Permission

Results: 15337



#Item
1Computing / Software engineering / Computer programming / Programming languages / Cross-platform software / Object-oriented programming languages / Procedural programming languages / Data types / Array data structure / Array data type / Getopt / Lua

The Mercury Library Reference Manual Version c 1995–1997,1999–2014 The University of Melbourne. Copyright Permission is granted to make and distribute verbatim copies of this manual provided the

Add to Reading List

Source URL: mercurylang.org

Language: English - Date: 2016-03-18 02:30:36
2Robotics / Robot control / Robot kinematics / Control theory / Automated planning and scheduling / Motion planning / Theoretical computer science / Velocity obstacle / Dynamic window approach / Mobile robot / Robot / Lidar

International Journal of Robotics 36(12):1312–1340 c The Author(sReprints and permission: sagepub.co.uk/journalsPermissions.nav

Add to Reading List

Source URL: symbolaris.com

Language: English - Date: 2018-02-19 21:17:33
3World Wide Web / Search engine optimization / Graph theory / Google Search / PageRank / Reputation management / Graph

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-06-20 05:24:32
4Feminism / Feminist theory / Feminism and society / Culture / Women's rights / Gender / Third-wave feminism / International relations theory / Cynthia Enloe / Feminist psychology / Feminist school of criminology

ROUGH DRAFT: Please do not cite without permission Why the Academy Needs Female Political Scientists: Examples from International Relations by Valerie M. Hudson

Add to Reading List

Source URL: www.saramitchell.org

Language: English - Date: 2011-11-10 11:40:54
5Cryptography / Access control / Papermaking / Digital photography / Digital watermarking / Authentication / Money forgery / Watermark / Convolutional code / Cinavia

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-06-20 05:23:08
6World Wide Web / Search engine optimization / Graph theory / Google Search / PageRank / Reputation management / Graph

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2018-06-05 16:09:27
7Avionics / Aircraft instruments / Aviation / Technology / Human behavior / Air traffic control / OpenSky Network / ACARS / Automatic dependent surveillance  broadcast / FlightAware / VHF Data Link / Data link

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-06-20 05:20:16
8Cross-platform software / Gmail / Webmail / Email / Internet privacy / Computing / Internet / World Wide Web

THE LAW IS CHANGING – DON’T GET LEFT OUT! We need your permission to stay in touch New data protection laws mean we need your permission to stay in touch, even if you have given us permission before. Opera Prelude be

Add to Reading List

Source URL: www.operaprelude.com

Language: English - Date: 2018-05-22 05:45:54
9Computer programming / Software engineering / Computing / Build automation / Compiling tools / Software design patterns / C++ / Make / Monad / Apache Ant / Include directive / Haskell

c ACM, 2012. This is the author’s version of the work. It is posted here by permission of ACM for your personal use. ⃝ Not for redistribution. The definitive version was published in The International Conference on F

Add to Reading List

Source URL: ndmitchell.com

Language: English - Date: 2018-09-25 06:02:59
10Cryptography / Access control / Papermaking / Digital photography / Digital watermarking / Authentication / Money forgery / Watermark / Convolutional code / Cinavia

2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds © NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of thi

Add to Reading List

Source URL: nsg.romeier.ch

Language: English - Date: 2018-06-28 16:37:13
UPDATE