NORTH Network

Results: 2821



#Item
341Interfaith dialog / Interfaith Youth Core / North American Interfaith Network / World Interfaith Harmony Week / InterFaith Conference of Metropolitan Washington / Islamic–Jewish relations / Project Interfaith / Interfaith / Religion / Donald H. Frew

NAINews See us on Facebook. Summer 2011 The Newsletter of the North American Interfaith Network, Inc.

Add to Reading List

Source URL: nain.org

Language: English - Date: 2013-07-17 14:39:58
342Wireless sensor network / Computer programming / Technology / Merkle signature scheme / Kademlia / Distributed data storage / Computing / Binary tree

Defending against Sybil Attacks in Sensor Networks∗ Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning Cyber Defense Laboratory, Computer Science Department North Carolina State University, Raleigh, NC {q

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:15
343Food politics / Famine Early Warning Systems Network / Food security / Famine / Millet / Development / Food and drink / Famines

BURKINA FASO Food Security Outlook Update February 2015 Three communes in the extreme north currently facing Stressed (IPC Phase 2) outcomes KEY MESSAGES

Add to Reading List

Source URL: www.fews.net

Language: English - Date: 2015-03-31 14:37:34
344Quorum / Mediation / Annual general meeting / Government / Sociology / Corporations law / Law / General Council of the University of St Andrews / Heights Community Council / Parliamentary procedure / Dispute resolution / Meetings

North Central Local Learning and Employment Network Incorporated “Association” Rules

Add to Reading List

Source URL: www.ncllen.org.au

Language: English - Date: 2010-09-17 03:43:56
345Sensor node / Computing / Electronics / Network theory / Wireless sensor network / Technology / Wireless networking

A Framework for Identifying Compromised Nodes in Sensor Networks Qing Zhang Ting Yu Peng Ning Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:16
346Electronics / Computing / Formal sciences / Audio engineering / Digital television / Sensor node / Lossless data compression / Discrete cosine transform / ANT / Wireless sensor network / Data compression / Technology

Authenticated Data Compression in Delay Tolerant Wireless Sensor Networks Young-Hyun Oh, Peng Ning, Yao Liu North Carolina State University Raleigh, NCEmail: {yoh4, pning, yliu20}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:09
347Geography of Queensland / Local Government Areas of Queensland / Indigenous Australian communities / Yarrabah /  Queensland / ICAN / Palm Island /  Queensland / Indigenous Australians / Cairns Region / Torres Strait Islands / Far North Queensland / Geography of Australia / Geography of Oceania

Annual ReportIndigenous Consumer Assistance Network Ltd Ican Annual ReportIndigenous Consumer Assistance Network Ltd

Add to Reading List

Source URL: ican.org.au

Language: English - Date: 2014-03-24 22:07:17
348Interfaith dialog / Intersectionality / World Interfaith Harmony Week / Religion / United Religions Initiative / Project Interfaith / Religious pluralism / Interfaith / Secularism

Late Fall 2010 The Newsletter of the North American Interfaith Network, Inc. Building Bridges of Inter-religious Understanding, Cooperation and Service. www.nain.org NAINews Committee

Add to Reading List

Source URL: nain.org

Language: English - Date: 2013-07-17 14:44:53
349Red algae / Maerl / Orkney / Egilsay / North Sea / Kelp / Rousay / Marine protected area / Marine Protected Area Network / Algae / Subdivisions of Scotland / Water

MPA maps - WRS - 24 June 2013

Add to Reading List

Source URL: www.snh.gov.uk

Language: English - Date: 2014-07-24 03:57:46
350Military / War / Computer network operations / Hacking / Military technology / CNO / Information warfare / Computer science / Cyber Operations / Military science / Electronic warfare / Cyberwarfare

Developing a Reliable Methodology for Assessing the Computer Network Operations Threat of North Korea

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:30
UPDATE