110 resultados para keyboard search


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper studied a new type of network model; it is formed by the dynamic autonomy area, the structured source servers and the proxy servers. The new network model satisfies the dynamics within the autonomy area, where each node undertakes different tasks according to their different abilities, to ensure that each node has the load ability fit its own; it does not need to exchange information via the central servers, so it can carry out the efficient data transmission and routing search. According to the highly dynamics of the autonomy area, we established dynamic tree structure-proliferation system routing and resource-search algorithms and simulated these algorithms. Test results show the performance of the proposed network model and the algorithms are very stable.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A continued increase in computing power, sensor capability, software functionality, immersive interfaces and hardware modularity has given robot designers seemingly endless potential in the area of mobile robotics.  While some mobile robotic system designers are focusing on expensive, full-featured platforms, developers are realising the advantages of emerging technology in providing small, low-cost mobile reconnaissance vehicles as expendable teleoperated robotic systems.  The OzBotTM mobile reconnaissance platform presents one such system.  The design objectives of the OzBotTM platform focus on the development of inexpensive, lightweight carry-case sized robots for search and rescue operations, law enforcement scenarios and hazardous environment inspection.  The incorporation of Haptic augmentation provides the teleoperator with improved task immersion for an outdoor search and rescue scenario.  Achieved in cooperation with law enforcement agencies within Australia, this paper discusses the performance of the first four revisions of the OzBotTM platform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The market research environment is transforming rapidly and research suppliers may not be keeping up with changing research client needs. This paper examines research client perceptions of current research supplier performance and future competencies. The key findings are that research suppliers need to move their staffing profiles beyond technical expertise in conducting research (generating outputs) to functional expertise in understanding research outcomes within internal and external organizational contexts. The transition from data collector to expert advisor may involve anew business model and new pricing strategies based on intellectual expertise rather than margins on data collection services.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I. The Evolution of International Criminal Law International criminal justice concerns breaches of international rules entailing the personal criminal liability of individuals (as opposed to the State for which the individuals may act as agents or organs), and presently includes acts such as genocide, torture, crimes against humanity, aggression and terrorism. ... A rule stating: any act of armed conflict which directly causes the death of a civilian is a war crime unless it can be shown that the military advantage gained by the attack outweighs the harm. ... Thus, so far as international criminal law is concerned any act during armed conflict which results in the death or injury to a person who does not pose a direct threat to the life of the accused should be a war crime. ... Pursuant to the Rome Statute and as a matter of customary international law torture is a war crime when performed in the context of an armed conflict, and a crime against humanity when it is part of systematic criminal conduct. ... Torture can also constitute an individual international crime, even where it does not satisfy the criteria of a war crime or crime against humanity. ...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents and empirical study in which we examine the process of preserential attachment as it applies to business enterprises on the World Wide Web.  Using randomly selected business Web pages as nodes and their inbound links as edges, we explre the role of parked domain names in link creation and preferential attachment at very granular levels.  Our research leads us to the conclusion that the abundance of parked domain name sites does not present a plausible explanation for preferential attachment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper analyzes corruption as a collusive act which requires the participation of two willing partners. An agent intending to engage in a corrupt act must search for a like-minded partner. When many people in the economy are corrupt, such a search is more likely to be fruitful. Thus when an agent engages in a search, he raises the net benefit of searching for other similar agents in the economy, creating an externality. This introduces a non-convexity in the model, which consequently has multiple equilibria. The economy can be in stable equilibrium with a high or low level of corruption.

Starting from the high-corruption equilibrium, a sufficient increase in vigilance triggers a negative cascade, leading the economy to a new equilibrium in which no agent finds it profitable to search for corrupt partners. The no-corruption equilibrium continues to be stable if vigilance is then relaxed. This suggests that the correct way to deal with corruption is to launch a ``big push'' with large amounts of resources. Once the level of corruption declines, these resources can be withdrawn.