Compromise

Results: 1355



#Item
31

5 Computational Domains Writing mathematics on paper or on the blackboard requires a compromise between ease of notations and rigour. The same holds for the day-to-day use of a computer algebra system. Sage tries to giv

Add to Reading List

Source URL: members.loria.fr

- Date: 2018-03-14 05:19:39
    32

    EVOLUTION OF THE COMMON LAW AND THE EMERGENCE OF COMPROMISE DOUGLAS GLEN WHITMAN* Abstract In a system of judge-made law, each judge who decides a case in a particular

    Add to Reading List

    Source URL: www.csun.edu

    - Date: 2004-02-04 01:27:03
      33

      Demo: Using Malicious Media Files to Compromise the Security and Privacy of Smart TVs Benjamin Michéle Andrew Karpow

      Add to Reading List

      Source URL: www.isti.tu-berlin.de

      - Date: 2014-02-06 14:25:05
        34

        Budget compromise reached at the 11th hour While a full-year budget, with structural reforms, would have been the best way to address Illinois’ fiscal crisis, without the stopgap budget a dire situation in Illinois wo

        Add to Reading List

        Source URL: senategop.state.il.us

        - Date: 2016-08-02 17:35:59
          35

          Proposed Compromise LEAP Transportation Documentas developed March 7, 2016

          Add to Reading List

          Source URL: leap.leg.wa.gov

          - Date: 2016-03-08 13:46:23
            36

            The Informational Basis for Mass Polarization Thomas J. Leeper∗ July 26, 2013 If nothing else, democratic politics requires compromise. Mass polarization, where citizens disagree strongly and those disagreements magnif

            Add to Reading List

            Source URL: dl.dropboxusercontent.com

              37

              A Publication of the Louisiana Department of Revenue Offer in Compromise Program P.O. Box 201 Baton Rouge, LouisianaForm RRev 7/15)

              Add to Reading List

              Source URL: revenue.louisiana.gov

              - Date: 2015-12-04 12:09:42
                38

                Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

                Add to Reading List

                Source URL: web.engr.oregonstate.edu

                - Date: 2012-01-10 09:45:41
                  39

                  The Best of Both Worlds Linear Functional Programming without Compromise J. Garrett Morris The University of Edinburgh, UK

                  Add to Reading List

                  Source URL: homepages.inf.ed.ac.uk

                  - Date: 2016-09-15 06:09:47
                    40

                    Proposed Compromise LEAP Transportation Documentas developed March 7, 2016

                    Add to Reading List

                    Source URL: leap.leg.wa.gov

                    - Date: 2016-03-08 13:47:21
                      UPDATE