Academic literature on the topic 'Key usage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Key usage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Key usage"

1

Gryczka, Marcin. "ICT usage as a key prerequisite for open knowledge environment creation." Business and Economic Horizons 10, no. 4 (2014): 348–56. http://dx.doi.org/10.15208/beh.2014.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pillon, Gregory. "OLP: the key to expanding robot usage." Industrial Robot: An International Journal 15, no. 4 (1988): 206–10. http://dx.doi.org/10.1108/eb005030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gläser, Carolin. "Acceptance and usage of BBS – possible key factors." Proceedings of Mechanical Engineering Congress, Japan 2022 (2022): S171–03. http://dx.doi.org/10.1299/jsmemecj.2022.s171-03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hwang, Gyusun, Juhyung Park, Jeongcheol Lee, Jinwoo Park, Tai-Woo Chang, and Joongyeon Won. "Analysis of IoT Usage in Korean Key Manufacturing Industries." Journal of Society for e-Business Studies 21, no. 4 (2016): 81–93. http://dx.doi.org/10.7838/jsebs.2016.21.4.081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mesmar, A., C. Maskineh, and R. V. Becker. "PHP153 - KEY STAKEHOLDERS PERCEPTIONS OF HEOR USAGE IN LEBANON." Value in Health 21 (October 2018): S176. http://dx.doi.org/10.1016/j.jval.2018.09.1047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rombouts, Ellen, Bea Maes, and Inge Zink. "Attitude and key word signing usage in support staff." Research in Developmental Disabilities 55 (August 2016): 77–87. http://dx.doi.org/10.1016/j.ridd.2016.03.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yoke, Mary M., Susan E. Middlestadt, David K. Lohrmann, Andrea K. Chomistek, and Carol A. Kennedy-Armbruster. "Perceived Behavioral Control is Key for Activity Tracker Usage." Medicine & Science in Sports & Exercise 50, no. 5S (2018): 328–29. http://dx.doi.org/10.1249/01.mss.0000536162.40497.83.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sylvestre, Sebastian, and Doerthe Andreae. "Identification Is Key: Barriers To Regular Usage Of Allergy Identifiers." Journal of Allergy and Clinical Immunology 147, no. 2 (2021): AB103. http://dx.doi.org/10.1016/j.jaci.2020.12.385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lohan, Anjana. "Key perspectives of yoga and usage patterns in assorted religions." Asian Journal of Multidimensional Research 10, no. 9 (2021): 80–88. http://dx.doi.org/10.5958/2278-4853.2021.00697.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jabali, A. Karim, Khalid Yousuf Farid, Abdel-aziz Matani, and Fatma Al Mulhim. "Key Factors Influencing the Usage of MRI in Saudi Arabia." Procedia Computer Science 65 (2015): 562–71. http://dx.doi.org/10.1016/j.procs.2015.09.131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Key usage"

1

Thangavel, Jayakumar. "Digital Signature : Comparative study of its usage in developed and developing countries." Thesis, Uppsala universitet, Informationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-217960.

Full text
Abstract:
The online trading is growing widely day by day, which makes safety the biggest concern while carrying out trading by electronic means. As many other operations can be done with digital environment and internet, operation that provides identity validation should also be added to the digital environment. When data are transferred, the user should make sure that there are no changes in the original data while transferring them from sender to receiver. And it has also become necessary to authenticate the users often to ensure security and to avoid fraud. There are lot of different ways of online
APA, Harvard, Vancouver, ISO, and other styles
2

Harris, Ainslie J. "A model of key characteristics affecting consumer attitudes toward the usage of free legitimate ad-supported music download services." Thesis, Robert Gordon University, 2013. http://hdl.handle.net/10059/846.

Full text
Abstract:
Digital music file sharing has had a significant negative financial impact on the recorded music industry, causing multi-billion dollar losses over the past decade. In a world where file sharing is now an activity that can be carried out with ease, industry stakeholders are continuously looking for ways to profit from changing consumer behaviour. To date, literature has looked at why people illicitly download (e.g. motivations, ethical considerations), the financial impact of file sharing (e.g. lost revenue), legal approaches to combatting file sharing (e.g. what approaches work, if any), and
APA, Harvard, Vancouver, ISO, and other styles
3

Aziz, Najibullah. "Smart Devices as U-Learning Tools: Key Factors Influencing Users’ Intention." Thesis, Stockholms universitet, Management & Organisation, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-118603.

