Search results

Jump to: navigation, search

Page title matches

Page text matches

  • Dependability modelling and dynamic management policies
    7 KB (960 words) - 17:48, 14 October 2008
  • * › Spectrum Policies and Coexistence * › User Policies and Procedures
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...ccessibility subjects have been integrated into governmental technological policies; industry is now fully aware of the importance of user-centered design prac
    3 KB (502 words) - 22:53, 14 October 2008
  • ...�?�Priorities, perspectives, strategies in national and international policies for LRs
    6 KB (791 words) - 23:02, 14 October 2008
  • In accordance with JBI's editorial policies, we are soliciting full-length article submissions that present and evaluat
    5 KB (655 words) - 23:06, 14 October 2008
  • * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • - Legal policies of non-functional properties: * Legal policies and non-functional system properties
    7 KB (791 words) - 23:09, 14 October 2008
  • - Rule-based Approaches to Web Service Policies and Choreographies
    6 KB (837 words) - 23:09, 14 October 2008
  • § Security Policies
    3 KB (305 words) - 08:44, 31 July 2020
  • techniques and policies, and brainstorm future research directions on Privacy and security policies and social impact of data mining
    7 KB (908 words) - 23:10, 14 October 2008
  • ...traffic engineering, scheduling and queue management, standardisation and policies.
    7 KB (981 words) - 03:18, 6 January 2009
  • 5 .55 Strategies, Policies and Legal Matters
    2 KB (250 words) - 23:12, 14 October 2008
  • o Spectrum policies and open spectrum
    9 KB (1,117 words) - 23:12, 14 October 2008
  • * Representing policies in XML, RDF, and OWL * Formal semantics of policies
    5 KB (667 words) - 23:13, 14 October 2008
  • · Security requirements and policies
    5 KB (615 words) - 09:55, 29 May 2016
  • * Implementation, deployment and management of network security policies.
    5 KB (673 words) - 23:19, 14 October 2008
  • * Service Level Agreements, Policies, Contracts and their relation to business models * Compliance to Business Policies
    2 KB (285 words) - 23:22, 14 October 2008
  • ...ed on the conference website in due course. Authors must follow all CVPR09 policies described in the submission instructions, which include limits on dual subm
    3 KB (377 words) - 08:52, 17 October 2018
  • - COMPOSITION OF POLICIES AND SERVICES: composition of system layers of performance policies and techniques for adaptive or
    6 KB (707 words) - 23:29, 14 October 2008
  • - Policies and algorithms for single and multi-resource reconfiguration
    7 KB (851 words) - 23:30, 14 October 2008
  • * Governmental policies affecting coordinated, joint international development of aerospace MNT
    8 KB (999 words) - 23:30, 14 October 2008
  • ...f services, context sensitive long-lasting transactions, effecting service policies and quality levels, etc. Complex applications could become realizable with
    10 KB (1,391 words) - 23:31, 14 October 2008
  • -Virtual economies and economic policies
    3 KB (391 words) - 23:36, 14 October 2008
  • * security policies * privacy policies
    5 KB (587 words) - 23:37, 14 October 2008
  • * description of contracts and negotiation policies
    8 KB (840 words) - 23:38, 14 October 2008
  • ...high degree of confidence. Technical and experience papers on algorithms, policies, middleware, tools, and models for high assurance systems development, veri * Policies for reliability, safety, security, integrity, privacy, and confidentiality
    6 KB (748 words) - 14:43, 27 December 2015
  • Energy Policies
    8 KB (1,082 words) - 23:40, 14 October 2008
  • ...ation and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes
    3 KB (420 words) - 23:42, 14 October 2008
  • - Legal policies and social issues related to the information economy
    3 KB (483 words) - 15:10, 18 May 2011
  • ...SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces
    13 KB (1,617 words) - 19:03, 24 November 2008
  • - short-run and short-term financial management policies and decisions; - small business financial decisions and policies;
    1 KB (162 words) - 22:15, 11 December 2008
  • * Policies and Standards (Military and Commercial)
    5 KB (526 words) - 01:02, 2 February 2009
  • * Security ontology, models, protocols & policies * Security ontology, models, protocols & policies
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - time-dependent security policies
    6 KB (872 words) - 13:00, 18 January 2009
  • * Deployment and management of computer/network security policies * DRM issues and policies
    14 KB (1,518 words) - 13:01, 18 January 2009
  • paper submission, publication and presentation policies. Namely, authors confirm that the work is
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...hnology concerning the identification of risks, the definition of security policies, and the development of security measures for UC. In UC-Sec 09, we plan to
    6 KB (852 words) - 13:02, 18 January 2009
  • ...t guarantees - why are several countries now turning to Job Guarantee-type policies to combat poverty and unemployment? What are the lessons for Australia?
