>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Users相关记录109条 . 查询时间(0.109 秒)
2023年5月26日下午,“南开旅游大讲堂(第197期)——院长论坛”在学院111多功能厅顺利举行。应南开大学旅游与服务学院邀请,哈尔滨工业大学经济与管理学院副院长张紫琼教授为南开大学旅游与服务学院师生带来了“Smart Users:Effort Management in Earning Rewards”的精彩讲座。南开大学旅游与服务学院院长、青年教师、博士后和硕博研究生等共计50余人参加了此次...
US micro reactor developer Last Energy has announced power purchase agreements for 34 units of its plants with four industrial partners across Poland and the UK. Meanwhile, Finland's Fortum is collabo...
MIT researchers have built an augmented reality headset that gives the wearer X-ray vision.
Smartwatches offer people a private method for getting notifications about their surroundings -- such as a phone call, health alerts or an upcoming package delivery.Now University of Washington resear...
Technology development really reaches its highest point when it becomes a tool to facilitate life to people, especially to those more disadvantaged groups. This is the case of people with disabilities...
Faced with the threats posed by man-in-the-middle attacks, messaging platforms rely on "out-of-band'' authentication, assuming that users have access to an external channel for authenticating one shor...
A new study finds that smartphone apps to track menstrual cycles often disappoint users with a lack of accuracy, assumptions about sexual identity or partners, and an emphasis on pink and flowery form...
Researchers at North Carolina State University have developed a user-friendly, inexpensive controller for manipulating virtual objects in a computer program in three dimensions. The device allows user...
For good or ill, what users do on the web is tracked. Banks track users as an authentication technique, to offer their customers enhanced security protection. Retailers track customers and potential c...
Accessing and manipulating occluded content in layered 2D drawings can be difficult. This paper characterizes a design space of techniques that facilitate access to occluded content. In addition, w...
Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could reveal business secrets...
In this paper, we study the problem of identifying influen-tial users in mobile social networks. Traditional approaches find these users through centralized algorithms on either friendship or social-c...
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates bu...
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity. All...
Several attempts and case studies had been conducted to document the cultural heritage using the 3D Laser scanner in the last few years. Now, it is possible to furnish a virtual model of an object fro...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...