Littérature scientifique sur le sujet « Sensitive date »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Sensitive date ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Sensitive date"

1

Canet, R. "Sowing Date for Photoperiod Sensitive Caribe 7." International Rice Research Newsletter 11, no. 2 (1986): 30–31. https://doi.org/10.5281/zenodo.7121702.

Texte intégral
Résumé :
This article 'Sowing Date for Photoperiod Sensitive Caribe 7' appeared in the International Rice Research Newsletter series, created by the International Rice Research Institute (IRRI). The primary objective of this publication was to expedite communication among scientists concerned with the development of improved technology for rice and for rice based cropping systems. This publication will report what scientists are doing to increase the production of rice in as much as this crop feeds the most densely populated and land scarce nations in the world.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Culp, Rex E. "Up-to-Date, but Are They Culturally Sensitive?" Contemporary Psychology: A Journal of Reviews 37, no. 9 (1992): 899. http://dx.doi.org/10.1037/032570.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kovi, Mallikarjuna Rao, Yong Hu, Xufeng Bai, and Yongzhong Xing. "QTL mapping for thermo-sensitive heading date in rice." Euphytica 205, no. 1 (2015): 51–62. http://dx.doi.org/10.1007/s10681-015-1383-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Fang, Jinggui, and ChihCheng T. Chao. "Methylation Sensitive Amplification Polymorphism in Date Palms and Their Offshoots." HortScience 41, no. 4 (2006): 994A—994. http://dx.doi.org/10.21273/hortsci.41.4.994a.

Texte intégral
Résumé :
DNA methylation plays an important role in the regulation of gene expression in eukaryotes. The extent and patterns of DNA methylation were assessed in the date palm (Phoenix dactylifera L.) mother plants and their offshoots using the methylation sensitive amplified polymorphism (MSAP) technique. Three types of bands were generated using 12 pairs of primers. Type I bands were present in both EcoR I + Hpa II and EcoR I + Msp I lanes; type II bands were present in EcoR I + Hpa II lanes, but not in EcoR I + Msp I lanes; and type III bands were present in EcoR I + Msp I lanes, but not in EcoR I +
Styles APA, Harvard, Vancouver, ISO, etc.
5

CRANSTON, PETER S., FRANK-THORSTEN KRELL, KEN WALKER, and DAVID HEWES. "Wiley's Early View constitutes valid publication for date-sensitive nomenclature." Systematic Entomology 40, no. 1 (2015): 2–4. http://dx.doi.org/10.1111/syen.12119.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Abdulai, A. L., M. Kouressy, M. Vaksmann, F. Asch, M. Giese, and B. Holger. "Latitude and Date of Sowing Influences Phenology of Photoperiod-Sensitive Sorghums." Journal of Agronomy and Crop Science 198, no. 5 (2012): 340–48. http://dx.doi.org/10.1111/j.1439-037x.2012.00523.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Ziouti, A., C. Modafar, A. Fleuriet, S. Boustani, and J. J. Macheix. "Phenolic compounds in date palm cultivars sensitive and resistant toFusarium oxysporum." Biologia plantarum 38, no. 3 (1996): 451–57. http://dx.doi.org/10.1007/bf02896679.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Townsend, Teresa, Leigh Lane, and James Martin. "Context-Sensitive Solutions." Transportation Research Record: Journal of the Transportation Research Board 1904, no. 1 (2005): 66–74. http://dx.doi.org/10.1177/0361198105190400107.

Texte intégral
Résumé :
Context-sensitive solutions (CSS) is a comprehensive approach to transportation decision making that embraces the philosophy that transportation programs and projects should address the transportation need, be an asset to the community, and be compatible with the human and natural environment. The CSS movement is rooted in years of controversy stemming from the dissatisfaction of concerned citizens, environmentalists, historic preservationists, multimodal advocates, and others in the transportation decision-making process. In 2002 the North Carolina Department of Transportation (NCDOT) signed
Styles APA, Harvard, Vancouver, ISO, etc.
9

Petrides, George, and Wouter Verbeke. "Cost-sensitive ensemble learning: a unifying framework." Data Mining and Knowledge Discovery 36, no. 1 (2021): 1–28. http://dx.doi.org/10.1007/s10618-021-00790-4.

Texte intégral
Résumé :
AbstractOver the years, a plethora of cost-sensitive methods have been proposed for learning on data when different types of misclassification errors incur different costs. Our contribution is a unifying framework that provides a comprehensive and insightful overview on cost-sensitive ensemble methods, pinpointing their differences and similarities via a fine-grained categorization. Our framework contains natural extensions and generalisations of ideas across methods, be it AdaBoost, Bagging or Random Forest, and as a result not only yields all methods known to date but also some not previousl
Styles APA, Harvard, Vancouver, ISO, etc.
10

NANDITA. N, DEVI, KOMANG DHARMAWAN, and DESAK PUTU EKA NILAKUSMAWATI. "ANALISIS SENSITIVITAS HARGA OPSI MENGGUNAKAN METODE GREEK BLACK SCHOLES." E-Jurnal Matematika 7, no. 2 (2018): 148. http://dx.doi.org/10.24843/mtk.2018.v07.i02.p197.

Texte intégral
Résumé :
Sensitivity analysis can be used to carry out hedging strategies. The sensitivity value measures how much the price change of the option influenced by some parameters. The aim of this study is to determine the sensitivity analysis of the buying price of European option by using the Greek method on Black Scholes Formula. From this study we get the values of delta, gamma, theta, vega, and rho. The values of deltas, gamma, vega, and rho are positive, which means that the value of the option is more sensitive than the corresponding parameter. The most sensitive value of gamma is obtained when the
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "Sensitive date"

1

Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Folkesson, Carl. "Anonymization of directory-structured sensitive data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-160952.

Texte intégral
Résumé :
Data anonymization is a relevant and important field within data privacy, which tries to find a good balance between utility and privacy in data. The field is especially relevant since the GDPR came into force, because the GDPR does not regulate anonymous data. This thesis focuses on anonymization of directory-structured data, which means data structured into a tree of directories. In the thesis, four of the most common models for anonymization of tabular data, k-anonymity, ℓ-diversity, t-closeness and differential privacy, are adapted for anonymization of directory-structured data. This adapt
Styles APA, Harvard, Vancouver, ISO, etc.
3

Subbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Texte intégral
Résumé :
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and co
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bakri, Mustafa al. "Uncertainty-Sensitive Reasoning over the Web of Data." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM073.

Texte intégral
Résumé :
Dans cette thèse, nous étudions plusieurs approches destinées à aider les utilisateurs à trouver des informations utiles et fiables dans le Web de données, en utilisant les technologies du Web sémantique. Nous abordons pour cela deux thèmes de recherche: le liage de données dans le Linked-Data et la confiance dans les réseaux P2P sémantiques. Nous modélisons le problème de liage dans le Web de données comme un problème de raisonnement sur des données incomplètes, qu'il s'agit d'enrichir en interrogeant de façon précise et pertinente le cloud du Linked Data. Nous avons conçu et implémenté un no
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ljus, Simon. "Purging Sensitive Data in Logs Using Machine Learning." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411610.

Texte intégral
Résumé :
This thesis investigates how to remove personal data from logs using machine learning when rule-based scripts are not enough and manual scanning is too extensive. Three types of machine learning models were created and compared. One word model using logistic regression, another word model using LSTM and a sentence model also using LSTM. Data logs were cleaned and annotated using rule-based scripts, datasets from various countries and dictionaries from various languages. The created dataset for the sentence based model was imbalanced, and a lite version of data augmentation was applied. A hyper
Styles APA, Harvard, Vancouver, ISO, etc.
6

Oshima, Sonoko. "Neuromelanin‐Sensitive Magnetic Resonance Imaging Using DANTE Pulse." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263531.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

El-Khoury, Hiba. "Introduction of New Products in the Supply Chain : Optimization and Management of Risks." Thesis, Jouy-en Josas, HEC, 2012. http://www.theses.fr/2012EHEC0001/document.

Texte intégral
Résumé :
Les consommateurs d’aujourd’hui ont des goûts très variés et cherchent les produits les plus récents. Avec l’accélération technologique, les cycles de vie des produits se sont raccourcis et donc, de nouveaux produits doivent être introduits au marché plus souvent et progressivement, les anciens doivent y être retirés. L’introduction d’un nouveau produit est une source de croissance et d’avantage concurrentiel. Les directeurs du Marketing et Supply Chain se sont confrontés à la question de savoir comment gérer avec succès le remplacement de leurs produits et d’optimiser les coûts de la chaîne d
Styles APA, Harvard, Vancouver, ISO, etc.
8

Gholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.

Texte intégral
Résumé :
Cloud computing offers the prospect of on-demand, elastic computing, provided as a utility service, and it is revolutionizing many domains of computing. Compared with earlier methods of processing data, cloud computing environments provide significant benefits, such as the availability of automated tools to assemble, connect, configure and reconfigure virtualized resources on demand. These make it much easier to meet organizational goals as organizations can easily deploy cloud services. However, the shift in paradigm that accompanies the adoption of cloud computing is increasingly giving rise
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mathew, George. "A Perturbative Decision Making Framework for Distributed Sensitive Data." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/269109.

