Academic literature on the topic 'Sensitive date'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sensitive date.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sensitive date"
Canet, R. "Sowing Date for Photoperiod Sensitive Caribe 7." International Rice Research Newsletter 11, no. 2 (1986): 30–31. https://doi.org/10.5281/zenodo.7121702.
Full textCulp, Rex E. "Up-to-Date, but Are They Culturally Sensitive?" Contemporary Psychology: A Journal of Reviews 37, no. 9 (1992): 899. http://dx.doi.org/10.1037/032570.
Full textKovi, Mallikarjuna Rao, Yong Hu, Xufeng Bai, and Yongzhong Xing. "QTL mapping for thermo-sensitive heading date in rice." Euphytica 205, no. 1 (2015): 51–62. http://dx.doi.org/10.1007/s10681-015-1383-6.
Full textFang, Jinggui, and ChihCheng T. Chao. "Methylation Sensitive Amplification Polymorphism in Date Palms and Their Offshoots." HortScience 41, no. 4 (2006): 994A—994. http://dx.doi.org/10.21273/hortsci.41.4.994a.
Full textCRANSTON, PETER S., FRANK-THORSTEN KRELL, KEN WALKER, and DAVID HEWES. "Wiley's Early View constitutes valid publication for date-sensitive nomenclature." Systematic Entomology 40, no. 1 (2015): 2–4. http://dx.doi.org/10.1111/syen.12119.
Full textAbdulai, A. L., M. Kouressy, M. Vaksmann, F. Asch, M. Giese, and B. Holger. "Latitude and Date of Sowing Influences Phenology of Photoperiod-Sensitive Sorghums." Journal of Agronomy and Crop Science 198, no. 5 (2012): 340–48. http://dx.doi.org/10.1111/j.1439-037x.2012.00523.x.
Full textZiouti, A., C. Modafar, A. Fleuriet, S. Boustani, and J. J. Macheix. "Phenolic compounds in date palm cultivars sensitive and resistant toFusarium oxysporum." Biologia plantarum 38, no. 3 (1996): 451–57. http://dx.doi.org/10.1007/bf02896679.
Full textTownsend, Teresa, Leigh Lane, and James Martin. "Context-Sensitive Solutions." Transportation Research Record: Journal of the Transportation Research Board 1904, no. 1 (2005): 66–74. http://dx.doi.org/10.1177/0361198105190400107.
Full textPetrides, George, and Wouter Verbeke. "Cost-sensitive ensemble learning: a unifying framework." Data Mining and Knowledge Discovery 36, no. 1 (2021): 1–28. http://dx.doi.org/10.1007/s10618-021-00790-4.
Full textNANDITA. N, DEVI, KOMANG DHARMAWAN, and DESAK PUTU EKA NILAKUSMAWATI. "ANALISIS SENSITIVITAS HARGA OPSI MENGGUNAKAN METODE GREEK BLACK SCHOLES." E-Jurnal Matematika 7, no. 2 (2018): 148. http://dx.doi.org/10.24843/mtk.2018.v07.i02.p197.
Full textDissertations / Theses on the topic "Sensitive date"
Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.
Full textFolkesson, Carl. "Anonymization of directory-structured sensitive data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-160952.
Full textSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Full textBakri, Mustafa al. "Uncertainty-Sensitive Reasoning over the Web of Data." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM073.
Full textLjus, Simon. "Purging Sensitive Data in Logs Using Machine Learning." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411610.
Full textOshima, Sonoko. "Neuromelanin‐Sensitive Magnetic Resonance Imaging Using DANTE Pulse." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263531.
Full textEl-Khoury, Hiba. "Introduction of New Products in the Supply Chain : Optimization and Management of Risks." Thesis, Jouy-en Josas, HEC, 2012. http://www.theses.fr/2012EHEC0001/document.
Full textGholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.
Full textMathew, George. "A Perturbative Decision Making Framework for Distributed Sensitive Data." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/269109.
Full textAnsell, Peter. "A context sensitive model for querying linked scientific data." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/49777/1/Peter_Ansell_Thesis.pdf.
Full textBooks on the topic "Sensitive date"
Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.
Find full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.
Full textPhotopoulos, Constantine. Managing catastrophic loss of sensitive data. Syngress Pub., 2008.
Find full textClaire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruylant, 2007.
Find full textOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1992.
Find full textGreat Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, 2002.
Find full textDaniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2nd ed. Georgia State Univ. Business Press, 1993.
Find full textComputer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Computer Security Analysts, 1986.
Find full textE, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Sage Publications, 1986.
