Search results

Jump to: navigation, search
  • ...fully developed applications of programming capabilities available in the public domain. ...o in open learning for any type of course. Nowadays, there exist different public and commercial Virtual Learning Environments (VLE) aimed at helping teacher
    18 KB (2,408 words) - 01:37, 16 December 2008
  • ...anization/World Health Organization) and co-organized by a list of partner public and private organizations, under the auspices of the International Society ...9 is aimed at a broad multidisciplinary audience. It includes researchers, policy-makers, educators, librarians, information science professionals, and stude
    3 KB (316 words) - 18:10, 14 October 2008
  • ..., the authors must notify the program chair (see the SIGPLAN republication policy). Note: this year the submission deadline for ISMM is two days after the au ...ird person, as you would other related work. Avoid making paper drafts too public, to reduce the possibility of inadvertently revealing your identities to re
    6 KB (967 words) - 21:51, 4 February 2009
  • ...ects on housing, technical infrastructure systems, the educational system, public expenditures, etc.), * a planning and policy perspective in the context of regional and local governance and strategy de
    3 KB (436 words) - 19:08, 14 October 2008
  • b. Policy and Procedures This is an open to the public forum, so all topics, presentations and discussions must remain at the Uncl
    16 KB (2,200 words) - 19:51, 18 February 2021
  • ..., intellectual, and other boundaries. Whether the context is international policy, distributed teamwork, e-business, or community mobilization, fundamentally * Engaging and mobilizing the public to act
    9 KB (1,139 words) - 22:14, 14 October 2008
  • ...ovided a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Trust, Security, and Privacy. I * Adaptive security policy management
    4 KB (565 words) - 22:20, 14 October 2008
  • ...rs due to the increasing use of simulation in concrete problems and public policy, across a variety of fields, and its crucial role for theorizing, modelling
    4 KB (523 words) - 22:23, 14 October 2008
  • | Homepage = www.public.asu.edu/~huanliu/sbp08 ...cial and behavioral computing and evaluation in help critical decision and policy making. The program will include invited speakers from government, industr
    4 KB (511 words) - 22:31, 14 October 2008
  • * John Quackenbush, Harvard School of Public Health, USA BMC Bioinformatics, following the journal?s publication policy.
    10 KB (1,209 words) - 16:05, 27 December 2015
  • ...l proceedings of conferences and workshops). See the SIGPLAN republication policy for more details http://www.acm.org/sigs/sigplan/republicationpolicy.htm. T ...tations available to the public. Thus, the presenter needs to agree to the public release of the presentation.
    5 KB (678 words) - 19:58, 26 November 2016
  • Double Submission Policy final public voting.
    9 KB (1,215 words) - 22:38, 14 October 2008
  • ** Public and social pressures leading to mGovernment ** mGovernment and transforming public administration
    11 KB (1,366 words) - 15:44, 14 January 2009
  • - Public digital libraries - Public science archives
    5 KB (633 words) - 11:58, 18 January 2009
  • and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are
    16 KB (2,178 words) - 11:59, 18 January 2009
  • * Exposition of legal, business and technology policy issues relevant to multimedia security. * Issues of technology policy and public policy in multimedia security, for example DRM, copyright, privacy, interoperabili
    3 KB (303 words) - 16:06, 24 February 2016
  • o Policy between primary user and secondary user * Public-key cryptography
    14 KB (1,518 words) - 12:01, 18 January 2009
  • 5. Information products and services as public policy enablers
    2 KB (212 words) - 18:42, 2 August 2009
  • ...journal/magazine/conference. We will be developing specific technology and policy programs with topics including, but not limited to, the following: * Applications of DSA (e.g., public safety, cellular access networks)
    4 KB (549 words) - 10:36, 2 August 2009
  • ...; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols; Priority user service Diagnosis platforms; Diagnosis policy language; Diagnosis event formats; Process algebras for systems diagnosis;
    14 KB (1,651 words) - 14:56, 15 February 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)