Academic literature on the topic 'The DAS(Draw A secret)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'The DAS(Draw A secret).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "The DAS(Draw A secret)"

1

Anchit Verma and Dr. Ganesh Dubey. "National and International Protection of Trade Secret." Legal Research Development an International Refereed e-Journal 5, no. III (2021): 11–17. http://dx.doi.org/10.53724/lrd/v5n3.04.

Full text
Abstract:
Abstract
 This research article contains an introduction to ‘Trade secret as an Intellectual Property’, primarily focused on principles of TRIPS and relevant laws related to trade secret in USA, UK, China and Japan. The paper also Includes Trade Secret Licensing, Factors, restrictions and validity along with Non-Disclosure/ confidentiality agreement. So basically the effort is to draw a comparison between available measures to deal with trade secret issues in India and other countries.
APA, Harvard, Vancouver, ISO, and other styles
2

Apprich, Clemens. "Secret Agents." Digital Culture & Society 4, no. 1 (2018): 29–44. http://dx.doi.org/10.14361/dcs-2018-0104.

Full text
Abstract:
Abstract “Good Old-Fashioned Artificial Intelligence” (GOFAI), which was based on a symbolic information-processing model of the mind, has been superseded by neural-network models to describe and create intelligence. Rather than a symbolic representation of the world, the idea is to mimic the structure of the brain in electronic form, whereby artificial neurons draw their own connections during a self-learning process. Critiquing such a brain physiological model, the following article takes up the idea of a “psychoanalysis of things” and applies it to artificial intelligence and machine learni
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Jingbang, Xiyu Chen, Luyuan Zhang, Shufen Zhou, and Daoshun Wang. "A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles." Security and Communication Networks 2022 (May 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/1413976.

Full text
Abstract:
Secure data sharing for the Internet of Vehicles (IoV) has drawn much attention in developing smart cities and smart transportation. One way to achieve that is based on the reputation of the participant vehicles and the interaction between them. Most of the reputation adjustment schemes are aimed at single-secret situations, and there are cases where shared information leaks after reconstruction; and the shared information of all participants need to be updated again. This paper uses binary asymmetric polynomials to realize the asynchronous reconstruction of secrets, that is, multiple secrets
APA, Harvard, Vancouver, ISO, and other styles
4

Oppermann, Eva. "Mary and the Mystery of the Strange Crying: Elements of the Detective Story in The Secret Garden." International Research in Children's Literature 11, no. 1 (2018): 80–90. http://dx.doi.org/10.3366/ircl.2018.0255.

Full text
Abstract:
This contribution demonstrates how Burnett adopts several devices typical of detective fiction, namely clues, secondary secrets, interrogations, Gothic elements and the investigating outsider in a closed (and reclusive) society, in The Secret Garden in order to introduce tension and the motif of a riddle to solve her masterpiece. She also for the first time uses character qualities to develop Mary into a character with a talent to rely on her own observations and draw the correct conclusions. Thus she becomes the prototype of the girl sleuth who will become important in later detective fiction
APA, Harvard, Vancouver, ISO, and other styles
5

Odovichena, Y. A., та O. Y. Orlovskiy. "A соmmercial secret. How can employer protect his secrets?" Uzhhorod National University Herald. Series: Law 1, № 80 (2024): 312–18. http://dx.doi.org/10.24144/2307-3322.2023.80.1.44.

Full text
Abstract:
The article is devoted to the study of measures taken by the employer to prevent the disclosure of commercial secrets by the employee. Such measures should be characterized by efficiency, simplicity, manageability and be comprehensive. In particular, the procedure for implementing local acts at the enterprise is characterized, which contain an exhaustive list of information that constitutes a commercial secret and which are designed to maximally protect the employer from the “leakage” of information that is commercially valuable. Such acts include: Provisions on commercial secrecy, List of inf
APA, Harvard, Vancouver, ISO, and other styles
6

Sabater, César, Florian Hahn, Andreas Peter, and Jan Ramon. "Private Sampling with Identifiable Cheaters." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 361–83. http://dx.doi.org/10.56553/popets-2023-0058.

Full text
Abstract:
In this paper we study verifiable sampling from probability distributions in the context of multi-party computation. This has various applications in randomized algorithms performed collaboratively by parties not trusting each other. One example is differentially private machine learning where noise should be drawn, typically from a Laplace or Gaussian distribution, and it is desirable that no party can bias this process. In particular, we propose algorithms to draw random numbers from uniform, Laplace, Gaussian and arbitrary probability distributions, and to verify honest execution of the pro
APA, Harvard, Vancouver, ISO, and other styles
7

Kinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan." International Theory 11, no. 1 (2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Full text
Abstract:
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relatio
APA, Harvard, Vancouver, ISO, and other styles
8

Nguyen, Thanh An, and Yong Zeng. "A VISION BASED GRAPHICAL PASSWORD." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 43–52. http://dx.doi.org/10.3233/jid-2010-14204.

Full text
Abstract:
Graphical password is an authentication means alternative to textual password and biometric password. Graphical passwords are classified into two groups: picture based password and user-drawn based password. To pass the authentication, in the picture based graphical password, users have to choose right photos whereas in the user-drawn based graphical password, users have to draw correct pictures. In this paper, we propose a new user-drawn based graphical password. The proposed scheme requires users to create their secret by selecting individual points or by connecting points into curves from a
APA, Harvard, Vancouver, ISO, and other styles
9

Siebert, Sabina, and Barbara Czarniawska. "Distrust: Not Only in Secret Service Organizations." Journal of Management Inquiry 29, no. 3 (2018): 286–98. http://dx.doi.org/10.1177/1056492618798939.

Full text
Abstract:
In this article, we discuss the issue of distrust in the most extreme example of distrustful organizations: secret service organizations. Distrust may be a basic organizing principle in such organizations, but how is it produced and maintained? Inspired by actor–network theory, we analyzed the devices, codes, rules, and procedures used in secret service organizations, and then asked whether these devices, codes, rules, and procedures differ from those used in ordinary organizations. Based on our analysis, we make two contributions. First, we draw researchers’ attention to distrust that is inte
APA, Harvard, Vancouver, ISO, and other styles
10

EVATT, GEOFFREY W., CHRISTOPH MAYER, AMY MALLINSON, I. DAVID ABRAHAMS, MATTHIAS HEIL, and LINDSEY NICHOLSON. "The secret life of ice sails." Journal of Glaciology 63, no. 242 (2017): 1049–62. http://dx.doi.org/10.1017/jog.2017.72.

Full text
Abstract:
ABSTRACTWe present the first dedicated study into the phenomenon of ice sails. These are clean ice structures that protrude from the surface of a small number of debris-covered glaciers and can grow to heights of over 25 m. We draw together what is known about them from the academic/exploration literature and then analyse imagery. We show here that ice sails can develop by one of two mechanisms, both of which require clean ice to become surrounded by debris-covered ice, where the debris layer is shallow enough for the ice beneath it to melt faster than the clean ice. Once formed, ice sails can
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "The DAS(Draw A secret)"

1

Norlin, Albin. "En jämförelse mellan teckenbaserade och grafiska lösenord : Fokuserad på användarvänlighet och säkerhet." Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12903.

Full text
Abstract:
Kontext. För att inte glömma sitt lösenord så väljer användare korta lösenord. Att användare väljer korta lösenord är en säkerhetsrisk som behöver förebyggas. Det finns forskning som pekar på att det är lättare för människor att komma ihåg en bild jämfört med en text. Om grafiska lösenord i form av en bild används istället för teckenbaserade lösenord i form av text skulle användare kunna välja svårare lösenord i form av komplexa lösenordsmönster och samtidigt minska risken att glömma dem. Mål. I projektet utförs en jämförelse mellan teckenbaserade och grafiska lösenord av typen DAS inom områd
APA, Harvard, Vancouver, ISO, and other styles
2

Dingle, Matthew, and mikewood@deakin edu au. "Elastic behaviour in mechanical draw presses." Deakin University. School of Engineering and Technology, 2001. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051017.150247.

Full text
Abstract:
This thesis explores the elastic behaviour of the mechanical double action press and draw die system commonly used to draw sheet metal components in the automotive industry. High process variability in production and excessive time spent in die try-out are significant problems in automotive stamping. It has previously been suggested that the elastic behaviour of the system may contribute to these problems. However, the mechanical principles that cause the press system to affect the forming process have not been documented in detail. Due to a poor understanding of these problems in industry, th
APA, Harvard, Vancouver, ISO, and other styles
3

Waters, Michael R. "The Geoarchaeology of Whitewater Draw, Arizona." University of Arizona Press (Tucson, AZ), 1986. http://hdl.handle.net/10150/615943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jianfeng, Wang. "Principles of the draw-bend springback." The Ohio State University, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=osu1080237228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Darwin, Emma Lucie. "A Secret Alchemy." Thesis, Goldsmiths College (University of London), 2010. http://research.gold.ac.uk/22668/.

Full text
Abstract:
Secret Alchemy consists of my novel, A Secret Alchemy, and a critical commentary on the process and context of writing it. The novel reimagines the world of Elizabeth Woodville (14377-1492), the mother of the Princes in the Tower, and her brother Anthony Woodville (1442?-1483). In their voices, it tells their story from childhood, through Anthony's murder by Richard III and the disappearance of the Princes, to Elizabeth's old age. These two narrative strands intertwine with a third: Una Pryor, a modern bibliographer, is researching the Woodvilles' books. As she tries to save the family printin
APA, Harvard, Vancouver, ISO, and other styles
6

Chaffe, Tomas. "The Secret Writer." Thesis, Konstfack, Institutionen för Konst (K), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:konstfack:diva-3980.

Full text
Abstract:
This essay reflects a particular method and way of working that I employ when undertaking artistic research. My artworks are rooted and develop from the situation I find myself in as an artist, the very context I exhibit the work within. I do this by trying to understand this position, both on the micro and macro scale. As an artist currently studying at—and subsequently exhibiting in relation to— Konstfack, I base my research with the physical manifestation of the school. An imposing building that was part of a huge headquarters and factory site for the telecommunication company, Ericsson, in
APA, Harvard, Vancouver, ISO, and other styles
7

Quennesson, Claire. "Mineur et secret." Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0804/document.

Full text
Abstract:
Le secret est une notion ancienne, ancrée dans notre législation, qui est généralement le fait des majeurs. Relier le mineur au secret suppose de préciser comment la minorité influe sur le droit au secret dont toute personne - y compris lorsqu’elle est mineure - est titulaire, qu'il s'agisse de l'étendue du droit au secret plutôt plus réduite que pour les majeurs, que de l'exercice de ce droit qui, comme tout droit du mineur est différent et plus complexe.Garder un savoir caché suppose un certain degré de capacité. Or, le statut particulier reconnu au mineur, sujet de droit vulnérable soumis à
APA, Harvard, Vancouver, ISO, and other styles
8

Reyzin, Alissa Natanovna. "Rational secret sharing." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/46511.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.<br>Includes bibliographical references (p. 59-60).<br>Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create more robust protocols that allow for a variety of player types. A keystone functionality used in cryptography is Secret Sharing. While there are several well known, efficient protocols that implement Secret Sharing in the Cryptographic model, designing a Rational Secret Sharing protocol which works in the Game Theoretic model has
APA, Harvard, Vancouver, ISO, and other styles
9

Louhibi-Benatek, Fouzia. "Le secret professionnel." Nice, 1997. http://www.theses.fr/1997NICE0032.

Full text
Abstract:
Le principe du secret professionnel a des origines lointaines. Cependant, dans le passé, quelques professions étaient, en vertu d'usages professionnels exclusivement, astreintes au secret dans l'exercice de leur fonction. En 1810, pour la première fois, le code pénal introduisait dans le systeme normatif pénal, le délit de violation de secret professionnel. Cette infraction vise a sanctionner pénalement le professionnel astreint au secret qui révèle sciemment, sans justification légalement admise, des informations à caractère secret recueillies dans l'exercice de sa profession. La réforme du c
APA, Harvard, Vancouver, ISO, and other styles
10

Caura, Virginie. "Secret et contrat." Lille 2, 2001. http://www.theses.fr/2001LIL20027.

Full text
Abstract:
Le rapport entre le secret et le contrat varie selon qu'il s'agit d'un secret objectif ou subjectif. Le secret puise son objectivité dans le fait qu'il n'existe parfois aucun autre moyen de protéger la liberté d'action des personnes dans leur vie privée et sociale ou d'assurer un monopole d'exploitation sur une information. Dans ces circonstances, la volonté de secret est présumée. Le contrat impose cependant une conciliation réussie entre le secret et l'information. En protégeant les personnes, parties au contrat, et l'information, objet de nombreux contrats, le secret objectif protège les él
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "The DAS(Draw A secret)"

1

Keene, Carolyn. Hannah's secret. Pocket Books, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keene, Carolyn. Secret rules. Pocket Books, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bugeja, Michael J. The magician's secret. Aladdin, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keene, Carolyn. Secret cargo. Swift Children's, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keene, Carolyn. Secret cargo. Armada, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

