Academic literature on the topic 'Secret des sources'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secret des sources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secret des sources"

1

Perraud, Antoine. "Secret des sources." Médium 37-38, no. 4 (2013): 213. http://dx.doi.org/10.3917/mediu.037.0213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rowson, Everett K., W. F. Ryan, and Charles B. Schmitt. "Pseudo-Aristotle, The Secret of Secrets. Sources and Influences." Journal of the American Oriental Society 107, no. 1 (1987): 188. http://dx.doi.org/10.2307/603000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jovicic, Katarina. "Trade Secret Protection in the Law of the Republic of Serbia." Pravo i privreda 60, no. 4 (2022): 655–74. http://dx.doi.org/10.55836/pip_22403a.

Full text
Abstract:
The subject of this paper is analysis of trade secret protection in Serbian law, which is organized and implemented at two levels: within the business company and the proceedings before the court. By applying the dogmatic method of research, the rules of current and relevant domestic sources of law are analysed, while the comparative method is used for comparing the Serbian system of trade secret legal protection with the analogous legal system in the European Union. The starting hypothesis is that the protection of trade secrets is a strategic issue that requires thoughtful planning and organ
APA, Harvard, Vancouver, ISO, and other styles
4

Warusfel, Bertrand. "Le droit peut-il encore protéger le secret ?" Titre VII N° 10, no. 1 (2023): 1–10. http://dx.doi.org/10.3917/tvii.010.0001.

Full text
Abstract:
Le secret est une pratique qui a toujours eu maille à partir avec le droit, d’autant que les exigences de transparence ou de publicité sont de plus en plus importantes dans notre société. Entre des obligations de secret et les différents droits d’information que tout État produit, existe une tension dialectique. On le constate dans de nombreux domaines (qu’il s’agisse notamment des secrets professionnels ou de celui des sources des journalistes), mais la numérisation bouscule également les périmètres de confidentialité que la loi cherche à préserver, comme le montrent les difficultés de protec
APA, Harvard, Vancouver, ISO, and other styles
5

Fraise, Thomas. "Comment cacher un nuage ? L’organisation du secret des essais atmosphériques français (1957-1974)." Relations internationales 194, no. 2 (2023): 11–26. http://dx.doi.org/10.3917/ri.194.0011.

Full text
Abstract:
Comment organiser le secret autour d’une activité aussi remarquable, et aussi sensible, que des essais nucléaires atmosphériques ? Comment contrôler l’information quand celle-ci est – littéralement – transportée par le vent ? Basé sur des sources primaires, cet article se penche sur le régime original de secret organisé autour des sites d’essais français entre 1957 et 1974, et sur les enjeux qu’il pose en termes de contrôle de l’information et de la démocratie. Il montre comment le souci de protéger les « secrets stratégiques » de l’arsenal français, pourtant impossibles à garder, se combinait
APA, Harvard, Vancouver, ISO, and other styles
6

Nitinawarat, Sirin, and Prakash Narayan. "Secret Key Generation for Correlated Gaussian Sources." IEEE Transactions on Information Theory 58, no. 6 (2012): 3373–91. http://dx.doi.org/10.1109/tit.2012.2184075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Courpasson, David, and Dima Younes. "Double or Quits: Understanding the Links between Secrecy and Creativity in a Project Development Process." Organization Studies 39, no. 2-3 (2017): 271–95. http://dx.doi.org/10.1177/0170840617727780.

Full text
Abstract:
Most studies on the links between secrecy and creativity have focused on individual sources of creativity and the impact of organizational management on creative initiatives. However, because of their very focus on individual practices of concealment and personal creative capacities, they have paid scant attention to collective interactions occurring around secrets. In this paper, we illuminate some mechanisms through which the creative work achieved in secret by scientists is enhanced by the exceptional character of their situation within the company. Coping with these exceptional circumstanc
APA, Harvard, Vancouver, ISO, and other styles
8

Berndtsson, Tim. "Frimureriets medier: Om 1700-talsfrimureriets mediering av hemligheter i tal, handskrift och tryck." Sjuttonhundratal 14 (December 19, 2017): 17–39. http://dx.doi.org/10.7557/4.4154.

