DATA

Results: 400928



#Item
271Business / Economy / Human behavior / Recruitment / Intelligence analysis / Background check / Law enforcement / Security / Cision / Jobvite / Job hunting / Data retention

Job applicant privacy policy This Data Privacy Notice covers practices for the Cision Job applicant process including data collection, data processing and data sharing. Data Collection If you are interested to apply for

Add to Reading List

Source URL: careers.jobvite.com

Language: English - Date: 2018-09-27 18:42:22
272Avionics / Aircraft collision avoidance systems / Warning systems / Traffic collision avoidance system / European Train Control System / Carrier-sense multiple access with collision avoidance / Communicating sequential processes / Real-time strategy / Transport / Safety / Technology

Automatic Verification of Real-Time Systems with Rich Data Ernst-Rudiger ¨ Olderog

Add to Reading List

Source URL: www.avacs.org

Language: English - Date: 2015-10-01 02:29:40
273Government procurement in the United States / United States administrative law / Futures contract / Federal Procurement Data System / Government / Law

Analyst’s Guide to Federal Spending Data Version 1.2 July 1, 2018 Welcome to the Analyst’s Guide to Federal Spending Data. Here, you’ll find guidance on effectively using USAspending.gov data, making it easier for

Add to Reading List

Source URL: datalab.usaspending.gov

Language: English - Date: 2018-09-13 11:56:03
274Economy / Finance / Money / Financial markets / Hedge / Treasury management / Set-off / Society for Worldwide Interbank Financial Telecommunication / Short

Treasury Providing a seamless and transparent flow of information to synchronize the front and back offices, Temenos’ award winning treasury solution delivers real-time links to the market for instant and accurate data

Add to Reading List

Source URL: www.temenos.com

Language: English - Date: 2017-05-15 12:36:38
275Computer security / Antivirus software / Computing / Technology / Computer network security / Mobile device management / Bring your own device / Comodo Group / Mobile security / Endpoint security / Microsoft Intune / Comodo Mobile Security

Data Sheet Comodo Mobile Device Management Secure and centrally manage large-scale deployments of corporate and personal mobile devices Key Benefits

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2018-09-21 10:15:41
276Computing / Data management / Data / Business intelligence / Knowledge representation / Web services / Semantic Web / Data transformation / Ontotext / OpenRefine / Platform as a service / Data cleansing

Small or medium-scale focused research project (STREP) ICT SME-DCA Call 2013 FP7-ICT-2013-SME-DCA Data Publishing through the Cloud: A Data- and Platform-as-a-Service Approach to Efficient

Add to Reading List

Source URL: bd7a65e2cb448908f934-86a50c88e47af9e1fb58ce0672b5a500.r32.cf3.rackcdn.com

Language: English - Date: 2015-08-12 06:51:59
277Finite-state machine / Image segmentation / Machine learning / Cellular automata / Finite automata / Automata theory / Cognition / Cognitive science / Artificial intelligence

Towards inferring environment models for control functions from recorded signal data Henrik Peters, Falk Howar, Andreas Rausch Clausthal University of Technology, Department of Informatics Julius-Albert-Str. 4, 38678 Cla

Add to Reading List

Source URL: www.falkhowar.de

Language: English - Date: 2018-09-30 08:43:02
278AnyChart / Petroleum production / Computing / Wellsite information transfer standard markup language / Visualization / Data visualization / Application software / Communication design

AnyChart™ Data Visualization Solutions IDS Chooses AnyChart for Its Reporting and Analysis Systems Independent Data Services

Add to Reading List

Source URL: www.anychart.com

Language: English - Date: 2015-04-21 05:39:48
279Computing / Software engineering / Computer programming / Formal languages / Comparison of programming languages / Expr / String / Spreadsheet / Regular expression / Parsing / AWK / Scheme

doi:Spreadsheet Data Manipulation Using Examples By Sumit Gulwani, William R. Harris, and Rishabh Singh

Add to Reading List

Source URL: rishabhmit.bitbucket.io

Language: English - Date: 2018-06-25 09:59:57
280Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
UPDATE