Full text
Abstract:
There was a lack of knowledge about the user’s acceptance of smart devices as ubiquitous learning (u-learning) tools at higher education institutions in Sweden. As the mobile technology grows, the demand for mobile devices, particularly smart devices increases as well. With the increase in the usage of smart devices, the higher education institutions provide mobile learning platforms to attract more customers in the competitive industry of education. Thus, understanding the key factors from the perspectives of end-users is important for the institutions to survive in the competitive market. Th
APA, Harvard, Vancouver, ISO, and other styles
4

Haagman, Jenny. "Knowledge is the Key : Internet access, utilization and opinions in Grenada, West Indies." Thesis, Jönköping University, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-763.

Full text
Abstract:
<p>Knowledge is the Key</p><p>- Internet access, utilization and opinions in Grenada, West Indies</p><p>Information and knowledge contributes to growth and development through empowering individuals and communities, creating opportunities to improve their living conditions. Technology is advancing rapidly and the Information and Communication Technology, ICT, provides new ways to attain information. Especially the Internet is regarded to be a source of information and knowledge. However, there are still many places in the world where Internet access is not yet available to everyone. The conseq
APA, Harvard, Vancouver, ISO, and other styles
5

TRIMECHE, OMAR. "Destination branding in the Middle-East & North Africa region: An exploration of the usage of social media by key internal stakeholders." Kyoto University, 2013. http://hdl.handle.net/2433/174867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jansson, Samuel. "Evaluation of KPIs and Battery Usage of Li-ion BESS for FCR Application." Thesis, Uppsala universitet, Elektricitetslära, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-394015.

Full text
Abstract:
The main purpose of this thesis was to develop and evaluate Key Performance Indicators (KPIs) and battery usage associated with Lithium-ion Battery Energy Storage Systems (LiBESS) used as Frequency Containment Reserve (FCR). The investigation was based on three of Vattenfall´s LiBESS projects that use the same lithium-ion battery technology but vary in system rating and configuration. It was found that two of the most important KPIs are response time and energy efficiency. The response time describes how fast the system can respond to changes in grid frequency. Additionally, the energy efficie
APA, Harvard, Vancouver, ISO, and other styles
7

Almeida, Leonardo de Campos. "Lyra: uma função de derivação de chaves com custos de memória e processamento configuráveis." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-29062016-085500/.

Full text
Abstract:
Este documento apresenta o Lyra, um novo esquema de derivação de chaves, baseado em esponjas criptográficas. O Lyra foi projetado para ser estritamente sequencial, fornecendo um nível elevado de segurança mesmo contra atacantes que utilizem múltiplos núcleos de processamento, como uma GPU ou FPGA. Ao mesmo tempo possui uma implementação simples em software e permite ao usuário legítimo ajustar o uso de memória e tempo de processamento de acordo com o nível de segurança desejado. O Lyra é, então, comparado ao scrypt, mostrando que esta proposta fornece um nível se segurança mais alto, além de s
APA, Harvard, Vancouver, ISO, and other styles
8

Hitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security
APA, Harvard, Vancouver, ISO, and other styles
9

Hitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security
APA, Harvard, Vancouver, ISO, and other styles
10

Cokal, Derya. "A Contrastive Analysis Of The Pronominal Usages Of This And That In Academic Written Discourse." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/2/12606268/index.pdf.

Full text
Abstract:
This study presents a contrastive analysis of the pronominal uses of this and that in academic written discourse. As data, the pronominal uses of this and that are retrieved from journal articles on linguistics. From these journals, 586 articles are scanned for the pronominal uses of this and that and 198 tokens are analysed. The contrastive analysis is done in terms of the kind and span of referents this and that pick out in discourse, the types of centering transitions they signal and the rhetorical relations in which they are used. In order to investigate the types of transition they sig
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Key usage"

1

Burt, A. M. Key comprehension. Ginn, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

G, Eisenberg Myron, ed. Key words in psychosocial rehabilitation: A guide to contemporary usage. Springer Pub. Co., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shirley, Cammack, and Eisenberg Myron G, eds. Key words in physical rehabilitation: A guide to contemporary usage. Springer Pub. Co., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kapp, Marshall B. Key words in ethics, law, and aging: A guide to contemporary usage. Springer Pub. Co., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tomomatsu, Etsuko. 200 essential Japanese expressions: A guide to correct usage of key sentence patterns. ALC Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

