Ready

Results: 21204



#Item
1Computing / System software / User interface techniques / Human communication / Humanmachine interaction / User interface / Virtual reality / ZK / User interface modeling / Symbian

Microsoft Word - uist02-speakeasy-controllers-FINAL-CAMERA-READY.doc

Add to Reading List

Source URL: trevor.smith.name

Language: English - Date: 2012-11-23 14:19:46
2Engineering / Software requirements / Software quality / Design for X / Systems engineering / Reliability engineering / Survival analysis / Economic model / Requirement / Systems science / Design

Quantitative Stochastic Models in the Verification and Design of Software Systems IMPORTANT DATES. Submission of papers: Extended) Notification of acceptance: Camera-ready paper:

Add to Reading List

Source URL: deepse.dei.polimi.it

Language: English - Date: 2015-03-19 06:25:46
3Information technology management / Management / Information technology / Economy / IT service management / Project portfolio management / Change management / Project management / TeamDynamix / Configuration Management / ITIL / Book:IT Service Management

SOLUTIONS FOR HIGHER ED $252B WILL BE SPENT IN ED-TECH BEFORE THE YEAR 2020; ALL OF THIS NEW TECHNOLOGY NEEDS SUPPORT. ARE YOU READY? IT Service Management (ITSM) platforms need

Add to Reading List

Source URL: www.teamdynamix.com

Language: English
4Information technology management / Economy / Management / Business / TeamDynamix / Project management / Project portfolio management / Release management / IT service management / Change management / Configuration Management / Kanban

SOLUTIONS FOR K-12 DISTRICTS $252B WILL BE SPENT IN ED-TECH BEFORE THE YEAR 2020; ALL OF THIS NEW TECHNOLOGY NEEDS SUPPORT. ARE YOU READY? Is your K-12 district ready to support the emerging

Add to Reading List

Source URL: www.teamdynamix.com

Language: English
5Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2018-10-07 06:08:08
6Economy / Business / Value added taxes / Invoice / Tax / European Union value added tax / Sales taxes / Ad valorem tax

A countdown to VAT in GCC, are you ready? On January 1, 2018, value-added tax (VAT) will come into effect for the first time in the GCC. However, each member state of the GCC will establish their own

Add to Reading List

Source URL: www.temenos.com

Language: English - Date: 2017-10-26 11:14:09
7Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

Add to Reading List

Source URL: joostrijneveld.nl

Language: English - Date: 2018-09-03 08:56:26
8Computing / Humancomputer interaction / Software / User interface / Ubiquitous computing / JavaScript / Usability / Mobile computing / World Wide Web / Computer / Adaptation / Google Chrome

Microsoft Word - dis02-speakeasy-browser_camera-ready_.doc

Add to Reading List

Source URL: trevor.smith.name

Language: English - Date: 2012-11-23 14:19:46
9Quantum information science / Theoretical computer science / Quantum mechanics / Quantum logic gate / Quantum circuit / Toffoli gate / Qubit / Quantum computing / Controlled NOT gate / Quantum error correction / Quantum teleportation / GottesmanKnill theorem

Lecture 16, Tues March 21: Quantum Computing, Universal Gate Sets Guest Lecture by Tom Wong Having seen lots of quantum protocols, we’re finally ready to tackle the holy grail of the field: a programmable quantum compu

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-10-22 17:57:48
10Computer access control / Computer security / Cryptography / Federated identity / Webmail / Identity management / Cross-platform software / Google Account / Multi-factor authentication / Password / Gmail / Mail.com

Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

Add to Reading List

Source URL: www.necoma-project.eu

Language: English - Date: 2016-04-22 11:46:30
UPDATE