Attribute

Results: 2839



#Item
261

TRILLIUM Engagement on Workplace Diversity Trillium Asset Management believes that diversity, inclusive of gender and race, is an essential component of sound governance and a critical attribute to a well-functioning or

Add to Reading List

Source URL: www.trilliuminvest.com

Language: English - Date: 2014-08-14 16:08:15
    262

    MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control Sonia Jahid Carl A. Gunter

    Add to Reading List

    Source URL: seclab.illinois.edu

    Language: English - Date: 2011-03-31 11:07:25
      263

      Information gathering externalities for a multi-attribute good 1 Heski Bar-Isaac

      Add to Reading List

      Source URL: www.vicentecunat.com

      Language: English - Date: 2012-05-01 12:32:27
        264

        0 Joint Link Prediction and Attribute Inference using a Social-Attribute Network NEIL ZHENQIANG GONG, University of California at Berkeley AMEET TALWALKAR, University of California at Berkeley LESTER MACKEY, University o

        Add to Reading List

        Source URL: web.rememberingemil.org

        Language: English - Date: 2014-04-02 21:16:46
          265

          Add class“=” attribute to tag of XML output. Add attribute to support Next Generation cloud play-by-play import process. Add shotbyprd attribute to the tag of XML output. Include

          Add to Reading List

          Source URL: grfx.cstv.com

          - Date: 2015-06-29 16:35:21
            266

            MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Point Cloud Attribute Compression using 3-D Intra Prediction and Shape-Adaptive Transforms Cohen, R.A.; Tian, D.; Vetro, A.

            Add to Reading List

            Source URL: www.merl.com

            Language: English - Date: 2016-04-13 07:16:23
              267Malware / Malware analysis / Cyberwarfare / Computer viruses / Carding / Computer security

              Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

              Add to Reading List

              Source URL: maecproject.github.io

              Language: English - Date: 2016-06-15 18:10:07
              268

              PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework Michael LeMay, Omid Fatemieh, and Carl A. Gunter University of Illinois at Urbana-Champaign ABSTRACT

              Add to Reading List

              Source URL: seclab.illinois.edu

              Language: English - Date: 2011-03-29 12:02:58
                269

                Clim. Past Discuss., 7, C2808–C2808, 2012 www.clim-past-discuss.net/7/C2808/2012/ © Author(sThis work is distributed under the Creative Commons Attribute 3.0 License. Climate

                Add to Reading List

                Source URL: www.clim-past-discuss.net

                - Date: 2016-01-23 13:04:31
                  270

                  Use “Center judge” instead of “Alternate” for eighth official. Add class“=” attribute to tag of XML output. Add “50+” column to Individual statistics tab stop output. Tightened spacing in Team G

                  Add to Reading List

                  Source URL: grfx.cstv.com

                  Language: English - Date: 2015-06-29 16:31:21
                    UPDATE