Full text
Abstract:
Masonic Media: On Mediation of Secrets in Speech, Handwriting and Print within Eighteenth Century Freemasonry.This article deals with 18th century Freemasonry as a platform for mediation of secrets. First it discusses different theoretical aspects that can be applied when studying the phenomenon of initiatory orders with communication in focus. But it also uses different masonic sources in order to investigate some of the techniques used to mediate secrets, most notably ciphers and hieroglyphs. Aligning myself with Linda Simonis’ system theoretical view of masonry, I show that masonry depended
APA, Harvard, Vancouver, ISO, and other styles
9

Levy, Jean-Paul. "Le secret de l'enquête et de l'instruction, le recel et le secret des sources." LEGICOM 48, no. 1 (2012): 47. http://dx.doi.org/10.3917/legi.048.0047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations." Inner Asia 4, no. 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.

Full text
Abstract:
AbstractThe Secret History of the Potala Palace, a 1989 film about Mongol-Tibetan relations in the seventeenth century, was a milestone in the still tentative development of Tibetan film, with significant Tibetan participation and close attention to Tibetan sources of history. This paper suggests possible reasons for the withdrawal of the film from circulation, and proposes ways of reading film in the context of contested versions of ethnicity.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Secret des sources"

1

Zemmouri, Catherine. "La protection du secret des sources du journaliste." Electronic Thesis or Diss., Université Paris-Panthéon-Assas, 2023. http://www.theses.fr/2023ASSA0082.

Full text
Abstract:
La liberté d’expression et de communication est une liberté fondamentale est un des éléments clé de la démocratie. Elle est donc à ce titre depuis longtemps protégée, pourtant l’un de ses piliers, la protection du secret des sources du journaliste a longtemps été ignorée et n’est aujourd’hui encore qu’imparfaitement reconnue. Cet état de fait est principalement lié à des raisons politiques. Ce refus et cette reconnaissance partielle et tardive s’expliquent beaucoup par le fait que les enquêtes journalistiques d’intérêt public peuvent viser potentiellement des hommes politiques. Une reconnaissa
APA, Harvard, Vancouver, ISO, and other styles
2

De, Witte Parra Mona. "La protection du renseignement britannique, américain et allemand pendant la Seconde Guerre mondiale." Thesis, Reims, 2016. http://www.theses.fr/2016REIML004.

Full text
Abstract:
Cette thèse est consacrée à l’étude de la protection des sources de renseignement britanniques pendant la Seconde Guerre mondiale, en enrichissant cette analyse grâce à des éléments de comparaison avec les pratiques privilégiées aux États-Unis et en Allemagne. Dans ces trois pays, des approches très différentes sont adoptées afin de s’assurer de la durabilité des sources et de pouvoir continuer à exploiter ces données précieuses, témoignant d’appréhensions variées de l’impératif de préserver ces sources et de politiques diverses à l’égard du choix complexe entre utilisation d’un renseignement
APA, Harvard, Vancouver, ISO, and other styles
3

Lévêque, Cyrielle. "Artification de l’archive : une dialectique entre figures et absences." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0334.

Full text
Abstract:
L’élaboration de ce travail de thèse s’inscrit dans une démarche universitaire, elle est également pensée de manière simultanée avec la création artistique. Elle s’oriente vers des questionnements liés à une quête personnelle, intime, mais également « traquée » dans une voie plus large qui est celle de la généalogie, de la photographie de famille, de l’image documentaire et des zones d’ombres qui font partie de toute histoire personnelle. Des mécanismes de résistance à l’artification se déploient comme tentative de réponse artistique et de recherche, face à une histoire mutique, un manque de p
APA, Harvard, Vancouver, ISO, and other styles
4

Brenes, Vargas Rodolfo. "Contribution à l'étude des abus de la liberté d'expression dans le domaine judiciaire : étude de politique criminelle : l'exemple de la France et du Costa Rica." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01D018.

Full text
Abstract:
La liberté d’expression est aujourd’hui considérée comme l’un des éléments essentiels d’une société démocratique. Sous l’impulsion de la jurisprudence européenne et interaméricaine des droits de l’homme, elle a acquis une dimension nouvelle et bénéficie d’une large protection. Cependant, et malgré son importance, cette liberté n’est pas absolue, elle doit être conciliée avec d’autres droits de valeur équivalente et des impératifs juridiques qui méritent aussi d’être protégés.Traditionnellement le moyen de régulation et de sanction des abus de la liberté d’expression a été le droit pénal. Cepen
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Xiaole, Ivan B. Djordjevic, and Mark A. Neifeld. "Secret Key Rates and Optimization of BB84 and Decoy State Protocols Over Time-Varying Free-Space Optical Channels." IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2016. http://hdl.handle.net/10150/621687.

