Cork

Results: 1969



#Item
401Computing / Burrows–Abadi–Needham logic / Cryptography / Communications protocol / Yahalom / Transmission Control Protocol / IP / Interpretation / Data / Information / Cryptographic protocols

A Collaborative Approach to Autonomic Security Protocols Hongbin Zhou Department of Computer Science University College, Cork Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:05:15
402

“From the Well” Short Story Competition 2015 The Cork County Library and Arts Service have just launched their “From the Well” Short Story competition. The competition is open to people aged 18 or over, who are r

Add to Reading List

Source URL: www.corkcoco.ie

Language: English - Date: 2015-01-08 08:46:41
    403Floors / Visual arts / Composite materials / Passive fire protection / Cement / Underlay / Fibre cement / Flooring / Tile / Building materials / Architecture / Construction

    AUGUSTVinyl & Cork Underlay Underlay Sheets substrate for

    Add to Reading List

    Source URL: www.bgcplaster.com

    Language: English - Date: 2012-09-19 21:02:09
    404Access control / Identity management / Computer security / Simple public key infrastructure / PERMIS / Authentication / Filesystem permissions / KB / Public key certificate / Cryptography / Key management / Public-key cryptography

    Authorisation Subterfuge by Delegation in Decentralised Networks Simon Foley and Hongbin Zhou Department of Computer Science, University College, Cork, Ireland. ,

    Add to Reading List

    Source URL: www.cs.ucc.ie

    Language: English - Date: 2005-06-02 09:03:03
    405Geography of Europe / Munster / Museology / County Cork / Cork / Cultural heritage management / Heritage tourism / Heritage Week / Ballyvourney / Geography of Ireland / Provinces of Ireland / Cultural heritage

    Heritage Heritage Spend in Cork County: 2014 saw a notable increase in the number of heritage projects and initiatives funded in the County of Cork. The Heritage Council was in a position to reintroduce the “Heritage M

    Add to Reading List

    Source URL: www.corkcoco.ie

    Language: English - Date: 2014-12-15 06:16:29
    406Geography of Europe / Nightline / Cork / Limerick / Provinces of Ireland / Geography of Ireland / Munster

    TERAPROOF:User:joedermodyDate:10/07/2014Time:15:14:52Edition:11/07/2014ExaminerLiveXX1107Page: 22Zone:XX1 XX1 - V1

    Add to Reading List

    Source URL: www.arithon.com

    Language: English - Date: 2014-07-31 11:51:28
    407Middleware / PERMIS / Role-based access control / Systems science / RT middleware / Middleware analyst / Systems engineering / Access control / Security

    A Framework for Heterogeneous Middleware Security Simon N. Foley, Thomas B. Quillinan, Maeve O’Connor, Barry P. Mulcahy, and John P. Morrison Department of Computer Science, University College, Cork, Ireland. s.foley,

    Add to Reading List

    Source URL: www.cs.ucc.ie

    Language: English - Date: 2004-10-08 09:15:32
    408Mathematics / Applied mathematics / Local search / Constraint / Graph coloring / Candidate solution / Constraint programming / Mathematical optimization / Theoretical computer science

    Local Search and Constraint Programming for the Post Enrolment-based Course Timetabling Problem? Hadrien Cambazard, Emmanuel Hebrard, Barry O’Sullivan and Alexandre Papadopoulos Cork Constraint Computation Centre Depar

    Add to Reading List

    Source URL: homepages.laas.fr

    Language: English - Date: 2011-12-15 12:54:32
    409County Cork / Munster / Geography of Ireland / Geography of Europe / Cork

    SAMPLE OF COUNTY CORK PRISON RECORDS (1840 – 1870) Compiled by Frank O’Donovan, Bantry While browsing through some Prison records for County Cork I stumbled across one which

    Add to Reading List

    Source URL: bmdnotices.com

    Language: English - Date: 2015-02-16 00:55:00
    410Security Content Automation Protocol / Vulnerability / Countermeasure / Open Vulnerability and Assessment Language / Social vulnerability / Ontology / National Vulnerability Database / Attack / Cisco IOS / Computer security / Cyberwarfare / Security

    Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

    Add to Reading List

    Source URL: www.cs.ucc.ie

    Language: English - Date: 2013-08-16 10:44:34
    UPDATE