By doing this we can manipulate
light propagation much more effectively," he added.
2] used a force feedback device coupled with an AFM tip to haptically sense and manipulate
carbon nanotubes, DNA and viruses.
A function known as "streaming" lets the leader of the online conference rotate and manipulate
the actual CAD model, while the same movements appear on each remote screen.
And because the data arrives in digital form -- just like other computer data -- future software programs may allow you to manipulate
TV shows as easily as you now cut and paste paragraphs in a word-processing program.
Vance, in a ground-breaking essay, examines the highly effective right-wing campaign to manipulate
and distort public symbols and representations; and lawyer Stephen F.
Tools like DataShaper and PageAhead help to bridge the gap between the database and desktop publishing, but we have a long way to go before we are able to manipulate
data and publish it with ease.
The ability to manipulate
the polymer chain and develop literally thousands of new and application-specific materials has since shown silicones to be a most versatile elastomer.
A New Intuitive Way to Select, Load, Manipulate
and Mix Software Instruments
Researchers are striving to create photonic microcircuits that can manipulate
photons as deftly as today's microchips manipulate
No one has the right to manipulate
legally-above all, its fundamental right to life.
In the second case, another large section iron caster was looking for a more rapid through-cure in its large mold line in order to manipulate
the molds sooner and lower process cost.
That's because you change, or manipulate
, this variable on purpose.
One man, Alfred Taahi, appears to lead and manipulate
the group, drawing its members together or separating them, except for Vernon, who does her own manipulating.
By showing the inept attempts of human beings--be they lawyers or judges, philosophers or rhetoricians--to manipulate
language to their own ends, Perlman makes such enterprises seem absurd though no less insidious.
The patent's claims cover methods and apparatuses to track and manipulate
address resolution traffic to enforce authentication checks prior to allowing access to a local network segment, and to quarantine endpoints that fail the checks.