Full text
Abstract:
We optimize secret key rates (SKRs) of weak coherent pulse (WCP)-based quantum key distribution (QKD) over time-varying free-space optical channels affected by atmospheric turbulence. The random irradiance fluctuation due to scintillation degrades the SKR performance of WCP-based QKD, and to improve the SKR performance, we propose an adaptive scheme in which transmit power is changed in accordance with the channel state information. We first optimize BB84 and decoy state-based QKD protocols for different channel transmittances. We then present our adaptation method, to overcome scintillation e
APA, Harvard, Vancouver, ISO, and other styles
6

Darmon, Julien. "La loi du secret : la kabbale comme source de halakha chez r. Joseph Caro et les décisionnaires séfarades ultérieurs." Paris, EHESS, 2007. http://www.theses.fr/2007EHES0110.

Full text
Abstract:
Contrairement à une idée répandue, les questions légales et rituelles sont au centre des préoccupations des kabbalistes. Et, en retour, la littérature halakhique est très loin d'avoir ignoré le discours kabbalistique sur ces questions. Depuis les débuts de la kabbale, voire dans le Talmud déjà, les deux ordres de discours s'interpénétrent. Leur unité organique et la finalité messianique de leur dialectique trouve son expression la plus claire dans l'introduction du 'Ets Hayyim, principal texte de la kabbale lurianique. A la lumière des notions qui y sont exposées, et guidée par le concept de h
APA, Harvard, Vancouver, ISO, and other styles
7

Lazoul, Mohamed. "Etude de la génération paramétrique optique dans les cristaux photoniques non linéaires : application aux sources multilongueurs d'onde." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_lazoul.pdf.

Full text
Abstract:
Le but de ce travail est de proposer de nouvelles solutions basées sur l’optique non linéaire pour réaliser des sources de lumière cohérente multilongueurs d’onde flexibles et hautement efficaces. On s’intéresse plus particulièrement à la génération paramétrique optique dans les cristaux photoniques non linéaires de second ordre. En premier lieu nous avons étudié la génération paramétrique avec quasi-accord de phase non colinéaire dans les cristaux PPLT-1D. Nous nous sommes intéressés aux mécanismes d’accord de phase ainsi que les longueurs d’onde générées en fonction des paramètres du cristal
APA, Harvard, Vancouver, ISO, and other styles
8

Friedman, Yaron. "Les Nusayri-ʿAlawis : entre sunna et shiʿa, refus et acceptation selon les sources arabes médiévales et modernes". Paris 4, 2006. http://www.theses.fr/2006PA040012.

Full text
Abstract:
L'étude de la secte Nuîayri-‘AlawÌte revêt une importance particulière, car il s’agit de la seule secte à gouverner un pays du Moyen-Orient. Ce travail présente divers aspects de la secte et évoque son image, telle qu’elle transparaît dans les sources Musulmanes. Cette thèse identifie l’existence, dans le monde musulman, de trois attitudes importantes à l’égard de la secte NuîayrÌ-‘AlawÌte: Une forte hostilité parmi la majorité sunnite. Une coexistence, au sein du žÌ‘Ìsme, entre indulgence et hostilité. Une réaction apologétique de la part des NuîayrÌs-AlawÌs eux-mêmes. L’analyse des textes ar
APA, Harvard, Vancouver, ISO, and other styles
9

Delbe, Jean. "L'idf45 (inhibitory diffusible factor 45 kda) : un inhibiteur de croissance secrete par les fibroblastes de souris." Paris 6, 1991. http://www.theses.fr/1991PA066459.

Full text
Abstract:
Nos resultats apportent des elements nouveaux dans la comprehension du mode d'action d'un inhibiteur de croissance (idf45) que nous avons purifie a partir de milieu conditionne par des cultures denses de cellules 3t3 swiss. C'est une proteine monomerique de 45 kda, qui inhibe de maniere reversible la croissance des fibroblastes embryonnaires de poulet (cef). L'idf45 inhibe a 100% la stimulation de la synthese d'adn induite par le serum et par l'igf-1 dans ces cellules. Il s'agit d'une proteine de liaison des igfs (igfbp) qui presente des homologies structurelles et fonctionnelles avec l'igfbp-
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Shiping. "Peptides as amino acid sources for the synthesis of secreted proteins by mammary tissue explants and cultured mammary epithelial cells." Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/39137.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Secret des sources"