L, Denis, ed. Antiandrogens in prostate cancer: A key to tailored endocrine treatment. Springer, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Campbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 9 : with accompanying answer key. Trafford, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Campbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 8 : with accompanying answer key. Trafford, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Campbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 10 : with accompanying answer key. Trafford, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Campbell, Shirley. Talking about writing.: A sequential programme of sentence structure, grammar, usage and punctuation for grade 12 : with accompanying answer key. Trafford, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Key usage"

1

Bechlaghem, Malek, and Vincent Rijmen. "Proving Key Usage." In Information Security Applications. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-31815-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haunts, Stephen. "Azure Key Vault Usage Patterns." In Applied Cryptography in .NET and Azure Key Vault. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4375-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McGrath, Stephen Keith. "Key Difficulties of Language Usage." In Speaking Management. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2213-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Toncich, Dario. "Introduction and Text Usage Guide." In Key Factors in Postgraduate Research Supervision A Guide for Supervisors. River Publishers, 2022. http://dx.doi.org/10.1201/9781003338741-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Kwanwoo, and Kyo C. Kang. "Usage Context as Key Driver for Feature Selection." In Software Product Lines: Going Beyond. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15579-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cruz, Francisco, Francisco Maia, Miguel Matos, et al. "Resource Usage Prediction in Distributed Key-Value Datastores." In Distributed Applications and Interoperable Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39577-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Liqian, Renjie Huang, Dan Luo, Chenghu Ma, Dengping Wei, and Ji Wang. "Estimating Worst-case Resource Usage by Resource-usage-aware Fuzzing." In Fundamental Approaches to Software Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_5.

Full text
Abstract:
AbstractWorst-case resource usage provides a useful guidance in the design, configuration and deployment of software, especially when it runs under a context with limited amount of resources. Static resource-bound analysis can provide sound upper bounds of worst-case resource usage but may provide too conservative, even unbounded, results. In this paper, we present a resource-usage-aware fuzzing approach to estimate worst-case resource usage. The key idea is to guide the fuzzing process using resource-usage amount together with resource-usage relevant coverage. Moreover, we leverage semantic p
APA, Harvard, Vancouver, ISO, and other styles
8

Park, JaeSung, JaeJon Kim, and Joon Koh. "Key Factors Affecting Continuous Usage Intention in Web Analytics Service." In Agent and Multi-Agent Systems: Technologies and Applications. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01665-3_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Janols, Rebecka, Bengt Göransson, Erik Borälv, and Bengt Sandblad. "Physicians’ Concept of Time Usage – A Key Concern in EPR Deployment." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15515-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Archer, Dawn, and Jonathan Culpeper. "Identifying key sociophilological usage in plays and trial proceedings (1640-1760)." In Benjamins Current Topics. John Benjamins Publishing Company, 2011. http://dx.doi.org/10.1075/bct.31.06arc.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Key usage"

1

Zhang, Shuyi, Jiakun Zhang, and Yongkun Li. "Fine-Grained Dynamic Hardware Resource Usage Measurement for Distributed Key-Value Stores." In 2025 10th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA). IEEE, 2025. https://doi.org/10.1109/icccbda64898.2025.11030438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Beale, Raymond, Paul Swindell, and Mark Davis. "Achieving Usage Based Maintenance with HUMS Regime Recognition." In Vertical Flight Society 71st Annual Forum & Technology Display. The Vertical Flight Society, 2015. http://dx.doi.org/10.4050/f-0071-2015-10186.

Full text
Abstract:
Monitoring of actual aircraft structural usage and loads would enhance rotorcraft safety while enabling reduced operating costs via usage-based maintenance (UBM) credits. While flight regime recognition (RR) algorithms have been demonstrated, they have not been fully validated, and regime-based UBM credits remain elusive due to both technical and certification challenges. This paper describes a viable method, which was developed by Sikorsky Aircraft Corporation under an R&amp;D effort funded by the Federal Aviation Administration Technical Center, for achieving UBM retirement credits for a rep
APA, Harvard, Vancouver, ISO, and other styles
3

Kelly, Stacey. "V-22 Dynamic Components Fatigue Design Usage Spectrum vs. Fleet History." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9544.

