Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Choose an application
High technology --- Congresses --- EEU / Central & Eastern Europe --- SU / Soviet Union - Ussr - Urss --- 338.043 --- Colloque OTAN, Bruxelles, 1985, NATO Colloquium, Brussels. --- NBB congres --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica. --- Conferences - Meetings --- Colloque OTAN, Bruxelles, 1985, NATO Colloquium, Brussels --- Technologische vooruitgang. Automatisering. Computers. Werkgelegenheid en informatica
Choose an application
These papers are taken from a NATO Advanced Research Workshop on ""Overcoming Barriers to Technology Transfer and Business Commercialization in Central & Eastern Europe"". The presentations contain not only theoretical ideas but facts, examples and results, illustrated by figures and tables.
Technological innovations --- Technology transfer --- Innovations --- Transfert de technologie --- Economic aspects --- Congresses --- Aspect économique --- Congrès --- Europe, Eastern --- Europe de l'Est --- Commercial policy --- Politique commerciale --- Technological innovations - Economic aspects - Europe, Eastern - Congresses. --- Aspect économique --- Congrès --- Technological transfer --- Transfer of technology --- Breakthroughs, Technological --- Innovations, Industrial --- Innovations, Technological --- Technical innovations --- Technological breakthroughs --- Technological change --- East Europe --- Eastern Europe --- Diffusion of innovations --- Inventions --- Research, Industrial --- Technology and international relations --- Foreign licensing agreements --- Technological forecasting --- Technology --- Creative ability in technology --- Domestication of technology --- Innovation relay centers --- International cooperation --- E-books --- Congresses.
Choose an application
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. This book is suitable for those interested in understanding the techniques for handling very large data sets and how to apply them in conjunction for solving security issues.
Data mining --- Computer algorithms --- Terrorism --- Terrorism risk assessment --- Prevention --- Data sets --- Security informatics --- NATO
Choose an application
Climate change mitigation --- Climatic changes --- Risk assessment
Listing 1 - 5 of 5 |
Sort by
|