The Next Wave in Computing, Optimization, and Decision Technologies Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the...
Acoustic Diffusers and Absorbers: Theory, Design and Application Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed... Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic
commerce, and welfare disbursement require reliable person recognition systems.
Traditional person authentication methods based on passwords and identity
documents often fail to meet the stringent security and performance demands of
|Result Page: 284 283 282 281 280 279 278 277 276 275 274 273 272 271 270 269 268 267 266 |