Full text
Abstract:
A critical task for initiating an aircraft design is to determine how the fielded product will be used. For the V-22 Osprey, a usage spectrum was developed. The spectrum considered time spent in level flight, number of maneuvers per flight hour, type of maneuvers that would be flown, etc. With the V-22 fleet now exceeding 200,000 flight hours the actual usage spectrum can be compared to the design spectrum to gain key insights. The V-22 onboard recording system includes maneuver recognition software that permits this analysis. Results from fleet usage data are compared to the design usage spec
APA, Harvard, Vancouver, ISO, and other styles
4

J., Raymond, Jeff Finckenor, Jared Kloda, et al. "Analysis Of UH-60 L/M Black Hawk Fleet Usage In Support Of A Partial Usage Spectrum Update." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12772.

Full text
Abstract:
Structural usage and loads monitoring can enhance safety, by identifying unusual usage patterns by individual aircraft or sub-fleets (e.g. operators, missions, or locations), and provide benefit to operators by enabling extended retirement times of life-limited components. While flight regime recognition (RR) algorithms have been demonstrated and partially validated, the use of existing onboard generic RR software provided in legacy Health and Usage Monitoring Systems (HUMS) remains a challenge for achieving airworthiness approval of retirement time extensions using archived fleet data in comp
APA, Harvard, Vancouver, ISO, and other styles
5

LeFevre, Brian, Conor Marr, David Rusk, Mark Davis, and Courtney Johnson. "Integrated Hybrid Structural Management System (IHSMS) - Usage and Loads Monitoring." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12087.

Full text
Abstract:
The overarching objective of the Integrated Hybrid Structural Management System (IHSMS) program is to mature key capabilities, which support eventual implementation of a holistic on-condition or reliability-based maintenance paradigm for rotorcraft. As one of the constituent elements of the IHSMS program, development of Usage and Loads Monitoring (ULM) technologies is achieved through refinement and testing/evaluation of a suite of physical sensors and model-based technologies. This paper describes the IHSMS ULM architecture, and explores the efforts to develop and test two prototype physical
APA, Harvard, Vancouver, ISO, and other styles
6

Hull, Jason, Mark Davis, Roberto Semidey, Jeffrey Monaco, Raymond Beale, and Mark Glucksman-Glaser. "Regime Recognition Accuracy." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12076.

Full text
Abstract:
Accurate characterization of fleet and vehicle usage spectrums would allow component retirement times to be based on actual aircraft usage rather than on an assumed worst case usage spectrum used in a traditional time-based maintenance approach. A key enabling technology for such a Usage or Condition Based Maintenance (UBM/CBM) program is Regime Recognition (RR). In general, production RR algorithms with the required accuracy have not been fielded, in part because of the challenges associated with Verification and Validation (V&amp;V). The multi-class classifier analysis methods and associated
APA, Harvard, Vancouver, ISO, and other styles
7

Green, David, Harrison Chin, and Richard Barnett. "Assessment of Processes and Risks Associated with Extension of Inspection Intervals." In Vertical Flight Society 73rd Annual Forum & Technology Display. The Vertical Flight Society, 2017. http://dx.doi.org/10.4050/f-0073-2017-12216.

Full text
Abstract:
This paper addresses processes and findings developed as the result of a program conducted by a Gulf of Mexico (GOM) helicopter Operator involving 14 S-76C+/++ (S-76C) helicopters in a three-year demonstration of operations supporting Oil and Gas Producers. These processes and findings are in many ways applicable to both civil and military helicopters since all civil and military OEMs use a Composite Worst Case (CWC) Usage as a key element of the algorithm for power train design and the establishment of initial power train inspection intervals. The current ability to record and process usage d
APA, Harvard, Vancouver, ISO, and other styles
8

Monaco, Jeffrey, Mark Davis, Roberto Semidey, Jason Hull, Raymond Beale, and Mark Glucksman-Glaser. "Maneuver Generation for Regime Recognition Design and Validation." In Vertical Flight Society 74th Annual Forum & Technology Display. The Vertical Flight Society, 2018. http://dx.doi.org/10.4050/f-0074-2018-12771.

Full text
Abstract:
Accurate characterization of fleet and individual aircraft usage spectrums would allow component retirement times to be based on actual aircraft usage rather than on an assumed worst case usage spectrum used in a traditional time-based maintenance approach. A key enabling technology for such a Usage or Condition Based Maintenance (UBM/CBM) program is Regime Recognition (RR). The development and validation of such algorithms commonly employs flight loads survey data, which captures critical regimes and the corner points of the operational envelope. Such maneuver examples are flown precisely and
APA, Harvard, Vancouver, ISO, and other styles
9

Mulroy, Michael, Nick Lieven, Peter Morrish, et al. "The Application of Helicopter Health and Usage Monitoring Techniques within the Wind Turbine Industry." In Vertical Flight Society 70th Annual Forum & Technology Display. The Vertical Flight Society, 2014. http://dx.doi.org/10.4050/f-0070-2014-9693.

