Security analysis

Results: 6956



#Item
251Categorical data / Labour economics / Regression analysis / Social justice / Unemployment / Logit / Microsimulation / Ordered logit / Current population survey / Social Security / Discrete choice

Projecting Labor Force Participation and Earnings in CBO’s Long-Term Microsimulation Model

Add to Reading List

Source URL: www.cbo.gov

Language: English - Date: 2015-12-14 13:41:10
252Surveillance / Video content analysis / Time-lapse photography / Video surveillance / Road traffic management

Real-time Implementation of Automated Counter-flow Detection in Airport Security Exits Mohamed A. Elgharib, Venkatesh Saligrama Boston University 1. Objective

Add to Reading List

Source URL: www.northeastern.edu

Language: English - Date: 2013-10-03 14:18:04
253Law enforcement in the United States / United States Department of Homeland Security / Transportation Security Administration / U.S. Immigration and Customs Enforcement / Homeland security / Port security / Homeland Security Centers of Excellence / Federal Air Marshal Service / United States Coast Guard / Erroll Southers / Arif Alikhan

National Center for Risk and Economic Analysis of Terrorism Events (CREATE) A DHS Science and Technology Center of Excellence University of

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-06 11:16:24
254Loans / Bond / Coupon / Maturity / Security / Mortgage loan / Fixed income analysis / Little Miller Act / Fixed income

ORDINANCE NOAN ORDINANCE AUTHORIZING THE ISSUANCE AND SALE OF A CAPITAL IMPROVEMENT REVENUE BOND IN THE PRINCIPAL AMOUNT OF NOT TO EXCEED $200,000 FOR THE PURPOSE OF F I N A N CI N G T HE P U R C HA S E A N D

Add to Reading List

Source URL: www.cherokeevillage.org

Language: English - Date: 2013-07-29 13:52:47
255Analysis of algorithms / Cache / Oblivious ram / Digital signature

2015 IEEE Symposium on Security and Privacy Privacy and Access Control for Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schr¨oder Saarland University & CISPA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:16
256Investment banks / Primary dealers / Financial markets / Close Brothers Group / Financial services / Security analysis / Securities research / Financial ratio / Security

Leifheit AG Recommendation: Risk: Price Target:

Add to Reading List

Source URL: ir.leifheit-group.com

Language: English - Date: 2014-11-10 03:20:53
257Actuarial science / Security / Risk / Management / Project management / Risk management / Risk analysis / Old Dominion University

The "Criteria for Performance Excellence“; An Intelligent Risk Approach September 2013 A category by category discussion of risks that are mitigated when an organization uses "the Criteria" for self-assessment, strateg

Add to Reading List

Source URL: spqa-va.org

Language: English - Date: 2013-10-19 21:21:06
258Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:27
259Coding theory / Error detection and correction / Numerical analysis / Finite fields / Search algorithms / Linear code / Nearest neighbor search / Algorithm / Linear algebra / Hamming distance / List decoding / Decoding methods

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2015-02-05 05:37:41
UPDATE