Search results

Jump to: navigation, search

Page title matches

Page text matches

  • Dependability modelling and dynamic management policies
    7 KB (960 words) - 17:48, 14 October 2008
  • * › Spectrum Policies and Coexistence * › User Policies and Procedures
    9 KB (1,219 words) - 20:05, 14 October 2008
  • ...ccessibility subjects have been integrated into governmental technological policies; industry is now fully aware of the importance of user-centered design prac
    3 KB (502 words) - 22:53, 14 October 2008
  • ...�?�Priorities, perspectives, strategies in national and international policies for LRs
    6 KB (791 words) - 23:02, 14 October 2008
  • In accordance with JBI's editorial policies, we are soliciting full-length article submissions that present and evaluat
    5 KB (655 words) - 23:06, 14 October 2008
  • * Policies, authentication, security, and trust within
    5 KB (709 words) - 23:08, 14 October 2008
  • - Legal policies of non-functional properties: * Legal policies and non-functional system properties
    7 KB (791 words) - 23:09, 14 October 2008
  • - Rule-based Approaches to Web Service Policies and Choreographies
    6 KB (837 words) - 23:09, 14 October 2008
  • § Security Policies
    3 KB (305 words) - 08:44, 31 July 2020
  • techniques and policies, and brainstorm future research directions on Privacy and security policies and social impact of data mining
    7 KB (908 words) - 23:10, 14 October 2008
  • ...traffic engineering, scheduling and queue management, standardisation and policies.
    7 KB (981 words) - 03:18, 6 January 2009
  • 5 .55 Strategies, Policies and Legal Matters
    2 KB (250 words) - 23:12, 14 October 2008
  • o Spectrum policies and open spectrum
    9 KB (1,117 words) - 23:12, 14 October 2008
  • * Representing policies in XML, RDF, and OWL * Formal semantics of policies
    5 KB (667 words) - 23:13, 14 October 2008
  • · Security requirements and policies
    5 KB (615 words) - 09:55, 29 May 2016
  • * Implementation, deployment and management of network security policies.
    5 KB (673 words) - 23:19, 14 October 2008
  • * Service Level Agreements, Policies, Contracts and their relation to business models * Compliance to Business Policies
    2 KB (285 words) - 23:22, 14 October 2008
  • ...ed on the conference website in due course. Authors must follow all CVPR09 policies described in the submission instructions, which include limits on dual subm
    3 KB (377 words) - 08:52, 17 October 2018
  • - COMPOSITION OF POLICIES AND SERVICES: composition of system layers of performance policies and techniques for adaptive or
    6 KB (707 words) - 23:29, 14 October 2008
  • - Policies and algorithms for single and multi-resource reconfiguration
    7 KB (851 words) - 23:30, 14 October 2008
  • * Governmental policies affecting coordinated, joint international development of aerospace MNT
    8 KB (999 words) - 23:30, 14 October 2008
  • ...f services, context sensitive long-lasting transactions, effecting service policies and quality levels, etc. Complex applications could become realizable with
    10 KB (1,391 words) - 23:31, 14 October 2008
  • -Virtual economies and economic policies
    3 KB (391 words) - 23:36, 14 October 2008
  • * security policies * privacy policies
    5 KB (587 words) - 23:37, 14 October 2008
  • * description of contracts and negotiation policies
    8 KB (840 words) - 23:38, 14 October 2008
  • ...high degree of confidence. Technical and experience papers on algorithms, policies, middleware, tools, and models for high assurance systems development, veri * Policies for reliability, safety, security, integrity, privacy, and confidentiality
    6 KB (748 words) - 14:43, 27 December 2015
  • Energy Policies
    8 KB (1,082 words) - 23:40, 14 October 2008
  • ...ation and trust to provide security. Instead of centrally managed security policies, nodes may use specific knowledge (both local and acquired from other nodes
    3 KB (420 words) - 23:42, 14 October 2008
  • - Legal policies and social issues related to the information economy
    3 KB (483 words) - 15:10, 18 May 2011
  • ...SHS; Authentication and authorization in SHS; Access control and security policies in SHS; Trust and reputation management; Security context-based interfaces
    13 KB (1,617 words) - 19:03, 24 November 2008
  • - short-run and short-term financial management policies and decisions; - small business financial decisions and policies;
    1 KB (162 words) - 22:15, 11 December 2008
  • * Policies and Standards (Military and Commercial)
    5 KB (526 words) - 01:02, 2 February 2009
  • * Security ontology, models, protocols & policies * Security ontology, models, protocols & policies
    16 KB (2,178 words) - 12:59, 18 January 2009
  • - time-dependent security policies
    6 KB (872 words) - 13:00, 18 January 2009
  • * Deployment and management of computer/network security policies * DRM issues and policies
    14 KB (1,518 words) - 13:01, 18 January 2009
  • paper submission, publication and presentation policies. Namely, authors confirm that the work is
    10 KB (1,321 words) - 13:01, 18 January 2009
  • ...hnology concerning the identification of risks, the definition of security policies, and the development of security measures for UC. In UC-Sec 09, we plan to
    6 KB (852 words) - 13:02, 18 January 2009
  • ...t guarantees - why are several countries now turning to Job Guarantee-type policies to combat poverty and unemployment? What are the lessons for Australia?
    3 KB (386 words) - 16:33, 27 February 2009
  • * Privacy Policies and Laws
    2 KB (229 words) - 16:33, 27 February 2009
  • • Environmental policies
    4 KB (509 words) - 22:12, 27 February 2009
  • ...lt the UIST 2009 Author's Guide for information on paper format and UIST's policies on previous and simultaneous publications. ...lt the UIST 2009 Author's Guide for information on paper format and UIST's policies on previous and simultaneous publications.
    10 KB (1,457 words) - 09:53, 25 February 2020
  • * Specification, execution and management of rule-based policies and
    7 KB (883 words) - 17:06, 27 February 2009
  • _ IQ Policies and Standards
    5 KB (690 words) - 17:07, 27 February 2009
  • * Testing the efficiency of adaptive policies and components
    6 KB (817 words) - 17:08, 27 February 2009
  • Privacy concerns the operational policies, procedures and regulations implemented within an information system to con - privacy and emergency management policies and technologies
    12 KB (1,690 words) - 17:08, 27 February 2009
  • ...ystems must be able to interoperate securely when they respective security policies are heterogeneous and possibly conflicting. They must be able to autonomous
    3 KB (480 words) - 17:08, 27 February 2009
  • - trust models and trust management policies
    6 KB (828 words) - 17:08, 27 February 2009
  • ...ors. In particular, authors must be aware of and conform to acceptable use policies for individual domains that are probed or monitored, data privacy and anony
    6 KB (774 words) - 17:08, 27 February 2009
  • ...on =20 rights as per goals that are set as well as activating measures and policies that enable continuous assessment. Implementing governance in software =20 ...onment support for software development governance; Governance mechanisms (policies, controls and measurements) that =20 relate to contemporary software develo
    4 KB (593 words) - 22:54, 23 March 2009
  • ...studies on innovative technology-based learning strategies, institutional policies on computer supported education including open and distance education, usin 6. Quality, Evaluation and Accreditation Policies
    5 KB (661 words) - 15:49, 8 December 2009

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)