nanotechnology a gentle introduction to the next big idea, 2002, p 153

nanotechnology. a gentle introduction to the next big idea, 2002, p.153

nanotechnology. a gentle introduction to the next big idea, 2002, p.153

... duality and quantum effects. At the nanoscale, the most fundamental properties of materials and machines depend on their size in a way they don't at any other scale. For example, a nanoscale ... on the nanoscale: they are larger than atoms and smaller than microstructures. Physicists care about the properties of matter, and since properties of matter at the nanoscale ar...

Ngày tải lên: 04/06/2014, 15:19

153 551 0
A Gentle Introduction to the - Spring Framework

A Gentle Introduction to the - Spring Framework

... com.apress.springbook.chapter01.TournamentMatchManager; public class SwingApplication { private TournamentMatchManager tournamentMatchManager; public SwingApplication(TournamentMatchManager tournamentMatchManager) ... com.apress.springbook.chapter01.TournamentMatchManager; import com.apress.springbook.chapter01.DefaultTournamentMatchManager; public class SwingApplication { private TournamentM...

Ngày tải lên: 05/10/2013, 04:20

22 501 1
a concise introduction to the theory of numbers- baker a.

a concise introduction to the theory of numbers- baker a.

... residue class (mod n). It is clear that if a = a& apos; (mod n) and b = b' (mod n) then a + b =3: a& apos;+ b' and a - b =a& apos;- bt(mod n). Further we have ab== a& apos;b' ... theorem states that if a is any natural number and if p is any prime then aP= a (mod p) . In particular, if (a, p) = 1, then up-'= 1 (mod p) . The theorem was...

Ngày tải lên: 31/03/2014, 16:20

54 527 0
A Beginner’s Guide to Network Security: An Introduction to the Key Security Issues for the E-Business Economy doc

A Beginner’s Guide to Network Security: An Introduction to the Key Security Issues for the E-Business Economy doc

... the data that they transport. Virtual Private Networks (VPNs) are analogous to armored cars that carry precious cargo to an assigned drop-off point to ensure secure and confidential passage. ... transmitted. Perpetrators can use various methods to intercept the data. IP spoofing, for example, entails posing as an authorized party in the data transmission by using the Inte...

Ngày tải lên: 14/03/2014, 22:20

9 665 0
A simple introduction to working with LVM

A simple introduction to working with LVM

... create new partitions on the fly, and make better use of your space. In my case I have a laptop with the following setup: Name Flags Part Type FS Type [Label] Size (MB) hda1 Boot Primary ... We'll initialize hda3 as a physical volume: root@lappy:~# pvcreate /dev/hda3 If you wanted to combine several disks, or partitions you could do the same for those: root@lappy:~#...

Ngày tải lên: 18/09/2012, 10:12

7 675 0
Cambridge.University.Press.An.Introduction.to.the.Philosophy.of.Mind.Jan.2000.pdf

Cambridge.University.Press.An.Introduction.to.the.Philosophy.of.Mind.Jan.2000.pdf

... metaphysics. Some people believe that the age of metaphysics is past and that what metaphysicians aspire to achieve is an imposs- ible dream. They claim that it is an illusion to suppose that human beings can ... examina- tion we see that it is logically impossible to change the past, that is, to bring it about that what has happened has not happened. So too, then, we cannot concl...

Ngày tải lên: 21/09/2012, 10:39

333 1,2K 2
w