    3 KB (386 words) - 16:33, 27 February 2009
  • * Privacy Policies and Laws
    2 KB (229 words) - 16:33, 27 February 2009
  • • Environmental policies
    4 KB (509 words) - 22:12, 27 February 2009
  • ...lt the UIST 2009 Author's Guide for information on paper format and UIST's policies on previous and simultaneous publications. ...lt the UIST 2009 Author's Guide for information on paper format and UIST's policies on previous and simultaneous publications.
    10 KB (1,457 words) - 09:53, 25 February 2020
  • * Specification, execution and management of rule-based policies and
    7 KB (883 words) - 17:06, 27 February 2009
  • _ IQ Policies and Standards
    5 KB (690 words) - 17:07, 27 February 2009
  • * Testing the efficiency of adaptive policies and components
    6 KB (817 words) - 17:08, 27 February 2009
  • Privacy concerns the operational policies, procedures and regulations implemented within an information system to con - privacy and emergency management policies and technologies
    12 KB (1,690 words) - 17:08, 27 February 2009
  • ...ystems must be able to interoperate securely when they respective security policies are heterogeneous and possibly conflicting. They must be able to autonomous
    3 KB (480 words) - 17:08, 27 February 2009
  • - trust models and trust management policies
    6 KB (828 words) - 17:08, 27 February 2009
  • ...ors. In particular, authors must be aware of and conform to acceptable use policies for individual domains that are probed or monitored, data privacy and anony
    6 KB (774 words) - 17:08, 27 February 2009
  • ...on =20 rights as per goals that are set as well as activating measures and policies that enable continuous assessment. Implementing governance in software =20 ...onment support for software development governance; Governance mechanisms (policies, controls and measurements) that =20 relate to contemporary software develo
    4 KB (593 words) - 22:54, 23 March 2009
  • ...studies on innovative technology-based learning strategies, institutional policies on computer supported education including open and distance education, usin 6. Quality, Evaluation and Accreditation Policies
    5 KB (661 words) - 15:49, 8 December 2009
  • |Title=1st International Congress on Urban and Environmental Issues and Policies ...ttend the 1th International Congress on Urban and Environmental Issues and Policies will be held on June 3-5, 2010 in Trabzon, Turkey.
    1 KB (149 words) - 13:44, 4 July 2009
  • * The relationship of SLAs and IT operational policies.
    8 KB (1,033 words) - 11:35, 2 August 2009
  • ...SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces
    6 KB (746 words) - 11:35, 2 August 2009
  • Service level agreements/ Policies/ Contracts and negotiation
    4 KB (586 words) - 11:35, 2 August 2009
  • ...existing technology to produce renewable energy; how to design government policies and international treaties to bring greenhouse gas emissions under control) + developing information systems to support urban planning, transport policies, green buildings, etc.;
    7 KB (992 words) - 11:44, 2 August 2009
  • - HLT related policies,
    14 KB (1,872 words) - 19:26, 2 August 2009
  • policies for LRs
    6 KB (849 words) - 11:36, 2 August 2009
  • ...tion in knowledge management; Trust planning and evaluation metrics; Trust policies; Self-adaptable trust mechanisms; Identity Management in pervasive environm ...CAD, IP, trade secrets, etc.); Interorganizational System (IOS); Retention Policies and Classification; Traceability, Monitoring, tracking, usage metering, aud
    14 KB (1,651 words) - 15:56, 15 February 2017
  • -Implementation, deployment and management of network security policies
    6 KB (766 words) - 10:54, 26 April 2010
  • '''Strategies, Policies and Economics of mBusiness''' ...egies that create a competitive advantage for mobile firms; and (3) public policies that facilitate and regulate market exchange in mobile markets.
