Key code

Results: 1646



#Item
331Nuclear safety / Public safety / Safety culture / Occupational safety and health / Traffic collision / Safety / Risk / Prevention

Key points Royal BAM Group Safety Policy These key points must be seen as an addition to and in coherence with the Code of Conduct as established by the Executive Board.  Occupational accidents, ill health and disabi

Add to Reading List

Source URL: www.bam.eu

Language: English - Date: 2014-12-03 10:15:46
332Mathematical software / Formal verification / KeY / ARM architecture / Model checking / Computer security / ACL2 / Software development process / Logic simulation / Electronic engineering / Theoretical computer science / Formal methods

PART 2: Proposed Research and Yu formally described a substantial subset of the Motorola MC68020 processor in the logic of the Boyer-Moore prover and used the resulting model to verify compiler generated object code for

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2004-06-02 11:31:35
333Certificate authority / Transport Layer Security / Code signing / Public key certificate / Public key infrastructure / Key size / DNS spoofing / Dynamic SSL / Self-signed certificate / Cryptography / Public-key cryptography / Key management

Survivable Key Compromise in Software Update Systems ∗ Justin Samuel UC Berkeley

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2012-09-11 18:21:26
334Certificate policy / Extended Validation Certificate / X.509 / Comodo Group / Public key certificate / Revocation list / Certificate authority / Online Certificate Status Protocol / Code signing / Cryptography / Public-key cryptography / Key management

Comodo Certification Practice Statement Comodo CA, Ltd. VersionEffective: March 25, 2015

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2015-04-10 16:08:01
335Password / Message authentication code / Key / Crypt / Computer network security / Transport Layer Security / Secure Shell / Cryptography / Cryptographic protocols / Security

CS255: Cryptography and Computer Security Winter 2006 Programming Project #1 Due: Friday, February 10th, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-01 12:20:25
336Mwanza / Dar es Salaam / Shinyanga / Pwani Region / Dodoma / Isaka / Iringa / ISO 3166-2:TZ / Districts of Tanzania / Geography of Africa / Africa / Lake Victoria

CSEE 2012 SCHOOL RANKING - CENTRES WITH LESS THAN 40 CANDIDATES KEY: BAND1: GPA 1 to 1.5, BAND2: 1.5 to 2 , BAND3: 2 to 2.5, BAND4: 2.5 to 3, BAND5: 3 to 3.5, BAND6: 3.5 to 4, BAND7: 4 to 4.5, BAND8: 4.5 to 5 Color Code:

Add to Reading List

Source URL: www.necta.go.tz

Language: English - Date: 2013-11-03 05:03:49
337Metalworking / Milling machine / Computer-aided engineering / Machining / Lathe / Speeds and feeds / G-code / Key / Geometric Technologies /  Inc. / Machine tools / Technology / Manufacturing

FeatureMILL/TURN combines the functionality of FeatureMILL and FeatureTURN, enabling both Milling and Turning features to be incorporated into a single file. Vertical Mill/Turn is intended to be used with machines which

Add to Reading List

Source URL: arrow.delcam.com

Language: English - Date: 2014-02-03 08:34:19
338WASM / Western Australian School of Mines / Mining / Dual-listed companies / Rio Tinto Group

DEPARTMENT OF MINING ENGINEERING Unit Code: [removed]Unit Name: Mine Management 532 Unit Coordinator: Dr. Carla Boehl Assignment Title: Concept Test 1 – “Compare the risk-taking and the key leadership attributes belong

Add to Reading List

Source URL: www.wasmga.com.au

Language: English - Date: 2014-10-10 03:05:43
339East Africa / Tanzania / Ubungo / Mwanza / Dar es Salaam / Pwani Region / Shaaban Robert Secondary School / ISO 3166-2:TZ / Districts of Tanzania / Geography of Africa / Africa / Geography of Tanzania

CSEE 2012 SCHOOL RANKING - CENTRE WITH 40 AND MORE CANDIDATES KEY: BAND1: GPA 1 to 1.5, BAND2: 1.5 to 2 , BAND3: 2 to 2.5, BAND4: 2.5 to 3, BAND5: 3 to 3.5, BAND6: 3.5 to 4, BAND7: 4 to 4.5, BAND8: 4.5 to 5 Color Code: G

Add to Reading List

Source URL: www.necta.go.tz

Language: English - Date: 2013-11-03 05:04:06
340Software testing / Automated theorem proving / Concolic testing / Software metrics / KeY / Symbolic execution / Code coverage / Control flow graph / Algorithm / Software / Computing / Formal methods

Enhancing Symbolic Execution with Veritesting Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, and David Brumley Carnegie Mellon University {thanassis, alexandre, sangkilc, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE