Search results
Create the page "Public policy" on this wiki! See also the search results found.
- ...fully developed applications of programming capabilities available in the public domain. ...o in open learning for any type of course. Nowadays, there exist different public and commercial Virtual Learning Environments (VLE) aimed at helping teacher18 KB (2,408 words) - 01:37, 16 December 2008
- ...anization/World Health Organization) and co-organized by a list of partner public and private organizations, under the auspices of the International Society ...9 is aimed at a broad multidisciplinary audience. It includes researchers, policy-makers, educators, librarians, information science professionals, and stude3 KB (316 words) - 18:10, 14 October 2008
- ..., the authors must notify the program chair (see the SIGPLAN republication policy). Note: this year the submission deadline for ISMM is two days after the au ...ird person, as you would other related work. Avoid making paper drafts too public, to reduce the possibility of inadvertently revealing your identities to re6 KB (967 words) - 21:51, 4 February 2009
- ...ects on housing, technical infrastructure systems, the educational system, public expenditures, etc.), * a planning and policy perspective in the context of regional and local governance and strategy de3 KB (436 words) - 19:08, 14 October 2008
- b. Policy and Procedures This is an open to the public forum, so all topics, presentations and discussions must remain at the Uncl16 KB (2,200 words) - 19:51, 18 February 2021
- ..., intellectual, and other boundaries. Whether the context is international policy, distributed teamwork, e-business, or community mobilization, fundamentally * Engaging and mobilizing the public to act9 KB (1,139 words) - 22:14, 14 October 2008
- ...ovided a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Trust, Security, and Privacy. I * Adaptive security policy management4 KB (565 words) - 22:20, 14 October 2008
- ...rs due to the increasing use of simulation in concrete problems and public policy, across a variety of fields, and its crucial role for theorizing, modelling4 KB (523 words) - 22:23, 14 October 2008
- | Homepage = www.public.asu.edu/~huanliu/sbp08 ...cial and behavioral computing and evaluation in help critical decision and policy making. The program will include invited speakers from government, industr4 KB (511 words) - 22:31, 14 October 2008
- * John Quackenbush, Harvard School of Public Health, USA BMC Bioinformatics, following the journal?s publication policy.10 KB (1,209 words) - 16:05, 27 December 2015
- ...l proceedings of conferences and workshops). See the SIGPLAN republication policy for more details http://www.acm.org/sigs/sigplan/republicationpolicy.htm. T ...tations available to the public. Thus, the presenter needs to agree to the public release of the presentation.5 KB (678 words) - 19:58, 26 November 2016
- Double Submission Policy final public voting.9 KB (1,215 words) - 22:38, 14 October 2008
- ** Public and social pressures leading to mGovernment ** mGovernment and transforming public administration11 KB (1,366 words) - 15:44, 14 January 2009
- - Public digital libraries - Public science archives5 KB (633 words) - 11:58, 18 January 2009
- and Public Policy in the Age of e-Euphoria. Conference main theme will be supported by systems; information assurance, security, and public policy. Doctoral students are16 KB (2,178 words) - 11:59, 18 January 2009
- * Exposition of legal, business and technology policy issues relevant to multimedia security. * Issues of technology policy and public policy in multimedia security, for example DRM, copyright, privacy, interoperabili3 KB (303 words) - 16:06, 24 February 2016
- o Policy between primary user and secondary user * Public-key cryptography14 KB (1,518 words) - 12:01, 18 January 2009
- 5. Information products and services as public policy enablers2 KB (212 words) - 18:42, 2 August 2009
- ...journal/magazine/conference. We will be developing specific technology and policy programs with topics including, but not limited to, the following: * Applications of DSA (e.g., public safety, cellular access networks)4 KB (549 words) - 10:36, 2 August 2009
- ...; Electronic Privacy; Anonymity and pseudo-anonymity; Security compliance; Public safety, Instance messages; Presence protocols; Priority user service Diagnosis platforms; Diagnosis policy language; Diagnosis event formats; Process algebras for systems diagnosis;14 KB (1,651 words) - 14:56, 15 February 2017