Find full textFicco, Massimo, and Gianni D'Angelo, eds. Artificial Intelligence Techniques for Analysing Sensitive Data in Medical Cyber-Physical Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-70775-9.
Full textBook chapters on the topic "Sensitive date"
Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Introduction." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_1.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Computational Efficiency." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_10.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Practical Considerations." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_11.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Empirical Evaluation." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_12.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Real-world Applications." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_13.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Future Research Challenges and Directions." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_14.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Regulatory Frameworks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_2.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Linking Sensitive Data Background." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_3.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Private Information Sharing Protocols." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_4.
Full textChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Assessing Privacy and Risks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_5.
Full textConference papers on the topic "Sensitive date"
Zhang, Liwei, Tong Zhang, Wenxue Wu, Xiaoqin Feng, Guoxi Lin, and Fengyuan Ren. "Fault- Tolerant Cyclic Queuing and Forwarding in Time-Sensitive Networking." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546689.
Full textMacdonald, Digby D., Mima Urquidi-Macdonald, and Chun Liu. "The Deterministic Prediction of Damage in Light Water Nuclear Reactors." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93173.
Full textHolmes, R. M., and D. J. Surman. "XPS and Auger Investigation of Mechanisms Affecting Corrosion Inhibition of Metals." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89609.
Full textAndresen, Peter L., and Clyde L. Briant. "Environmentally Assisted Cracking of 304L/316L/316NG Stainless Steels in 288°C Water." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88262.
Full textChandran, Sandeep, Smruti R. Sarangi, and Preeti Ranjan Panda. "Space Sensitive Cache Dumping for Post-silicon Validation." In Design Automation and Test in Europe. IEEE Conference Publications, 2013. http://dx.doi.org/10.7873/date.2013.113.
Full textOttlik, Sebastian, Christoph Gerum, Alexander Viehl, Wolfgang Rosenstiel, and Oliver Bringmann. "Context-sensitive timing automata for fast source level simulation." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927042.
Full textLi, Ang, Peng Li, Tingwen Huang, and Edgar Sanchez-Sinencio. "Noise-sensitive feedback loop identification in linear time-varying analog circuits." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927190.
Full textSchmidt, Tim, Zhongqi Cheng, and Rainer Domer. "Port call path sensitive conflict analysis for instance-aware parallel SystemC simulation." In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2018. http://dx.doi.org/10.23919/date.2018.8342034.
Full textGuerra, R., and G. Fohler. "On-line scheduling of target sensitive periodic tasks with the gravitational task model." In 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012). IEEE, 2012. http://dx.doi.org/10.1109/date.2012.6176536.
Full textChen, Shu-Yung, Chien-Hao Chen, and Ren-Song Tsay. "An activity-sensitive contention delay model for highly efficient deterministic full-system simulations." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.226.
Full textReports on the topic "Sensitive date"
Taylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Understanding the Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375686.
Full textTaylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Dangers and Opportunities. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375687.
Full textToomey, Rickard, Vincent Santucci, Justin Tweet, Vincent Santucci, Rickard Toomey, and Justin Tweet. Mammoth Cave National Park: Paleontological resource inventory (sensitive version). National Park Service, 2024. http://dx.doi.org/10.36967/2306041.
Full textCurtis, Rob, Sonia Bingham, and Megan Shaeffer. Natural resource assessment of the proposed Columbia Sensitive Resource Zone, Cuyahoga Valley National Park, Ohio. National Park Service, 2025. https://doi.org/10.36967/2310114.
Full textCohen, Yuval, Christopher A. Cullis, and Uri Lavi. Molecular Analyses of Soma-clonal Variation in Date Palm and Banana for Early Identification and Control of Off-types Generation. United States Department of Agriculture, 2010. http://dx.doi.org/10.32747/2010.7592124.bard.
Full textAlders, George. L51630A In-Line Detection and Sizing of Stress Corrosion Cracks Using EMAT Ultrasonics - Phase II. Pipeline Research Council International, Inc. (PRCI), 1991. http://dx.doi.org/10.55274/r0011370.
Full textKeller, Dr Jared Robert. How do data institutions facilitate safe access to sensitive data? Open Data Institute, 2021. http://dx.doi.org/10.61557/heje5130.
Full textMarchant, Christian, Ryan Kirkpatrick, and David Ober. Coincidence processing of photon-sensitive mapping lidar data. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35599.
Full textFalk, J., and M. Kucherawy, eds. Redaction of Potentially Sensitive Data from Mail Abuse Reports. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6590.
Full textPayton, Jamie, Gruia-Catalin Roman, and Christine Julien. Simplifying Context-Aware Agent Coordination Using Context-Sensitive Data Structures. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada484172.
Full text