Abstract type

Results: 1261



#Item
551Consultant

The effect of third party consultant type and the nature of role assignment on reporting escalation of commitment Abstract Literature suggests that managers and organizations are prone to continue investment in unprofita

Add to Reading List

Source URL: www2.aaahq.org

Language: English - Date: 2013-04-23 14:22:27
    552

    [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the

    Add to Reading List

    Source URL: countryoffice.unfpa.org

    Language: Bengali - Date: 2014-09-05 01:51:12
      553

      REPLACE THIS SENTENCE WITH THE TITLE OF YOUR ABSTRACT Name A.B.1, Name C.2, Name D.3 1Dept., Institution, City, Country; 2Dept., Institution, City, Country; 3Dept., Institution, City, Country Introduction Type your text

      Add to Reading List

      Source URL: www.worldcongresslbp.com

      - Date: 2015-02-17 07:19:21
        554Java platform / Computing platforms / Memory management / Pointer / Java virtual machine / Java Native Interface / Dynamic random-access memory / Type safety / ECC memory / Computing / Computer memory / Cross-platform software

        Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract

        Add to Reading List

        Source URL: www.cs.princeton.edu

        Language: English - Date: 2003-03-06 09:41:50
        555C++ / C programming language / Data types / Pointer / Type system / Reference / C / Immutable object / ATS / Software engineering / Computer programming / Computing

        ii LCLint User’s Guide Abstract Types 90 ii LCLint User’s Guide Conte

        Add to Reading List

        Source URL: www.splint.org

        Language: English - Date: 2001-12-31 15:18:27
        556Internet standards / Computer file formats / Base64 / MIME / Uuencoding / BinHex / Internet media type / Callback / C / Computing / Email / Usenet

        The UUDeview Decoding Library Frank Pilhofer June 7, 2001 Abstract The UUDeview library is a highly portable set of functions that provide facilities for decoding uuencoded, xxencoded, Base64 and BinHex-Encoded files as

        Add to Reading List

        Source URL: www.miken.com

        Language: English - Date: 2002-02-02 18:28:40
        557Carbonaceous chondrite / Chondrite / Meteorites / Allende meteorite / Astronomy / Fluid dynamics / Fourier transform infrared spectroscopy / Meteorite / C-type asteroid / Meteorite types / Science / Planetary science

        REPLACE THIS SENTENCE WITH THE TITLE OF YOUR ABSTRACT

        Add to Reading List

        Source URL: www.nipr.ac.jp

        Language: English - Date: 2014-11-16 09:41:47
        558C++ / Generic programming / Method / Subroutines / Template / Function overloading / ALGOL 68 / Type signature / C++11 / Software engineering / Computing / Computer programming

        Introduction The design and structure of a program is more clearly understood in terms of abstract data types, such as queues and stacks. A parameterized type, or template, is a linguistic mechanism for implementing an a

        Add to Reading List

        Source URL: www.zhmicro.com

        Language: English - Date: 2015-01-01 22:55:03
        559Type theory / Variables / Subroutine / Stack / Action / Static single assignment form / Software engineering / Computing / Computer programming

        AN AUTHORING TOOLKIT FOR SIMULATION ENTITIES Daniel Fu, Ryan Houlette, and Oscar Bascara Stottler Henke Associates, Inc. San Mateo, California Abstract Instructors and analysts within the military community have noted th

        Add to Reading List

        Source URL: www.stottlerhenke.com

        Language: English - Date: 2002-09-19 01:53:00
        560Computer security / Risk management / Risk assessment / Risk analysis / Information security / Vulnerability / Security risk / Threat / Security / Risk / Management

        Type of submission: paper Title: ROLE-BASED RISK ANALYSIS Abstract: At least two recent developments in information management warrant revisiting risk analysis methodologies. First, an explosive proliferation of networks

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 1997-10-15 01:00:00
        UPDATE