    2 KB (265 words) - 07:51, 20 October 2009
  • policies for managing of virtual resources
    5 KB (718 words) - 13:46, 26 February 2010
  • - Security Policies
    7 KB (982 words) - 19:13, 3 January 2010
  • * Security ontology, models, protocols & policies * Security ontology, models, protocols & policies
    10 KB (1,270 words) - 17:12, 20 April 2010
  • * › Spectrum Policies and Open Spectrum
    4 KB (379 words) - 15:35, 5 February 2010
  • * › Organizational Security Policies and Responsability
    4 KB (409 words) - 15:40, 5 February 2010
  • • Information systems security policies<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • *Information systems security policies
    9 KB (1,092 words) - 09:35, 1 August 2019
  • ...nd challenges for European and national research on gender and science and policies towards gender equality in science. ...ent countries and country groups. Evaluations of mainstreaming actions and policies against the
    9 KB (1,397 words) - 16:46, 8 March 2010
  • * Security and privacy policies
    4 KB (490 words) - 14:42, 6 November 2020
  • ...studies on innovative technology-based learning strategies, institutional policies on computer supported education including open and distance education, usin 5. QUALITY, EVALUATION AND ACCREDITATION POLICIES
    5 KB (532 words) - 12:25, 16 June 2010
  • ...dlines last year and included changes to the review process and submission policies. Detailed information is available at USENIX Security Publication Model Cha
    3 KB (343 words) - 16:31, 6 May 2020
  • * National and regional policies on entrepreneurship and innovation * International cooperation and national innovation policies to face global challenges
    3 KB (400 words) - 11:24, 22 November 2010
  • ...ty. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enfo • Security in wireless PANs (Bluetooth and IEEE 802. • Security policies
    5 KB (609 words) - 17:01, 5 July 2020
  • ...induced, the product of contemporary circumstances, the result of specific policies of particular administrations, or some combination of other factors? What a
    4 KB (625 words) - 19:14, 14 October 2011
  • ..., the theatre and/or the literature of corruption, implementation of state policies and corruption, the psychology or philosophy of corruption, corruption duri
    5 KB (676 words) - 16:03, 31 May 2011
  • ...studies on innovative technology-based learning strategies, institutional policies on computer supported education including open and distance education, usin
    4 KB (517 words) - 12:03, 1 July 2011
  • *Policies On Technology-based Education
    11 KB (1,502 words) - 00:42, 30 August 2011
  • ...o be submitted provided that they fulfil the conditions defined by the ACL Policies for Submission, Review and Citation.
    7 KB (995 words) - 21:58, 31 August 2020
  • ...s access; Multimedia communications through cognitive networks; Regulatory policies on spectrum sharing for future broadband networks; Cognitive radio standard
    13 KB (1,580 words) - 19:35, 18 February 2021
  • Security and privacy properties and policies
    4 KB (581 words) - 18:48, 24 February 2020
  • * Reasoning, Rules and Policies
    6 KB (872 words) - 14:00, 22 February 2020
  • ...studies on innovative technology-based learning strategies, institutional policies on computer supported education including open and distance education, usin
    5 KB (671 words) - 18:54, 20 June 2012
  • *Information systems security policies<br>
    5 KB (575 words) - 10:16, 1 August 2019
  • - Carbon management policies and ecology- related issues with ICT
    4 KB (491 words) - 22:39, 28 August 2012
  • - Situating ICTs in development policies and strategies
    5 KB (702 words) - 10:02, 5 March 2013
  • * Semantic Rules, Policies & Licensing
    10 KB (1,347 words) - 15:01, 26 September 2016
  • |Field=energy markets, market design, regulatory policies, climate change
    416 bytes (53 words) - 15:35, 27 August 2016
  • ...mission, distribut, energy generation and storage, management and control, policies
    456 bytes (54 words) - 15:09, 17 August 2016
  • ...ean Energy - Wastewater Treatment and Management - Water Economics - Water Policies and Legislations ...ity and Ecosystem - Desertification - Environmental Ethics - Environmental Policies & Legislation - Environmental Management System - Humans-Environment Intera
    5 KB (631 words) - 12:04, 28 November 2016
  • ...allel data processing; Encrypted query processing; Enforcement of data use policies; Big Data industrial systems; Condensed representation; Temporal graphs; Gr
    10 KB (1,305 words) - 00:29, 12 December 2020
  • ...dies on innovative technology-based learning strategies, and institutional policies on computer supported education including open and distance education. CSED
    2 KB (236 words) - 18:22, 24 February 2020
  • ...and bringing about social cohesion. By creating and implementing coherent policies that are holistic and humanistic in nature, societies can be more inclusive
