IOC

Results: 2147



#Item
981International Olympic Committee / Ocean observations / Group on Earth Observations / Oceanography / GOOS / Intergovernmental Oceanographic Commission

Consultation on Scientific and Technical Aspects of Sustained Ocean Observations and Services, Rio de Janeiro, Brazil, 5th March 2013; IOC. Workshop report; Vol.:254; 2013

Add to Reading List

Source URL: odinafrica.org

Language: English
982Computer network security / Crime prevention / National security / Dependability / Quality / AVG / Computer security / Integrity / Security / Software / Computing

Security in the Context of Dependability Tacksoo Im John D. McGregor School of Computing Clemson University

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-10 22:23:32
983Hyper-V / Windows Server / Hypervisor / Proxy server / VM / Trusted Computing / Embedded hypervisor / Virtual firewall / System software / Software / Computer networking

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
984FIVB World Championship results / Country codes / Auto racing / Comparison of IOC /  FIFA /  and ISO 3166 country codes

Designing Fiscally Sustainable and Equitable Pension Systems in Emerging Europe in the Post-Crisis World; Vienna, Austria, March 18, 2013

Add to Reading List

Source URL: www.imf.org

Language: English - Date: 2013-03-12 11:42:07
985

[removed] §²é³íáï¦ ûñ³Ã»ñÃÇ ë/à ë»åï»Ùµ»ñÇ 6-Ç Ñ³Ù³ñÇ` §Ä³é³Ý·áõÃÛáõÝÁ¦ Ïáé»ÏódzÛÇ Ï»ÝóñÏÇ ¼áÛ³ÛÇݦ Ññ³å³ñ³ÏÙ³Ý Ï³å³ÏóáõÃ

Add to Reading List

Source URL: res.elections.am

Language: Vietnamese - Date: 2007-09-07 02:51:32
    986Crime prevention / National security / Network architecture / OSI protocols / Computer networking / OSI model / Communications protocol / Computer security / Computer network / Computing / Security / Data

    The Layered Security Model and its Representation using Bigraphs to Analyse Critical Infrastructure Clive Blackwell Information Security Group, Royal Holloway, University of London Egham, Surrey. TW20 0EX. United Kingdom

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-13 12:03:04
    987Wavelet / Computer science / Network intrusion detection system / Cyberwarfare / Computer security / Computer Science and Engineering / Computer / Computer network security / Security / Intrusion detection system

    Fates: A Peicewise view of Networks

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-13 12:13:20
    988Software testing / Secure communication / Hacking / Electronic commerce / Computer network security / Vulnerability / Communications protocol / Computer security / Transmission Control Protocol / Computing / Data / Security

    Automatic Generation of Certifiable Aerospace Communication Software Johann Schumann and Ewen Denney RIACS / NASA Ames, Moffett Field, CA 94035 {schumann|edenney}@email.arc.nasa.gov

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-04-11 20:12:52
    989Communications protocol / Computing / Data / Information / Research Institute for Advanced Computer Science

    Automatic Generation of Certifiable Space Communication Software Ewen Denney, RIACS / NASA Ames Johann Schumann, RIACS / NASA Ames

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-05-10 17:58:28
    990Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Zombies!!! / Zombie / Node / Games / Computer network security / Denial-of-service attacks

    Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor

    Add to Reading List

    Source URL: www.ioc.ornl.gov

    Language: English - Date: 2007-04-20 13:13:42
    UPDATE