Showing 101 - 120 results of 128 for search '"perimeter"', query time: 0.11s Refine Results
  1. 101
  2. 102
    by Caldwell, John Dean, 1940-
    Published 2019
    Table of Contents: “…Battle of Britain: winning by not losing -- Battle of the Atlantic: protecting the maritime lifeline -- Invasion of Russia: Hitler's strategic mistake -- Battle of El Alamein and operation torch: cracking German invincibility -- Battles of Midway and Guadalcanal: regaining initiative in the Pacific -- Strategic bombing offensive: breaking German airpower -- Invasion of Italy: deciding to fight somewhere in Europe in 1943 -- D-Day and Battle for Normandy: retaking the Continent -- Battle for the Rhine: attacking Germany's vitals -- Battle of Okinawa and the bombing of Japan: ending the war -- The strategic architectures of World War II -- Battle of the Pusan perimeter: getting the most out of a bad situation -- Inchon: Operation Chromite: MacArthur's masterstroke -- Crossing the 38th parallel and driving north to the Yalu: the risks of overreaching -- Operations Ripper and Killer: recovery and frustration -- The strategic architectures of the Korean War -- Battle of Ia Drang Valley: not fighting the decisive battle -- Bombing campaign and high-tech initiatives: Operations Rolling Thunder and Igloo White: airpower and technology indecisive -- The Pacification program (1967-1968): failing to change behavior -- The Tet Offensive (1968): strategic disaster -- Vietnamization: never a winning strategy -- The final years (1969-1975): the losing path -- The strategic architectures of the VIetnam War -- Iraqi War I, Persian Gulf War: defeating Saddam, losing politically -- Iraqi War II, 13-year air conflict: the limits of airpower -- Iraqi War III, invasion of Iraq: winning without an endgame -- Iraqi War IV, the insurgency and the surge (2007-2008): relearning counterinsurgency -- Iraqi War V, the rise of ISIS: a new, more violent enemy -- The strategic architectures of the Iraqi Wars.…”
    Book
  3. 103
    by Bamberger, Honi Joyce
    Published 2010
    Table of Contents: “…Reading an analog clock -- Determining the value of coins -- Units versus numbers -- Distinguishing between area and perimeter -- Overgeneralizing base-ten renaming -- 5. …”
    Book
  4. 104
    by Peake, Jak
    Published 2017
    Table of Contents: “…Peeping Through the Partition (1927-1936)Modernist Visions, Porous Barrack-Yard Boundaries; Privacy, Private Property and Rent; The Gynocentric Yard; Dangerous Transgressions; Resisting Patriarchy and Colonialism ; Dark Thresholds in the Colonial House (1934); Setting Boundaries, Crossing Borders ; Policing the Perimeter ; Playing House in the Community; Challenge from the South (1935-1945); Oil, Possession, Labour and the Yankee Dollar; Oil; Possession; Labour; The Yankee Dollar ; The Sub-Urban Expansion (1940s-1950s); Views of the Port, City and Country.…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  5. 105
    by Williams, Phillip B.
    Published 2024
    Book
  6. 106
    Published 2015
    View this video online
    Electronic Video
  7. 107
    Published 2015
    Table of Contents: “…MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data.…”
    Connect to this title online
    Electronic eBook
  8. 108
    Published 2015
    View this video online
    Electronic Video
  9. 109
  10. 110
    Published 2007
    Table of Contents: “…Walls -- Third quarter : shooting from the perimeter -- The dao of hoops / Dirk Dunbar -- Hoop dreams, blacktop realities : basketball's role in the social construction of black manhood / Bernard Jackson Jr. -- She got game : basketball and the perfectly developed woman / Deborah A. …”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  11. 111
    by Bowers, William T.
    Published 2015
    Table of Contents: “…War Comes to Korea: The First Six Months; South Korea and American Policy; The United States Responds; First Battle; The Retreat Continues; The Pusan Perimeter; Inch'on and the Collapse of North Korea; The Chinese Attack; The New War; 2. …”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  12. 112
    by Grapard, Allan G.