Texte intégral
Résumé :
Computer and Information Science<br>Ph.D.<br>In various business domains, intelligence garnered from data owned by peer institutions can provide useful information. But, due to regulations, privacy concerns and legal ramifications, peer institutions are reluctant to share raw data. For example, in medical domain, HIPAA regulations, Personally Identifiable Information and privacy issues are impediments to data sharing. However, intelligence can be learned from distributed data sets if their key characteristics are shared among desired parties. In scenarios where samples are rare locally, but ad
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ansell, Peter. "A context sensitive model for querying linked scientific data." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/49777/1/Peter_Ansell_Thesis.pdf.

Texte intégral
Résumé :
This thesis provides a query model suitable for context sensitive access to a wide range of distributed linked datasets which are available to scientists using the Internet. The model is designed based on scientific research standards which require scientists to provide replicable methods in their publications. Although there are query models available that provide limited replicability, they do not contextualise the process whereby different scientists select dataset locations based on their trust and physical location. In different contexts, scientists need to perform different data cleaning
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "Sensitive date"

1

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Photopoulos, Constantine. Managing catastrophic loss of sensitive data. Syngress Pub., 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Claire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruylant, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Office, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Great Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Daniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2nd ed. Georgia State Univ. Business Press, 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Computer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Computer Security Analysts, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

E, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Sage Publications, 1986.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ficco, Massimo, and Gianni D'Angelo, eds. Artificial Intelligence Techniques for Analysing Sensitive Data in Medical Cyber-Physical Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-70775-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "Sensitive date"

1

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Introduction." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Computational Efficiency." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Practical Considerations." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Empirical Evaluation." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Real-world Applications." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Future Research Challenges and Directions." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Regulatory Frameworks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Linking Sensitive Data Background." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Private Information Sharing Protocols." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Assessing Privacy and Risks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Sensitive date"

1

Zhang, Liwei, Tong Zhang, Wenxue Wu, Xiaoqin Feng, Guoxi Lin, and Fengyuan Ren. "Fault- Tolerant Cyclic Queuing and Forwarding in Time-Sensitive Networking." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546689.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Macdonald, Digby D., Mima Urquidi-Macdonald, and Chun Liu. "The Deterministic Prediction of Damage in Light Water Nuclear Reactors." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93173.

Texte intégral
Résumé :
Abstract Localized corrosion phenomena, including pitting corrosion, stress corrosion cracking, and corrosion fatigue, are the principal causes of corrosion-induced damage in electric power generating facilities and typically result in more than 50% of the unscheduled outages. Prediction of damage, so that repairs and inspections can be made during scheduled outages, could have an enormous impact on the economics of electric power generation. To date, prediction of corrosion damage has been made on the basis of empirical/statistical methods that have proven to be insufficiently robust and accu
Styles APA, Harvard, Vancouver, ISO, etc.
3

Holmes, R. M., and D. J. Surman. "XPS and Auger Investigation of Mechanisms Affecting Corrosion Inhibition of Metals." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89609.

Texte intégral
Résumé :
Abstract Atmospheric corrosion of metal surfaces need not be extremely obvious to cause extensive damage to many products. Very small corrosion pits and spots can cause defects in critical copper surfaces, often resulting in the catastrophic failure of complete electronic assemblies. Microscopic pit corrosion in steel can lead to the complete failure of subsequently added coatings or finishings, as the automotive industry have become aware. In addition, corrosion at its earliest stages can initiate further corrosion at a later date, resulting in inferior finishings or coatings. A major interes
Styles APA, Harvard, Vancouver, ISO, etc.
4

Andresen, Peter L., and Clyde L. Briant. "Environmentally Assisted Cracking of 304L/316L/316NG Stainless Steels in 288°C Water." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88262.

Texte intégral
Résumé :
Abstract The objective of this study is to identify the causes of intergranular environmentally assisted cracking in non-chromium depleted stainless steels, a phenomenon which has been observed under irradiated and non- irradiated conditions. Special emphasis is placed on quantifying the possible effects of sulfur, phosphorus and nitrogen relative to chromium depletion and aqueous impurities in altering both the crack growth rate and cracking morphology in 288°C water. Eleven custom and three commercial heats have been examined to date, including several containing exaggerated sulfur levels. S
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chandran, Sandeep, Smruti R. Sarangi, and Preeti Ranjan Panda. "Space Sensitive Cache Dumping for Post-silicon Validation." In Design Automation and Test in Europe. IEEE Conference Publications, 2013. http://dx.doi.org/10.7873/date.2013.113.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ottlik, Sebastian, Christoph Gerum, Alexander Viehl, Wolfgang Rosenstiel, and Oliver Bringmann. "Context-sensitive timing automata for fast source level simulation." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927042.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Li, Ang, Peng Li, Tingwen Huang, and Edgar Sanchez-Sinencio. "Noise-sensitive feedback loop identification in linear time-varying analog circuits." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927190.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Schmidt, Tim, Zhongqi Cheng, and Rainer Domer. "Port call path sensitive conflict analysis for instance-aware parallel SystemC simulation." In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2018. http://dx.doi.org/10.23919/date.2018.8342034.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Guerra, R., and G. Fohler. "On-line scheduling of target sensitive periodic tasks with the gravitational task model." In 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012). IEEE, 2012. http://dx.doi.org/10.1109/date.2012.6176536.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Chen, Shu-Yung, Chien-Hao Chen, and Ren-Song Tsay. "An activity-sensitive contention delay model for highly efficient deterministic full-system simulations." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.226.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Sensitive date"

