer Science March 18,2020 )
epub |eng | | Author:Michael Filimowicz & Veronika Tzankova

8.8.2 Waves, Phases or Complementary Approaches HCI has progressed from more pragmatic 1st wave, to a more analytic/metric oriented second wave and then a more phenomenological third wave. In contrast ...
( Category: Architecture March 18,2020 )
epub |eng | | Author:Michel O. Deville & Thomas B. Gatski

(5.266) Using appropriate averages of (5.262) with the second moments, one is led (after a few pages of algebra (sic)) to the equation (5.267) At equilibrium when there is no ...
( Category: Computer Science March 18,2020 )
epub |eng | | Author:Günter Ullrich

2.Technical protective measures: Adopting the necessary protective measures against risks which cannot be removed by redesign. 3.User information about remaining risks. Technical protection measures are realized by protective equipment (coverings, ...
( Category: Robotics & Automation March 18,2020 )
epub |eng | | Author:Luca Martino, David Luengo & Joaquín Míguez

is log- concave (i.e., ). In the literature, pdfs of this class are usually called log-log-concave densities [17], but this name does not clarify that the first logarithm function is ...
( Category: Machine Theory March 18,2020 )
epub |eng | | Author:James T. Streib & Takako Soma

Using this new class, a programmer could create three different instances of the PointD class as follows: PointD p1, p2, p3; p1 = new PointD(); p2 = new PointD(1.0,1.0); p3 ...
( Category: Object-Oriented Design March 18,2020 )
epub |eng | | Author:Tracy Hammond, Aaron Adler & Manoj Prasad

One interesting point to note with this approach is that a font type only need the split horizontal line height information for each character once for all. If someone wants ...
( Category: Computer Science March 18,2020 )
epub, pdf |eng | | Author:Milan Stevanovic

Windows Build Time Library Location Rules There are several ways how the information about the dynamic library required at link time may be passed to the project. Regardless of the ...
( Category: Software Development March 18,2020 )
epub |eng | | Author:Pierre-Yves Louis & Francesca R. Nardi

This result was further improved by [4] into an almost-sure convergence (Fig. 12.4). Fig. 12.4What Theorem 3 says, for large t 12.3.1 The Link with First-Passage Percolation The Eden model ...
( Category: Computer Science March 18,2020 )
epub |eng | | Author:Giovanni Maria Farinella, Sebastiano Battiato & Roberto Cipolla

7.4 Image-Based Localization A large number of interesting applications for micro aerial vehicles such as surveillance, agriculture, inspection, or simply 3D reconstruction for visualization share one common feature: The need ...
( Category: Computer Science March 18,2020 )
epub |eng | | Author:Kumar Selvarajoo

5. Jiang Z, Mak TW, Sen G, Li X (2004) Toll-like receptor 3-mediated activation of NF-kappaB and IRF3 diverges at Toll-IL-1 receptor domain-containing adapter inducing IFN-beta. Proc Natl Acad Sci ...
( Category: Computer Science March 18,2020 )