Schneider National

Results: 173



#Item
41Knowledge / Ethology / Exploratory research / Theory / Scientific theory / Research / Science / Philosophy of science / Scientific method

Testing ideas: using longitudinal data to go beyond exploratory research. Dr Judy Schneider Branch Manager, Research and Analysis, FaHCSIA Presentation to National Statistical Service

Add to Reading List

Source URL: www.nss.gov.au

Language: English - Date: 2013-09-24 21:39:58
42Truck / Vehicles / Schneider National / Road transport / Commercial vehicles / Truck driver / Trucking industry in the United States / Transport / Land transport / Trucks

Logistics Association of Australia Ltd LEADING EDGE PRACTICES: WHAT CAN WE LEARN? 1996 International Study Award winner John Reitze concludes his series of articles following his study tour to the US.

Add to Reading List

Source URL: www.laa.asn.au

Language: English - Date: 2009-09-27 17:58:32
43Education / National League for Nursing / Nurse education / Far Eastern University Institute of Nursing / University of Santo Tomas College of Nursing / Nursing education / Nursing / Health

Portland Community College Program Review Nursing April 15, 2011 SAC Chair Alisa Schneider, MSN, RN

Add to Reading List

Source URL: www.pcc.edu

Language: English - Date: 2011-04-19 17:23:36
44Outsider music / Harry Partch / Modernism / John Schneider / Lou Harrison / Ben Johnston / Microtonal music / Limit / Terry Riley / Music / Guggenheim Fellows / Microtonality

J UST G UITARS John Schneider, adapted guitars Suite for National Steel[removed])………………………………………. Lou

Add to Reading List

Source URL: www.7hours.com

Language: English - Date: 2010-08-04 10:07:27
45Cyberwarfare / Computer security / Crime prevention / Electronic commerce / National security / State machine replication / Denial-of-service attack / Byzantine fault tolerance / Side channel attack / Computer network security / Computing / Security

Blueprint for a science of cybersecurity | Fred B. Schneider 1. Introduction

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-04-26 11:36:06
46Non-equilibrium thermodynamics / State functions / Thermodynamic entropy / Philosophy of thermal and statistical physics / Entropy / Equilibrium thermodynamics / Rayleigh–Bénard convection / Laws of thermodynamics / Exergy / Thermodynamics / Physics / Chemistry

LIFE AS A MANIFESTATION OF THE SECOND LAW OF THERMODYNAMICS ERIC D. SCHNEIDER National Ocean Service National Oceanic and Atmospheric Administration Washington, D.C., U.S.A. JAMES J. KAY

Add to Reading List

Source URL: merkury.orconhosting.net.nz

Language: English - Date: 2004-10-03 21:58:43
47Type theory / Cross-platform software / Crime prevention / National security / Computer security / Information flow / Cyclone / Type safety / Information security / Computing / Software engineering / Programming language theory

Language-Based Security for Malicious Mobile Code Fred B. Schneider [removed] Dexter Kozen [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-07-08 16:43:04
48Hacking / National security / Computer network security / Crime prevention / Secure communication / Federal Information Security Management Act / Vulnerability / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

Doctrine for Cybersecurity∗ Deirdre K. Mulligan† Fred B. Schneider‡ May 15, 2011

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-05-15 22:04:38
49Glasflügel / Aircraft / National Soaring Museum / US Southwest Soaring Museum / Schempp-Hirth Mini-Nimbus / Glider / Rolladen-Schneider LS3 / Schempp-Hirth / Glasflügel H-301 / Glider aircraft / Aviation / Flight

Southwest Soaring Quarterly Newsletter of the U.S. Southwest Soaring Museum December[removed]Moriarty Vintage & Classic Meet

Add to Reading List

Source URL: swsoaringmuseum.org

Language: English - Date: 2014-01-01 12:04:02
50Law / Crime prevention / National security / Politics / Security policy / Digital rights management / Policy / Computer security / Trusted Computing / Copyright law / Computer network security / Security

Inside Risks Fred B. Schneider PAUL WATSON Secure Systems Conundrum B

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-26 11:04:06
UPDATE