Applied Data Research

Results: 454



#Item
221Department of Physics Quantum Device Lab Announcement for a Research Assistant Position “Real-time FPGA based signal processing and fast data acquisition for quantum computing architectures based on superconducting ele

Department of Physics Quantum Device Lab Announcement for a Research Assistant Position “Real-time FPGA based signal processing and fast data acquisition for quantum computing architectures based on superconducting ele

Add to Reading List

Source URL: www.qudev.ethz.ch

Language: English - Date: 2014-07-01 05:58:56
222Chapter 4 - data for figures - B.xlsx

Chapter 4 - data for figures - B.xlsx

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 03:48:18
223Irene Schlünder (TMF)  DRAFT GENERAL DATA PROTECTION REGULATION (OCTOBER 22, 2013)  OUTLINE

Irene Schlünder (TMF) DRAFT GENERAL DATA PROTECTION REGULATION (OCTOBER 22, 2013) OUTLINE

Add to Reading List

Source URL: www.biomedbridges.eu

Language: English - Date: 2014-06-30 07:49:30
224TAO Project Deliverable D 5.1  Survey Among Elderly Beginners (First Wave) Dirk Richter Bern University of Applied Sciences

TAO Project Deliverable D 5.1 Survey Among Elderly Beginners (First Wave) Dirk Richter Bern University of Applied Sciences

Add to Reading List

Source URL: www.thirdageonline.eu

Language: English - Date: 2012-07-30 16:29:21
225Optimization Algorithms for Data Analysis Stephen Wright University of Wisconsin-Madison Fields Institute, June 2010

Optimization Algorithms for Data Analysis Stephen Wright University of Wisconsin-Madison Fields Institute, June 2010

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2010-09-09 11:38:01
226FRED H. CATE Distinguished Professor, C. Ben Dutton Professor of Law, Adjunct Professor of Informatics and Computing, Director, Center for Applied Cybersecurity Research, and Co-director, Center for Law, Ethics, and Appl

FRED H. CATE Distinguished Professor, C. Ben Dutton Professor of Law, Adjunct Professor of Informatics and Computing, Director, Center for Applied Cybersecurity Research, and Co-director, Center for Law, Ethics, and Appl

Add to Reading List

Source URL: newsinfo.iu.edu

Language: English - Date: 2011-06-28 16:45:50
227Forms to complete (all forms must be completed and returned to Jolanta): Research Registration/Data Protection Form Ethics Form Risk Assessment Form Consent Forms 1. Complete the Research Registration/Data Protection For

Forms to complete (all forms must be completed and returned to Jolanta): Research Registration/Data Protection Form Ethics Form Risk Assessment Form Consent Forms 1. Complete the Research Registration/Data Protection For

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2014-06-03 10:47:38
228Confidential Data Approval Procedures December 23, 2013 Purpose: In accordance with Public Chapter 905 Section 6 (C), this document outlines “criteria for the approval of research and data requests from state and loca

Confidential Data Approval Procedures December 23, 2013 Purpose: In accordance with Public Chapter 905 Section 6 (C), this document outlines “criteria for the approval of research and data requests from state and loca

Add to Reading List

Source URL: tn.gov

Language: English - Date: 2014-12-04 15:29:43
229A Semantic Web Platform for Automating the Interpretation of Finite Element Bio-simulations Andr´e Freitas, Kartik Asooja, Jo˜ao B. Jares, Stefan Decker, Ratnesh Sahay Insight Centre for Data Analytics National Univers

A Semantic Web Platform for Automating the Interpretation of Finite Element Bio-simulations Andr´e Freitas, Kartik Asooja, Jo˜ao B. Jares, Stefan Decker, Ratnesh Sahay Insight Centre for Data Analytics National Univers

Add to Reading List

Source URL: www.deri.ie

Language: English - Date: 2014-11-24 11:32:16
230Confidential Data Approval Procedures December 23, 2013 Purpose: In accordance with Public Chapter 905 Section 6 (C), this document outlines “criteria for the approval of research and data requests from state and loca

Confidential Data Approval Procedures December 23, 2013 Purpose: In accordance with Public Chapter 905 Section 6 (C), this document outlines “criteria for the approval of research and data requests from state and loca

Add to Reading List

Source URL: tennessee.gov

Language: English - Date: 2014-12-04 15:29:43