    Published 2016
    Table of Contents: “…Geotyped and Chronotyped Social Spaces -- Hachiman's traveling icons -- Mount Hiko: of swords, meteors, dragons, and goshawks -- Waiting for dawn on Mount Hiko: the geotype and chronotype of heterotopia -- Mount Hiko's Sacred Perimeter: four corners and three dimensions -- Altitude and altered states of mind: creating a Dojo -- Mandala templates: divine planning -- Geotyped and chronotyped, encoded, mandalized bodies -- The visionary imperative3. …”
    Connect to this title online
    Electronic eBook
  13. 113
    Published 2017
    Table of Contents: “…1 Rate of convergence for eigenfunctions of Aharonov-Bohm operators with a moving pole -- 2  Nondecreasing solutions to doubly nonlinear equations -- 3  Identification problems for degenerate integro-differential equations -- 4  A phase transition model describing auxetic materials -- 5  Global well-posedness for a phase transition model with irreversible evolution and acceleration forces -- 6 Perimeter symmetrization of some dynamic and stationary equations involving the Monge-Ampere operator -- 7 Optimal boundary control of a nonstandard Cahn–Hilliard system with dynamic boundary condition and double obstacle inclusions -- 8 Nontrivial solutions of quasilinear elliptic equatons with natural growth term -- 9 On a diffuse interface model for tumour growth with non-local interactions and degenerate mobilities -- 10 A boundary control problem for the equation and dynamic boundary condition of Cahn–Hilliard type -- 11  New class of doubly nonlinear evolution equations governed by time-dependent subdifferentials -- 12 Boundedness of solutions to a degenerate diffusion equation -- 13 Optimal a priori error estimates of parabolic optimal control problems with a moving point control -- 14 A note on the feedback stabilization of a Cahn–Hilliard type system with a singular logarithmic potential -- 15 Mathematical analysis of a parabolic-elliptic model for brain lactate kinetics -- 16 Weak formulation for singular diffusion equation with dynamic boundary condition -- 17 Smooth and broken minimizers of some free discontinuity problems -- 18 Stability results for abstract evolution equations with intermittent time-delay feedback -- 19 From visco-energetic to energetic and balanced viscosity solutions of rate-independent systems -- 20 A duality approach in some boundary value problems -- 21 On the structural properties of nonlinear flows.…”
    Connect to this title online
    Electronic eBook
  14. 114
  15. 115
    Published 2018
    Table of Contents: “….; Figure 13 The wagon on which the statue of Shiva is carried around the perimeter of the temple; Madurai, Tamil Nadu.; Chapter 2; Figure 1 Triciput of the Ages of Man, Inv. no. 73/1, Bavarian National Museum, Munich.; Chapter 3…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  16. 116
    by Tyers, Ben
    Published 2017
    Table of Contents: “…1 Maths Bar Graph -- 2 Clickable & Moveable Object -- 3 Room Fade In & Out Transition -- 4 Typewriter Text Effect -- 5 Audio Volume Change Based On Distance -- 6 Move Object To Position Using Path 11 -- 7 Make The Screen Shake 13- 8 Create Snow Effect -- 9 Password Easter Egg -- 10 Follow Two Objects In View -- 11 High / Low Number Game -- 12 Calculate Average Position Of Two Clicks -- 13 Retrieve Text File Web From & Save Locally -- 14 Shuffle Pack Of Playing Cards & Deal -- 15 Reverse Sentence Order -- 16 Rotate & Move Object To Mouse Position -- 17 Firework Display Using Effects -- 18 Random Sentence Generator -- 19 Pop Up RPG Style Text Box -- 20 Room Wrapping -- 21 Sprite Shadow -- 22 Make A Jukebox Player For 4 Songs -- 23 Scrolling Credits -- 24 Random Dice Roller -- 25 Substitution Cipher -- 26 Save Highscore To INI -- 27 Spawn Point -- 28 Dictionary Check -- 29 Draw Text With Shadow -- 30 Classic Brick & Ball Game Remake -- 31 Fire Projectile -- 32 World Clock -- 33 Text Based Quiz -- 34 On Screen Keyboard -- 35 Create A Driveable Tank That Leaves Tyre Tracks -- 36 Parallax Background -- 37 Click The Ghost -- 38 Particle Fire Effect -- 39 Bubble Sort -- 40 Unlockable Levels Select Screen -- 41 Moon Lander AI -- 42 Dodge The Barrels -- 43 Convert Celsius To Fahrenheit -- 44 Find Path To Position Avoiding Objects -- 45 Calculate