Academic literature on the topic 'Sensitive date'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sensitive date.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sensitive date"
Culp, Rex E. "Up-to-Date, but Are They Culturally Sensitive?" Contemporary Psychology: A Journal of Reviews 37, no. 9 (1992): 899. http://dx.doi.org/10.1037/032570.
Full textKovi, Mallikarjuna Rao, Yong Hu, Xufeng Bai, and Yongzhong Xing. "QTL mapping for thermo-sensitive heading date in rice." Euphytica 205, no. 1 (2015): 51–62. http://dx.doi.org/10.1007/s10681-015-1383-6.
Full textFang, Jinggui, and ChihCheng T. Chao. "Methylation Sensitive Amplification Polymorphism in Date Palms and Their Offshoots." HortScience 41, no. 4 (2006): 994A—994. http://dx.doi.org/10.21273/hortsci.41.4.994a.
Full textCRANSTON, PETER S., FRANK-THORSTEN KRELL, KEN WALKER, and DAVID HEWES. "Wiley's Early View constitutes valid publication for date-sensitive nomenclature." Systematic Entomology 40, no. 1 (2015): 2–4. http://dx.doi.org/10.1111/syen.12119.
Full textAbdulai, A. L., M. Kouressy, M. Vaksmann, F. Asch, M. Giese, and B. Holger. "Latitude and Date of Sowing Influences Phenology of Photoperiod-Sensitive Sorghums." Journal of Agronomy and Crop Science 198, no. 5 (2012): 340–48. http://dx.doi.org/10.1111/j.1439-037x.2012.00523.x.
Full textZiouti, A., C. Modafar, A. Fleuriet, S. Boustani, and J. J. Macheix. "Phenolic compounds in date palm cultivars sensitive and resistant toFusarium oxysporum." Biologia plantarum 38, no. 3 (1996): 451–57. http://dx.doi.org/10.1007/bf02896679.
Full textTownsend, Teresa, Leigh Lane, and James Martin. "Context-Sensitive Solutions." Transportation Research Record: Journal of the Transportation Research Board 1904, no. 1 (2005): 66–74. http://dx.doi.org/10.1177/0361198105190400107.
Full textPetrides, George, and Wouter Verbeke. "Cost-sensitive ensemble learning: a unifying framework." Data Mining and Knowledge Discovery 36, no. 1 (2021): 1–28. http://dx.doi.org/10.1007/s10618-021-00790-4.
Full textCollinson, Paul O. "Sensitive troponin assays." Journal of Clinical Pathology 64, no. 10 (2011): 845–49. http://dx.doi.org/10.1136/jclinpath-2011-200164.
Full textWang, Yulu, Fei Liu, Yuemeng Yang, and Li-Ping Xu. "Droplet evaporation-induced analyte concentration toward sensitive biosensing." Materials Chemistry Frontiers 5, no. 15 (2021): 5639–52. http://dx.doi.org/10.1039/d1qm00500f.
Full textDissertations / Theses on the topic "Sensitive date"
Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.
Full textFolkesson, Carl. "Anonymization of directory-structured sensitive data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-160952.
Full textSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Full textBakri, Mustafa al. "Uncertainty-Sensitive Reasoning over the Web of Data." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM073.
Full textLjus, Simon. "Purging Sensitive Data in Logs Using Machine Learning." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411610.
Full textOshima, Sonoko. "Neuromelanin‐Sensitive Magnetic Resonance Imaging Using DANTE Pulse." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263531.
Full textEl-Khoury, Hiba. "Introduction of New Products in the Supply Chain : Optimization and Management of Risks." Thesis, Jouy-en Josas, HEC, 2012. http://www.theses.fr/2012EHEC0001/document.
Full textGholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.
Full textMathew, George. "A Perturbative Decision Making Framework for Distributed Sensitive Data." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/269109.
Full textAnsell, Peter. "A context sensitive model for querying linked scientific data." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/49777/1/Peter_Ansell_Thesis.pdf.
Full textBooks on the topic "Sensitive date"
Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.
Find full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.
Full textPhotopoulos, Constantine. Managing catastrophic loss of sensitive data. Syngress Pub., 2008.
Find full textClaire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruylant, 2007.
Find full textOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1992.
Find full textGreat Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, 2002.
Find full textDaniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2nd ed. Georgia State Univ. Business Press, 1993.
Find full textComputer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Computer Security Analysts, 1986.
Find full textE, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Sage Publications, 1986.
Find full textStaszkiewicz, Maddison. Using Online Surveys to Capture Time-Sensitive Data in a Low-Resource Setting. SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529601831.