1

Snow California: Delicious destinations, secret hideaways, expert sources. GPP Travel, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Métamorphose de Descartes: Le secret de Sartre. Gallimard, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Quincey, Stewart Anthony Terence, and Great Britain. Public Record Office., eds. Michael Collins: The secret file. Blackstaff, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilkinson, Alan. The secret battle: Stoke Field, 16th June 1487. Midas of Nottingham, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jacquemin, Marion. La protection des sources des journalistes. CFPJ, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nath, Chopra Pran, and Bakshi S. R. 1935-, eds. Quit India Movement: British secret documents. Interprint, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The passionate shopper: Secret sources for you and your home. Hearst Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Journal secret: 1886-1889. Mercure de France, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brejc, Miha. Vmesni čas: Varnostno-informativna služba in nastajanje nove slovenske države, 1990-1993. Mladinska knjiga, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Források a titkosszolgálatok politológiai tanulmányozásához. JATEPress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secret des sources"

1

Mayne, Andrew. "Sources and Background." In The Secret Agent by Joseph Conrad. Macmillan Education UK, 1987. http://dx.doi.org/10.1007/978-1-349-09206-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dodis, Yevgeniy, Krzysztof Pietrzak, and Bartosz Przydatek. "Separating Sources for Encryption and Secret Sharing." In Theory of Cryptography. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11681878_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Danbury, Richard, and Judith Townend. "Can you keep a secret? Legal and technological obstacles to protecting journalistic sources 1." In Journalism, Power and Investigation. Routledge, 2019. http://dx.doi.org/10.4324/9781315181943-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hesz, Ágnes. "Secret police informer files as sources for the study of vernacular religion under communism." In The Secret Police and the Religious Underground in Communist and Post-Communist Eastern Europe. Routledge, 2021. http://dx.doi.org/10.4324/9780429331466-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Muramatsu, Jun, and Shigeki Miyake. "Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices." In Mathematical Modelling for Next-Generation Cryptography. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5065-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krasner, David. "Secrets and Sources." In An Actor’s Craft. Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-0-230-35772-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gibson, Stevyn D. "Exploring the role and value of open source intelligence." In Secret Intelligence, 2nd ed. Routledge, 2019. http://dx.doi.org/10.4324/9780429029028-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Azcárate, Asunción López-Varela. "Private Secrets and Open Sources." In Neglected American Women Writers of the Long Nineteenth Century. Routledge, 2019. http://dx.doi.org/10.4324/9780429201837-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pearson, Mark. "Confidentiality, secrets, sources and disclosure." In The Communicator's Guide to Media Law and Ethics. Routledge, 2023. http://dx.doi.org/10.4324/9781003372752-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Araújo, Hugo André Flores Fernandes. "Secrecy, War, and Communication: Challenges and Strategies of the General-Government of the State of Brazil in the Second Half of the Seventeenth Century." In Privacy at Sea. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-35847-0_8.

Full text
Abstract:
AbstractThis chapter aims to identify the consequences of seizing correspondence at sea and the subsequent revealing of state secrets in seventeenth-century Brazil. The wars of the colonial empires of the early modern era highlight the centrality of overseas territories in these disputes. The conflict against the Dutch West India Company in the South Atlantic (1630–1654) demonstrates how the Portuguese had to deal with problems arising from the invasion and the constant attack on navigation routes, which affected communication and commerce. The present analysis uses a set of sources: correspondence issued by Governors-general, orders, regiments, instructions, ciphered letters, and printed leaflets. The study of the Portuguese policies of secrecy allows us to understand the role strategies employed to secure privacy and secrecy by Portuguese authorities. This chapter also proposes that the sea enabled and challenged notions of privacy at the state level, evidentiating how colonial disputes in this in-between space demanded secrecy.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secret des sources"

