AS

Results: 435832



#Item
91Information privacy / Privacy law / Data security / Law / Data protection / Europe / General Data Protection Regulation / Data Protection Directive

Data Processing Addendum Futurae Technologies AG V1.0 — Effective as of May 25, 2018 This Data Processing Addendum (“Addendum”) forms part of the master subscription agreement or other similar type agreement pertai

Add to Reading List

Source URL: futurae.com

Language: English - Date: 2018-10-05 05:43:47
92Computational science / Applied mathematics / Modeling and simulation / Scientific modeling / Simulation / Computer simulation / Control theory / Self-driving car / Systems science

Utilizing S-TaLiRo as an Automatic Test Generation Framework for Autonomous Vehicles Cumhur Erkan Tuncali, Theodore P. Pavlic and Georgios Fainekos Abstract— This paper proposes an approach to automatically generating

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2018-02-08 19:28:54
93Economy / Finance / Money / Credit / United States housing bubble / Debt / Financial law / Financial markets / Subordinated debt / Bond / High-yield debt / Corporate bond

Credit Opportunities: Subordinated debt as an alternative to high income strategies Finding attractive income from fixed income assets is one of the greatest challenges in investment management today. Finding it without

Add to Reading List

Source URL: www.fundexpertsforum.com

Language: English - Date: 2018-05-29 09:58:37
94Computing / Network architecture / Emerging technologies / Configuration management / Software-defined networking / OpenFlow / Information and communications technology / Computer engineering / Scalability / Software-defined

Robust fault-recovery in Software-Defined Networks IBSDN: IGP as a Backup in SDN JuneOlivier Tilmans

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:55:56
95Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

Add to Reading List

Source URL: dominictarr.github.io

Language: English - Date: 2015-07-10 14:55:46
96Photo sharing / Cloud storage / Image hosting / Social networking services / World Wide Web

FAQ REGISTRATION  Why do I need to register? As a registered user, you can take full advantage of all website features. Only registered users have the

Add to Reading List

Source URL: static.nbcuniarchives.com

Language: English - Date: 2018-06-27 14:18:43
97Information privacy / Data security / Law / Privacy law / Data protection / Europe / General Data Protection Regulation / Data Protection Act / Data breach / Personally identifiable information / Data Protection Directive

21st May 2018 Dear Sir/Madam Variation of KeyedIn Service Agreement to incorporate Data Processing Terms As you will be aware, new data protection legislation is due to come into force on 25th MayThe GDPR will rep

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2018-05-25 03:31:49
98Elections / Voting / Politics / Group decision-making / Electronic voting / Absentee ballot / Parliamentary procedure / Election Day / Secret ballot / Electoral fraud / Early voting

THE ROLE OF OBSERVERS: UNDERSTANDING YOUR FUNCTION Below are key items to keep in mind while serving as an election observer, at your assigned location: All observers must be qualified electors of the State of Ohio and m

Add to Reading List

Source URL: www.sos.state.oh.us

Language: English - Date: 2018-08-27 12:14:24
99Small Business Administration / Trade facilitation

U.S. SMALL BUSINESS ADMINISTRATION WASHINGTON, D.CSELF-REPRESENTATION AS AN ‘ELIGIBLE SMALL BUSINESS CONCERN’ The undersigned seeks services from a State grant recipient under the Trade Facilitation and Trade

Add to Reading List

Source URL: www.wyomingbusiness.org

Language: English - Date: 2016-12-12 11:19:38
100Science / Knowledge / Academic publishing / Research / Digital media / Publishing / Scholarly peer review / Scientific method / Electronic submission / ArXiv / Computer architecture / International Conference on Architectural Support for Programming Languages and Operating Systems

Instructions for Submission to ASPLOS 2019 ASPLOS Submission #XXX– Confidential Draft – Do Not Distribute! Abstract This document is intended to serve as a sample for submissions to the 23rd International Conference

Add to Reading List

Source URL: asplos-conference.org

Language: English - Date: 2018-07-24 21:51:17
UPDATE