    2 KB (306 words) - 03:52, 8 December 2016
  • Public Policies and Global Issues
    3 KB (504 words) - 05:01, 12 December 2016
  • ...s, fostering connections between groups of researchers, informing research policies, analysing and interlinking experiments and deriving new knowledge;
    8 KB (1,086 words) - 13:37, 11 January 2017
  • * Data/Information Quality and Policies
    5 KB (701 words) - 10:48, 6 August 2017
  • ...sources. Additionally, ANAPSID operators implement main memory replacement policies to move previously computed matches to secondary memory avoiding duplicates
    7 KB (1,018 words) - 21:53, 11 July 2018
  • goals into system-level privacy policies, administration of
    7 KB (887 words) - 15:22, 15 July 2017
  • * Security and Privacy Policies
    4 KB (597 words) - 13:28, 28 July 2017
  • *Semantic Rules, Policies & Licensing
    6 KB (759 words) - 15:52, 5 December 2018
  • -Synchronisation of policies from different legal domains
    7 KB (901 words) - 11:13, 16 July 2017
  • Application-layer security policies Enforcement-layer security policies
    6 KB (807 words) - 13:40, 3 September 2017
  • Policies of e-government
    5 KB (673 words) - 09:53, 3 September 2017
  • - Adaptive policies for managing different participant profiles
    3 KB (407 words) - 11:52, 8 August 2017
  • ideologies. Politicians and bureaucrats devise and implement policies to effect
    6 KB (928 words) - 20:11, 12 November 2020
  • According to IEEE Publication Policies, IEEE assures wide distribution of
    6 KB (814 words) - 09:03, 3 September 2017
  • * Standards and Policies for Data Management
    5 KB (654 words) - 09:58, 21 August 2017
  • how to define new privacy policies that allow desirable services; and how to make sure that privacy policies issued by government and industry are not
    4 KB (532 words) - 13:24, 28 July 2017
  • learning strategies, institutional policies on computer supported education
    5 KB (724 words) - 18:04, 10 February 2021
  • about these policies, please contact the chairs.
    4 KB (565 words) - 17:27, 18 February 2021
  • ...elations Review Special Issue on European Union and Challenges of Cultural Policies: Critical Perspectives Special issue on ‘European Union and Challenges of Cultural Policies: Critical
    7 KB (1,044 words) - 18:35, 10 February 2021
  • Environmental policies and planning
    5 KB (663 words) - 11:54, 3 September 2017
  • ...red and which is not currently under review elsewhere. Please see the IEEE policies for further information.
    5 KB (645 words) - 23:45, 15 December 2017
  • ...s, fostering connections between groups of researchers, informing research policies, analysing and interlinking experiments and deriving new knowledge;
    17 KB (2,523 words) - 22:04, 21 December 2017
  • Priorities, perspectives, strategies in national and international policies for LRs
    5 KB (676 words) - 02:52, 1 January 2018
  • *Semantic Rules, Policies & Licensing
    11 KB (1,487 words) - 13:45, 13 May 2019
  • * Legal and social policies to govern EDM.
    4 KB (486 words) - 11:39, 17 April 2020
  • * Legal and social policies to govern EDM.
    2 KB (246 words) - 11:47, 17 April 2020
  • - Security and privacy policies
    5 KB (690 words) - 12:02, 26 March 2020
  • ...balancing; Application streaming; Cloud SLAs, business models and pricing policies; Custom platforms; Large-scale compute infrastructures; Managing applicatio
    16 KB (1,897 words) - 12:31, 18 May 2020
  • ...t Measurement; Privacy and security; Trust and reputation; Access control; Policies and policy languages
    11 KB (1,390 words) - 12:35, 18 May 2020
  • * Implications of open policies for governments * Implementation of open policies
    6 KB (748 words) - 10:02, 30 April 2020
  • contracts, negotiation policies
    8 KB (1,092 words) - 12:49, 22 April 2020
  • ...manned swarms, network-controlled swarms, as well as challenges related to policies, procedures, regulations, safety, risk analysis assessment, airworthiness,
    3 KB (385 words) - 15:55, 29 April 2020
  • ...right permissions are directly compatible with NIH and similar open-access policies, see authors.acm.org/main.html for more information). A subset of selected
    3 KB (402 words) - 22:55, 2 February 2021
  • ...right permissions are directly compatible with NIH and similar open-access policies, see authors.acm.org/main.html for more information). A subset of selected
    3 KB (421 words) - 22:54, 2 February 2021
  • * 14. Govt. Plans, Policies & Education - High Level Panels
    3 KB (339 words) - 14:24, 4 May 2020
  • * Information policies
    8 KB (1,096 words) - 11:36, 3 August 2020
  • * Privacy and protection standards and policies
    4 KB (515 words) - 16:39, 25 May 2020
  • ...tronically via the conference's CMT Website. All authors must agree to the policies stipulated below. The submission deadline is Friday November 14th and will
    3 KB (364 words) - 13:42, 23 November 2020
  • * Privacy and protection standards and policies.