BMI -- 46 Shuffle Pack Of Playing Cards & Save To Text -- 47 10 Green Bottles -- 48 English To Morse Code -- 49 Blitz Game Remake -- 50 Mini Golf Game Remake -- 51 Rock, Paper, Scissors Game Remake -- 52 Health Based On Distance -- 53 Tank Trax Game Remake -- 54 Two Separate Views -- 55 Word Typing Game -- 56 Destructible Terrain -- 57 Duck Hunt Game Remake -- 58 Keep Player In View -- 59 Fizz Buzz -- 60 Calculate Numbers -- 61 Particle Trail Effect -- 62 Draw Rectangle and Calculate Area & Perimeter -- 63 Random Terrain Generation -- 64 Drop The Coin (arcade style) -- 65 Calculate the Nth Result Of Fibonacci Sequence -- 66 Distance From Object To Mouse -- 67 Convert Decimal To Binary, Oct, Hex & Roman -- 68 Text In X Box -- 69 Frogger Game Remake -- 70 Take a Screen Shot -- 71 Slowly Move Direction -- 72 Pong Style Game Remake -- 73 Shooting Gallery -- 74 How Many Of Each Letter -- 75 Torpedo Game Remake -- 76 One Hundred Random Numbers -- 77 Coin Flip -- 78 Predict Path Of An Object -- 79 Dynamic Button -- 80 Sokoban Game Remake -- 81 Top Down Football -- 82 Top Down Racing -- 83 Convert Numbers (in digits) To Words -- 84 Zelda Style Views -- 85 Convert Text File To eBook -- 86 Planets Database (INI) -- 87 How Much Flour -- 88 Rotating Mini Map -- 89 Selectable Troops -- 90 Pipes -- 91 Arcade Style Horse Race Game -- 92 Road Builder -- 93 Chess Board Representation -- 94 1942 Game Remake -- 95 Create A Virtual ATM (bank teller) -- 96 Moon Lander Game Remake -- 97 Pixelate An Image -- 98 Miner -- 99 Follow Player (Ghost) -- 100 Multiplication Table -- Appendix A: Points Chart.…”
    Connect to this title online
    Electronic eBook
  17. 117
    by Mehan, Julie E.
    Published 2014
    Table of Contents: “…; Social Media -- an opportunity and a challenge; Supply Chain (In- ) security; The blended threat; The asymmetric effects of cyber attacks; Porous perimeters, compromisable software -- or both?…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  18. 118
    Published 2011
    Table of Contents: “…Why executive pay matters to innovation and inequality / William Lazonick -- 19. Products, perimeters and politics : systemic risk and securities regulation / Mary Condon -- 20. …”
    Book
  19. 119
    by Fisher, Peter F., 1955-
    Published 2005
    Table of Contents: “…Plenary of Submitted Papers -- About Invalid, Valid and Clean Polygons -- 3D Geographic Visualization: The Marine GIS -- Local Knowledge Doesn’t Grow on Trees: Community-Integrated Geographic Information Systems and Rural Community Self-Definition -- Web GIS -- A Flexible Competitive Neural Network for Eliciting User’s Preferences in Web Urban Spaces -- Combining Heterogeneous Spatial Data From Distributed Sources -- Security for GIS N-tier Architecture -- Progressive Transmission of Vector Data Based on Changes Accumulation Model -- Elevation modelling -- An Efficient Natural Neighbour Interpolation Algorithm for Geoscientific Modelling -- Evaluating Methods for Interpolating Continuous Surfaces from Irregular Data: a Case Study -- Contour Smoothing Based on Weighted Smoothing Splines -- Flooding Triangulated Terrain -- Vagueness and Interpolation -- Vague Topological Predicates for Crisp Regions through Metric Refinements -- Fuzzy Modeling of Sparse Data -- Handling Spatial Data Uncertainty Using a Fuzzy Geostatistical Approach for Modelling Methane Emissions at the Island of Java -- Temporal -- A Visualization Environment for the Space-Time-Cube -- Finding REMO — Detecting Relative Motion Patterns in Geospatial Lifelines -- Indexing -- Spatial Hoarding: A Hoarding Strategy for Location-Dependent Systems -- Distributed Ranking Methods for Geographic Information Retrieval -- Representing Topological Relationships between Complex Regions by F-Histograms -- The Po-tree: a Real-time Spatiotemporal Data Indexing Structure -- Uncertainty -- Empirical Study on Location Indeterminacy of Localities -- Registration of Remote Sensing Image with Measurement Errors and Error Propagation -- Double Vagueness: Effect of Scale on the Modelling of Fuzzy Spatial Objects -- Area, Perimeter and Shape of Fuzzy Geographical Entities -- Generalisation -- Why and How Evaluating Generalised Data ? …”
    Connect to this title online
    Electronic eBook
  20. 120