Hidden

Results: 5368



#Item
821

Addressing the Document Disconnect Hidden Opportunity, Big Payoff An IDC White Paper, Sponsored by Adobe Melissa Webster, March 2015

Add to Reading List

Source URL: acrobat.adobe.com

Language: English - Date: 2016-04-06 13:56:31
    822Physics / Optics / Academia / Emerging technologies / Ad Lagendijk / Photonics / Nanotechnology / Laser / Transparency and translucency / University of Twente / Scattering / Diffuser

    Prestigious publication by nanotechnology group from the Netherlands Looking through an opaque material A team of researchers from the Netherlands and Italy has succeeded in making sharp pictures of objects hidden behin

    Add to Reading List

    Source URL: www.jacopobertolotti.com

    Language: English - Date: 2012-11-12 11:05:47
    823Quantum measurement / Quantum mechanics / Interpretations of quantum mechanics / De BroglieBohm theory / Wave function / Quantum non-equilibrium / Mathematical formulation of quantum mechanics / Equations of motion / Electron / Wave / Laws of science / Hidden variable theory

    Reality and the Role of the Wavefunction in Quantum Theory Sheldon Goldstein∗ and Nino Zangh`ı† January 21, 2011 Abstract The most puzzling issue in the foundations of quantum mechanics

    Add to Reading List

    Source URL: math.rutgers.edu

    Language: English - Date: 2011-01-24 10:52:42
    824Computer graphics / 3D rendering / Shading / Imaging / Shadow mapping / Texture mapping / Rendering / Z-buffering / Wavefront .obj file / Hidden surface determination / Shader / Shadow volume

    CSM Scrolling: An acceleration technique for the rendering of cascaded shadow maps Abstract This talk will explain how a bitmap-scrolling technique can be combined with a shadow map caching scheme to significantly increa

    Add to Reading List

    Source URL: d3cw3dd2w32x2b.cloudfront.net

    Language: English - Date: 2012-08-07 18:53:08
    825

    DATASHEET SQRRL ENTERPRISE USE CASE: CYBER HUNTING Proactively uncover hidden threats through cyber hunting The days when Security Operations Center analysts could sit back and wait for alerts to come to them have long

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-02-15 14:44:42
      826Tor / Internet protocols / Internet Standards / Network architecture / TorChat / .onion / Transmission Control Protocol / Clientserver model

      Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Albert Kwon† , Mashael AlSabah‡§†∗, David Lazar† , Marc Dacier‡ , and Srinivas Devadas† † Massachusetts Institute of Techno

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English - Date: 2015-07-06 18:09:43
      827

      The Misunderstood Child [A poem about children with hidden disabilities] by Kathy Winters by Sensory Planet on Monday, April 11, 2011 at 10:19pm I am the child that looks healthy and fine. I was born with ten fingers and

      Add to Reading List

      Source URL: www.atotalapproach.com

      Language: English - Date: 2015-01-25 14:52:59
        828

        by The Campus League of Puzzlers Solution to Pac Men of the North : Names are hidden in the word search. After finding all the names, the leftover letters give an instruction: GROUP INDEX SORT UC SU WSU OSU UO UW’. The

        Add to Reading List

        Source URL: puzzle.berkeley.edu

        Language: English - Date: 2014-09-16 13:01:02
          829

          Introduction The Hidden Matching game The Khot-Vishnoi game

          Add to Reading List

          Source URL: qip2011.quantumlah.org

          Language: English - Date: 2011-01-11 05:14:56
            UPDATE