    3 KB (308 words) - 16:50, 16 December 2020
  • * Journal finder, publisher copyright and self-archiving policies
    9 KB (1,290 words) - 09:19, 4 June 2020
  • ...tion in knowledge management; Trust planning and evaluation metrics; Trust policies; Self-adaptable trust mechanisms; Identity Management in pervasive environm ...CAD, IP, trade secrets, etc.); Interorganizational System (IOS); Retention Policies and Classification; Traceability, Monitoring, tracking, usage metering, aud
    17 KB (2,088 words) - 12:49, 14 June 2020
  • ...allel data processing; Encrypted query processing; Enforcement of data use policies; Big Data industrial systems; Condensed representation; Temporal graphs; Gr
    11 KB (1,356 words) - 12:56, 14 June 2020
  • ...gration of IPv6; Testbed experiments and measurements; Business models and policies
    8 KB (915 words) - 19:45, 9 July 2020
  • ...s for security and trust, business models in security management, security policies models, security architectures, formal methods for verification and certifi ...management, signaling security, transport layer security; Network security policies: specification, implementation, deployment and management; Security of P2P
    13 KB (1,550 words) - 02:20, 10 July 2020
  • ...Engineering Exercise or a Necessity?; Worldwide IPv6 Adoption - Trends and Policies; IPv6 Programs, from Research to Knowledge Dissemination; IPv6 Technology -
    18 KB (2,036 words) - 02:36, 10 July 2020
  • ...SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces
    15 KB (1,886 words) - 16:16, 25 August 2020
  • ...trends; Data aggregation technologies; Delivery of information governance policies; Tools/systems for automatic document metadata tagging; Dataset harmonizati ...cesses; Human agency and macro conditions for telemedicine and innovation; Policies and practices of electronic health and patient records; Micro and macro rel
    16 KB (2,024 words) - 13:33, 24 August 2020
  • ...tronically via the conference's CMT Website. All authors must agree to the policies stipulated below. The submission deadline is Friday November 6th and will n
    2 KB (288 words) - 11:58, 6 November 2020
  • ...balancing; Application streaming; Cloud SLAs, business models and pricing policies; Custom platforms; Large-scale compute infrastructures; Managing applicatio
    16 KB (1,874 words) - 12:15, 24 November 2020
  • ...tion in knowledge management; Trust planning and evaluation metrics; Trust policies; Self-adaptable trust mechanisms; Identity Management in pervasive environm ...CAD, IP, trade secrets, etc.); Interorganizational System (IOS); Retention Policies and Classification; Traceability, Monitoring, tracking, usage metering, aud
    17 KB (2,035 words) - 14:45, 18 February 2021
  • Testbed experiments and measurements; Business models and policies
    8 KB (1,014 words) - 19:25, 30 November 2020
  • business models in security management, security policies models, security, transport layer security; Network security policies:
    13 KB (1,607 words) - 19:32, 30 November 2020
  • ...balancing; Application streaming; Cloud SLAs; Business models and pricing policies; Cloud service subscription models; Cloud standardized SLA; Cloud-related p ...ting; Applications as pre-packaged virtual machines; Licensing and support policies
    8 KB (964 words) - 18:54, 8 December 2020
  • ....aclweb.org/portal/content/new-policies-submission-review-and-citation ACL Policies for Submission], Review and Citation. Notice that double submission to ACL-
    8 KB (1,134 words) - 18:53, 29 April 2021
  • ...your paper. When all the mandatory fields are filled in, check the Privacy Policies box and click the Add Person button.
    6 KB (804 words) - 11:42, 28 January 2021
  • ...balancing; Application streaming; Cloud SLAs, business models and pricing policies; Custom platforms; Large-scale compute infrastructures; Managing applicatio
    16 KB (1,874 words) - 14:47, 10 February 2021
  • * • Security Policies
    2 KB (197 words) - 17:40, 11 February 2021
  • ...balancing; Application streaming; Cloud SLAs, business models and pricing policies; Custom platforms; Large-scale compute infrastructures; Managing applicatio
    16 KB (1,956 words) - 11:50, 3 March 2021
  • Energy Policies and Regulation
    2 KB (289 words) - 08:12, 9 April 2021
  • Energy Policies and Regulation
    1 KB (139 words) - 04:36, 13 April 2021
  • Policies and Strategies for RESSs
    2 KB (258 words) - 04:42, 13 April 2021
  • ...onal trans-continental travel restrictions or due to organizational travel policies.
    5 KB (680 words) - 16:29, 28 October 2021