Ås

Results: 435832



#Item
151Network architecture / Computing / Computer architecture / Information and communications technology / Emerging technologies / Internet architecture / Configuration management / Software-defined networking / Network protocols / OpenFlow / Open vSwitch / Computer network

Robust fault-recovery in Software-Defined Networks IBSDN: IGP as a Backup in SDN Master’s thesis presented in partial fulfillment of the requirements for the degree of

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:55:27
152Terms of service / Privacy / Law / Data security / Internet privacy / Information governance / Identity management / Data protection / Prosper Marketplace / HTTP cookie / Information privacy / Medical privacy

Privacy Policy Last updated: May 14, 2018 OUR COMMITMENT TO PRIVACY Hello Prosper Inc., operating as “Prosper” (“Prosper”, “we”, or “us”) is committed to respecting and protecting your privacy. Prosper h

Add to Reading List

Source URL: helloprosper.com

Language: English - Date: 2018-05-18 14:40:03
153

CRIMES INVOLVING MORAL TURPITUDE INCLUDE: Listed under the Felony Voter Disqualification Act Codified as Code of Alabama (1975), sectionEffective August 1, 2017 per Act # • • •

Add to Reading List

Source URL: sos.alabama.gov

Language: English - Date: 2017-07-12 16:45:50
    154United States Department of Commerce / Identifiers / International Traffic in Arms Regulations / Military technology / United States law / Weapons / Freight forwarder / Economy / Trade / Human behavior

    Export Questionnaire This questionnaire highlights characteristics common to successful exporters. The score will help you assess your company’s export readiness as well as identify areas your business needs to strengt

    Add to Reading List

    Source URL: www.wyomingbusiness.org

    Language: English - Date: 2017-01-23 12:04:23
    155Technology / Terms of service / Social networking services / Digital media / Law / Internet privacy / Children's Online Privacy Protection Act / Social networks / Privacy / World Wide Web / Computer network / Privacy concerns with social networking services

    Area 3 (Security and Privacy) Danny Yoo () Abstract Imagine you are designing a Web-based system that enables sharing and communication between users who are as young as ten years of age. What are the secu

    Add to Reading List

    Source URL: www.hashcollision.org

    Language: English
    156Terms of service / Brand management / Brands / Intangible assets / Product management / Law / Computing / Marketing / Internet privacy / Trademark / Copyright / Privacy policy

    TERMS OF USE OF WEBSITE PLEASE READ CAREFULLY THESE TERMS OF USE OF WEBSITE BEFORE USING THE WEBSITE HTTPS://TOKENATOR.IO/ AND ONLINE SERVICES AT THIS WEBSITE, AS THEY AFFECT YOUR OBLIGATIONS AND LEGAL RIGHTS, INCLUDING,

    Add to Reading List

    Source URL: tokenator.io

    Language: English - Date: 2018-04-27 07:19:56
    157Cryptocurrencies / Blockchains / Ethereum / Emerging technologies / Computing / Concurrent computing / Distributed computing / Cross-platform software / Internet of things / Joseph Lubin / Smart contract

    Slock.it is an innovative, award-winning German startup in a unique position to be able to scale rapidly. Using our technologies, we help IoT devices to connect to Blockchain and, for instance, to participate as autonomo

    Add to Reading List

    Source URL: slock.it

    Language: English - Date: 2018-09-26 11:34:22
    158Federal Retirement Thrift Investment Board / Civil service in the United States / Thrift Savings Plan / Economy of the United States / Finance / Defense Finance and Accounting Service / Economy

    2016 SBST Project Abstracts SBST seeks, where feasible and cost-effective, to implement applications of behavioral insights to Federal policies and programs as demonstration projects, in order to generate evidence about

    Add to Reading List

    Source URL: sbst.gov

    Language: English - Date: 2017-05-02 18:15:57
    159Computer access control / Computer security / Identity management / Identity / Federated identity / Single sign-on / Identity provider / Multi-factor authentication / Security Assertion Markup Language / OAuth / Password management / Integrated Windows Authentication

    Application Security—Made in Switzerland Overview The problem of internet security is almost as old as the internet itself. But there is a reliable solution: Airlock Suite from Ergon. Airlock Suite is underpinned by

    Add to Reading List

    Source URL: www.airlock.com

    Language: English - Date: 2016-09-15 09:49:08
    160Mathematical logic / Logic / Model theory / Metalogic / Predicate logic / Formal methods / Resolution / First-order logic / Skolem normal form / Automated theorem proving / Quantifier / Axiom

    11 Theorem-Proving by Resolution as a Basis for Question-Answering Systems Cordell Green Stanford Research Institute Menlo Park. California

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2011-11-14 21:00:52
    UPDATE