Search Details

Word: formula (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...only does COFHE give Harvard a sense of what its peers are up to, but the University uses the same formula for determining aid as hundreds of other schools in the nation...

Author: By James Y. Stern, CRIMSON STAFF WRITER | Title: The Bidding Games Have Begun... | 1/15/1999 | See Source »

Miller calls the Institutional Methodology (IM), a formula maintained by the College Board in Princeton, N.J., the "foundation" of need determination at Harvard...

Author: By James Y. Stern, CRIMSON STAFF WRITER | Title: The Bidding Games Have Begun... | 1/15/1999 | See Source »

Because their cells naturally produce large quantities of protein, potatoes and tomatoes seem for now to be the most efficient vehicles for the new approach. Instead of mixing viral or bacterial DNA in a formula for injection, for example, scientists could insert it into soil bacteria. When the bacteria are taken up by the plant, therapeutic DNA material is stitched into the plant's genome. Another method of getting genes into plants is to coat tiny particles of tungsten or gold with foreign DNA, then shoot the particles directly into plant cells. Either way, the plant's cells start...

Author: /time Magazine | Title: On the Horizon | 1/11/1999 | See Source »

...used a drop-down election formula--theoutgoing president counted votes for thepresidential election, and the unsuccessfulcandidates could then choose to run for the othertwo positions...

Author: By Erica R. Michelstein, CONTRIBUTING WRITER | Title: HCS Elects First Female President | 12/15/1998 | See Source »

...combat this problem, e-commerce vendors employ a technology known as SSL, or Secure Sockets Layer. SSL allows your personal information to be encrypted via the application of a sophisticated mathematical formula. The encryption process turns your information from a form that is easily understood by any human to a mass of seemingly random gibberish. The intended receiver of the information can then transform the gibberish back into its original form via a decryption process that uses a different set of mathematical formulas...

Author: NO WRITER ATTRIBUTED | Title: Elliot Shmukler's Tech Talk | 12/8/1998 | See Source »

Previous | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | Next