Full text
Abstract:
Cost-optimised maintenance of wind turbines is becoming increasingly important due to the remote location and access limitations of offshore wind farms. Maintenance and repair costs increase significantly due to the specialist vessels required and delays due to unfavourable weather conditions. Significant cost reductions can be achieved by making better use of condition monitoring information to make more efficient and effective maintenance decisions. Replacement parts and specialist access equipment can be ordered in advance, reducing downtime. Work can be scheduled at a time when the wind sp
APA, Harvard, Vancouver, ISO, and other styles
10

Mechouche, Ammar, Pierre-Loïc Maisonneuve, Matthis Houles, and Caroline Del cistia Gallimard. "On the Trustworthiness of Machine Learning Models in Health and Usage Monitoring of In-Service Helicopters." In Vertical Flight Society 81st Annual Forum and Technology Display. The Vertical Flight Society, 2025. https://doi.org/10.4050/f-0081-2025-88.

Full text
Abstract:
This paper proposes a first iteration towards a framework for enhancing the trustworthiness of machine learning in the health and usage monitoring of in-service helicopters. This bottom-up approach is based on our experience operating machine learning models for monitoring Airbus Helicopters' customer fleets. Key factors for improving trustworthy machine learning have been identified for both the development and execution phases, with specific methods defined for each enabler. These methods have been implemented in two use-cases involving machine learning models for regression tasks: monitorin
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Key usage"

1

Housley, R., J. Hoyland, M. Sethi, and C. A. Wood. Guidance for External Pre-Shared Key (PSK) Usage in TLS. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kitterman, S. Cryptographic Algorithm and Key Usage Update to DomainKeys Identified Mail (DKIM). RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reddy.K, T., J. Ekman, and D. Migault. X.509 Certificate Extended Key Usage (EKU) for 5G Network Functions. RFC Editor, 2024. http://dx.doi.org/10.17487/rfc9509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mahy, R. X.509 Certificate Extended Key Usage (EKU) for Instant Messaging URIs. RFC Editor, 2025. https://doi.org/10.17487/rfc9734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lawrence, S., and V. Gurbani. Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ito, T., T. Okubo, and S. Turner. X.509 Certificate General-Purpose Extended Key Usage (EKU) for Document Signing. RFC Editor, 2022. http://dx.doi.org/10.17487/rfc9336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brockhaus, H., and D. Goltzsche. X.509 Certificate Extended Key Usage (EKU) for Configuration, Updates, and Safety-Critical Communication. RFC Editor, 2025. https://doi.org/10.17487/rfc9809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nir, Y., T. Kivinen, P. Wouters, and D. Migault. Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Devane, Katie, Allan Kelly, and Rachel Slaymaker. Profiling short-term let usage across Ireland. ESRI, 2024. https://doi.org/10.26504/rs208.

Full text
Abstract:
Globally, the popularity of homesharing platforms such as Airbnb has grown rapidly in the past decade. These platforms allow households to raise additional income and utilise space in their homes that may otherwise remain unused. However, concerns over the impacts of short-term lets (STL) on local communities have led to increased regulation of these platforms across countries in recent years. The lack of availability of accommodation in the private rental sector (PRS) has sharpened the focus on STL activities and how they may be impacting the Irish PRS. The aim of this report is to provide co
APA, Harvard, Vancouver, ISO, and other styles
10

Nagle, Frank, Kate Powell, Richie Zitomer, and David A. Wheeler. Census III of Free and Open Source Software: Application Libraries. The Linux Foundation, 2024. https://doi.org/10.70828/jrpb8299.

Full text
Abstract:
What are the most commonly used free and open source software (FOSS) packages? In this report, LF Research partnered with OpenSSF and the Laboratory for Innovation Science at Harvard to study the most common packages used at the application library level. With data from Software Composition Analysis partners FOSSA, Snyk, Sonatype, and Black Duck, the investigators captured detailed results of FOSS usage and key patterns of this usage that will help enhance the security of these packages.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!