1

Prabhakaran, Vinod M., Krishnan Eswaran, and Kannan Ramchandran. "Secrecy via sources and channels — A secret key - Secret message rate tradeoff region." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eswaran, Krishnan, Vinod M. Prabhakaran, and Kannan Ramchandran. "Secret communication using sources and channels." In 2008 42nd Asilomar Conference on Signals, Systems and Computers. IEEE, 2008. http://dx.doi.org/10.1109/acssc.2008.5074492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nitinawarat, Sirin. "Secret key generation for correlated Gaussian sources." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595077.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reny, Jian, Lein Harnz, and Tongtong Li. "How to leak a secret from multiple sources." In MILCOM 2008 - 2008 IEEE Military Communications Conference (MILCOM). IEEE, 2008. http://dx.doi.org/10.1109/milcom.2008.4753202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Pin-Hsun, Carsten R. Janda, Eduard A. Jorswieck, and Rafael F. Schaefer. "Stealthy keyless secret key generation from degraded sources." In 2017 51st Asilomar Conference on Signals, Systems, and Computers. IEEE, 2017. http://dx.doi.org/10.1109/acssc.2017.8335126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aleksandrova, Elena Mikhaylovna. "THE SECRET SOCIETY: GAME OF FAITH." In Themed collection of papers from Foreign International Scientific Conference «Trends in the development of science and Global challenges» Ьу НNRI «National development» in cooperation with AFP. April 2023. - Managua (Nicaragua). Crossref, 2023. http://dx.doi.org/10.37539/230415.2023.56.16.023.

Full text
Abstract:
The article focuses on finding and decoding the information about the secret society. We identify the sources which contain the information about the community in religious, scholarly and popular science literature, analyze the data presented in these sources, and point out possible solutions to the problem.
APA, Harvard, Vancouver, ISO, and other styles
7

Khisti, Ashish, Suhas N. Diggavi, and Gregory Wornell. "Secret-key generation with correlated sources and noisy channels." In 2008 IEEE International Symposium on Information Theory - ISIT. IEEE, 2008. http://dx.doi.org/10.1109/isit.2008.4595138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ling, Cong, Laura Luzzi, and Matthieu R. Bloch. "Secret key generation from Gaussian sources using lattice hashing." In 2013 IEEE International Symposium on Information Theory (ISIT). IEEE, 2013. http://dx.doi.org/10.1109/isit.2013.6620701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cao, Daming, and Wei Kang. "Secret key generation from correlated sources and secure link." In 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2017. http://dx.doi.org/10.1109/wcsp.2017.8171157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla, and Qiaoqiao Zhou. "One-Shot Perfect Secret Key Agreement for Finite Linear Sources." In 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849668.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secret des sources"

1

Mcalpin, Jerry D. Information Requirements for the Secure Transportation of Radioactive Sources. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1499300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Robitaille, George E. Small Modular Reactors: The Army's Secure Source of Energy? Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada561802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bagnulo, M., and A. Garcia-Martinez. SEcure Neighbor Discovery (SEND) Source Address Validation Improvement (SAVI). RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barton, Adam. The Secret Sauce of Development Professionals: Tools for Assessing TOR Potential to Source Scalable Learning Interventions. Research on Improving Systems of Education (RISE), 2023. http://dx.doi.org/10.35489/bsg-rise-ri_2023/054.

Full text
Abstract:
Terms of reference (TORs) play an outsized role in driving scalable educational programming. These procurement documents shape, constrain, and signal programme priorities and possibilities. Successful funders and implementers across the globe hold rich processual knowledge about this documentation, which they use to draft and assess TORs. This project explores such best-practice knowledge around TOR review, seeking to support the design and implementation of educational programmes that can improve learning at scale in developing contexts.
APA, Harvard, Vancouver, ISO, and other styles
5

Ehud Greenspan. STAR: The Secure Transportable Autonomous Reactor System - Encapsulated Fission Heat Source. Office of Scientific and Technical Information (OSTI), 2003. http://dx.doi.org/10.2172/816808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saydjari, Sami. Defense Advanced Research Project Agency (DARPA) Information Assurance Program: Secure Open Source OS Workshop. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada399895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tsvetkov, Pavel Valeryevich, Salvador B. Rodriguez, David E. ,. II Ames, and Gary Eugene Rochau. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/992316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tsvetkov, Pavel Valeryevich, Salvador B. Rodriguez, David E. ,. II Ames, and Gary Eugene Rochau. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/992769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca013.

Full text
Abstract:
Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful digital supply chain attacks against cyber infrastructure suggest the answer may be no. This report introduces policymakers to these emerging threats and provides recommendations for how to secure the machine learning supply chain.
APA, Harvard, Vancouver, ISO, and other styles
10

Greenspan, Ehud. STAR: The Secure Tranportable Autonomous Reactor system, Encapsulated Fission Heat Source. Progress report for period terminating March 31, 2000. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/761826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!