Full textBook chapters on the topic "Sensitive date"
Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Introduction." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_1.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Computational Efficiency." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_10.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Practical Considerations." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_11.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Empirical Evaluation." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_12.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Real-world Applications." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_13.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Future Research Challenges and Directions." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_14.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Regulatory Frameworks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_2.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Linking Sensitive Data Background." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_3.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Private Information Sharing Protocols." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_4.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Assessing Privacy and Risks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_5.
Full textConference papers on the topic "Sensitive date"
Zhang, Liwei, Tong Zhang, Wenxue Wu, Xiaoqin Feng, Guoxi Lin, and Fengyuan Ren. "Fault- Tolerant Cyclic Queuing and Forwarding in Time-Sensitive Networking." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546689.
Full textChandran, Sandeep, Smruti R. Sarangi, and Preeti Ranjan Panda. "Space Sensitive Cache Dumping for Post-silicon Validation." In Design Automation and Test in Europe. IEEE Conference Publications, 2013. http://dx.doi.org/10.7873/date.2013.113.
Full textOttlik, Sebastian, Christoph Gerum, Alexander Viehl, Wolfgang Rosenstiel, and Oliver Bringmann. "Context-sensitive timing automata for fast source level simulation." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927042.
Full textLi, Ang, Peng Li, Tingwen Huang, and Edgar Sanchez-Sinencio. "Noise-sensitive feedback loop identification in linear time-varying analog circuits." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927190.
Full textSchmidt, Tim, Zhongqi Cheng, and Rainer Domer. "Port call path sensitive conflict analysis for instance-aware parallel SystemC simulation." In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2018. http://dx.doi.org/10.23919/date.2018.8342034.
Full textGuerra, R., and G. Fohler. "On-line scheduling of target sensitive periodic tasks with the gravitational task model." In 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012). IEEE, 2012. http://dx.doi.org/10.1109/date.2012.6176536.
Full textChen, Shu-Yung, Chien-Hao Chen, and Ren-Song Tsay. "An activity-sensitive contention delay model for highly efficient deterministic full-system simulations." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.226.
Full textFlich, José, Giovanni Agosta, Philipp Ampletzerz, et al. "Enabling HPC for QoS-sensitive Applications: The MANGO Approach." In Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE). Research Publishing Services, 2016. http://dx.doi.org/10.3850/9783981537079_1019.
Full textPeeck, Jonas, Johannes Schlatow, and Rolf Ernst. "Online latency monitoring of time-sensitive event chains in safety-critical applications." In 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2021. http://dx.doi.org/10.23919/date51398.2021.9474109.
Full textZhang, Xinyan, Kai Shant, Zhipeng Tan, and Dan Feng. "CSLE: A Cost-sensitive Learning Engine for Disk Failure Prediction in Large Data Centers." In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774751.
Full textReports on the topic "Sensitive date"
Taylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Understanding the Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375686.
Full textTaylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Dangers and Opportunities. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375687.
Full textToomey, Rickard, Vincent Santucci, Justin Tweet, Vincent Santucci, Rickard Toomey, and Justin Tweet. Mammoth Cave National Park: Paleontological resource inventory (sensitive version). National Park Service, 2024. http://dx.doi.org/10.36967/2306041.
Full textCohen, Yuval, Christopher A. Cullis, and Uri Lavi. Molecular Analyses of Soma-clonal Variation in Date Palm and Banana for Early Identification and Control of Off-types Generation. United States Department of Agriculture, 2010. http://dx.doi.org/10.32747/2010.7592124.bard.
Full textAlders, George. L51630A In-Line Detection and Sizing of Stress Corrosion Cracks Using EMAT Ultrasonics - Phase II. Pipeline Research Council International, Inc. (PRCI), 1991. http://dx.doi.org/10.55274/r0011370.
Full textKeller, Dr Jared Robert. How do data institutions facilitate safe access to sensitive data? Open Data Institute, 2021. http://dx.doi.org/10.61557/heje5130.
Full textMarchant, Christian, Ryan Kirkpatrick, and David Ober. Coincidence processing of photon-sensitive mapping lidar data. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35599.
Full textFalk, J., and M. Kucherawy, eds. Redaction of Potentially Sensitive Data from Mail Abuse Reports. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6590.
Full textPayton, Jamie, Gruia-Catalin Roman, and Christine Julien. Simplifying Context-Aware Agent Coordination Using Context-Sensitive Data Structures. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada484172.
Full textBirk, Steffen, Christian Griebler, Johannes C. Haas, et al. Impact of extreme hydrological events on the quantity and quality of groundwater in alpine regions – multiple-index application for an integrative hydrogeo-ecological assessment. Verlag der Österreichischen Akademie der Wissenschaften, 2023. http://dx.doi.org/10.1553/ess-integrative-groundwater-assessment.
Full text