1

Taylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Understanding the Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375686.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Taylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Dangers and Opportunities. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375687.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Toomey, Rickard, Vincent Santucci, Justin Tweet, Vincent Santucci, Rickard Toomey, and Justin Tweet. Mammoth Cave National Park: Paleontological resource inventory (sensitive version). National Park Service, 2024. http://dx.doi.org/10.36967/2306041.

Texte intégral
Résumé :
Mammoth Cave National Park (MACA) in south-central Kentucky protects one of the most famous and extensive cave systems in the world. Fossils, both in the bedrock of the cave system and as much more recent remains that date to the cave era, have been reported since at least the first half of the 19th century, but have rarely been a focus of investigation. In 2019, following a report of shark fossils in the wall of a cave passage, a team of MACA staff and volunteers, members of the National Park Service (NPS) Paleontology Program, and paleontological specialists from outside the NPS began a pale
Styles APA, Harvard, Vancouver, ISO, etc.
4

Curtis, Rob, Sonia Bingham, and Megan Shaeffer. Natural resource assessment of the proposed Columbia Sensitive Resource Zone, Cuyahoga Valley National Park, Ohio. National Park Service, 2025. https://doi.org/10.36967/2310114.

Texte intégral
Résumé :
From 2021 – 2023, Cuyahoga Valley National Park (CUVA) and Summit Metro Parks (SMP) worked collaboratively through an interagency agreement to inventory and classify natural and cultural resources in an ecologically sensitive zone around Blue Hen Falls and Columbia Picnic area. Increased visitation in recent years created safety concerns, trail erosion and damage to sensitive resources and locally rare habitats. At the time of this study, these areas were located within one of CUVA’s management areas proposed as a Sensitive Resource Zone (SRZ), specifically the Columbia SRZ. The SRZ designatio
Styles APA, Harvard, Vancouver, ISO, etc.
5

Cohen, Yuval, Christopher A. Cullis, and Uri Lavi. Molecular Analyses of Soma-clonal Variation in Date Palm and Banana for Early Identification and Control of Off-types Generation. United States Department of Agriculture, 2010. http://dx.doi.org/10.32747/2010.7592124.bard.

Texte intégral
Résumé :
Date palm (Phoenix dactylifera L.) is the major fruit tree grown in arid areas in the Middle East and North Africa. In the last century, dates were introduced to new regions including the USA. Date palms are traditionally propagated through offshoots. Expansion of modern date palm groves led to the development of Tissue Culture propagation methods that generate a large number of homogenous plants, have no seasonal effect on plant source and provide tools to fight the expansion of date pests and diseases. The disadvantage of this procedure is the occurrence of off-type trees which differ from t
Styles APA, Harvard, Vancouver, ISO, etc.
6

Alders, George. L51630A In-Line Detection and Sizing of Stress Corrosion Cracks Using EMAT Ultrasonics - Phase II. Pipeline Research Council International, Inc. (PRCI), 1991. http://dx.doi.org/10.55274/r0011370.

Texte intégral
Résumé :
This report covers that part of a Phase II effort that was completed by Magnasonics, Inc. prior to its liquidation by an adverse court ruling. The Phase I program investigated several configurations of Electromagnetic Acoustic Transducers (EMAT5) to arrive at an optimum approach to the problem of detecting and sizing stress corrosion cracks (SCC) in operating pipelines. Phase II was designed to optimize the most promising configuration by applying it to as many pipe samples as possible. Three pipe samples that contained several colonies of 5CC were made available to Magnasonics and a computeri
Styles APA, Harvard, Vancouver, ISO, etc.
7

Keller, Dr Jared Robert. How do data institutions facilitate safe access to sensitive data? Open Data Institute, 2021. http://dx.doi.org/10.61557/heje5130.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Marchant, Christian, Ryan Kirkpatrick, and David Ober. Coincidence processing of photon-sensitive mapping lidar data. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35599.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Falk, J., and M. Kucherawy, eds. Redaction of Potentially Sensitive Data from Mail Abuse Reports. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6590.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Payton, Jamie, Gruia-Catalin Roman, and Christine Julien. Simplifying Context-Aware Agent Coordination Using Context-Sensitive Data Structures. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada484172.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!