A, Wirt Mildred. The Secret of the Old Clock. Simon & Schuster, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Keene, Carolyn. The Slumber party secret. Scholastic, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bugeja, Michael J. The ringmaster's secret. Armada, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Keene, Carolyn. The Ringmaster's Secret. Penguin USA, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bugeja, Michael J. Secret of Shady Glen (The). Pocket Books, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "The DAS(Draw A secret)"

1

Muthert, Hanneke, and Hanneke Schaap-Jonker. "Different Attachment Styles in Relation to Children’s Drawings of God: A Qualitative Exploration of the Use of Symbols in a Dutch Sample." In When Children Draw Gods. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-030-94429-2_11.

Full text
Abstract:
AbstractThe development and functioning of representations of God are complex processes, in which psychological and cultural factors mutually influence each other. Attachment is a psychological factor that can provide insights into the representation and communication of ideas and experiences regarding supernatural agents in children’s drawings and narratives. Our hypotheses: (1) Securely attached children will use more God representation-related symbols in their drawings than insecurely attached children, (2) These symbols will have a referring and self-transcending character. We explore chil
APA, Harvard, Vancouver, ISO, and other styles
2

Rodríguez-Pérez, Adrià. "The Council of Europe’s CM/Rec(2017)5 on e-voting and Secret Suffrage: Time for yet Another Update?" In Electronic Voting. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15911-4_6.

Full text
Abstract:
AbstractThe Council of Europe’s Recommendation CM/Rec(2017)5 on e-voting remains the main international legal standard in the field. According to the updated Recommendation, e-voting should respect all the principles for democratic elections. This includes, of course, the principle of secret suffrage. Provisions on secret suffrage are dispersed throughout Rec(2017)5 and its related documents. The main provisions can be found in Section IV of Appendix I, but the principle is also mentioned in several other sections, in the Explanatory Memorandum, and in the Guidelines. A detailed analysis of al
APA, Harvard, Vancouver, ISO, and other styles
3

Bouju, Emmanuel. "Secret." In Palgrave Studies in Modern European Literature. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-09924-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Easton, Martha, and Maggie Williams. "Our Feminism/ Our Activism." In Burn after Reading: Vol. 1, Miniature Manifestos for a Post/medieval Studies + Vol. 2, The Future We Want: A Collaboration. punctum books, 2014. https://doi.org/10.21983/p3.0067.1.06.

Full text
Abstract:
Martha and I are mothers. We are feminists. We are art historians. We are activists. We have each struggled to keep those identities carefully compartmentalized to ach-ieve some abstract notion of success. Both of us were drawn to BABEL’s“Fuck This: On Finally Letting Go” and “Fuck Me: On Never Letting Go”sessions out of a sense of frustration: dissatisfaction with the tactics of purport-edly activist groups, disillusionment with the hypocrisies of academic life, and disappointment in our own and oth-ers’ willingness to rock the boat. Today, we are finally letting go of preserving our secret i
APA, Harvard, Vancouver, ISO, and other styles
5

"Does a Forest Give Up Its Secret if You Measure the Height of the Trees?" In Why Architects Still Draw. The MIT Press, 2014. http://dx.doi.org/10.7551/mitpress/9968.003.0010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Draw a Picture." In The Seven Secrets of How to Think Like a Rocket Scientist. Springer New York, 2007. http://dx.doi.org/10.1007/978-0-387-68222-8_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Molloy, Phillip. "Renal Histology." In How To Draw Anatomy. Oxford University PressOxford, 2023. http://dx.doi.org/10.1093/med/9780192883322.003.0014.

Full text
Abstract:
Abstract This chapter offers a simple histological diagram of the kidney and adrenal systems. Some useful hot tips will help you to additionally remember different chemicals secreted by the layers of the adrenal gland.
APA, Harvard, Vancouver, ISO, and other styles
8

Braddon, Mary Elizabeth. "Chapter I The Writing in the Book." In Lady Audley’s Secret. Oxford University Press, 2012. http://dx.doi.org/10.1093/owc/9780199577033.003.0023.

Full text
Abstract:
Mr Audley rose from the dinner-table and walked over to the cabinet in which he kept the document he had drawn up relating to George Talboys. He unlocked the doors of his cabinet, took the paper from the pigeon-hole marked Important, and...
APA, Harvard, Vancouver, ISO, and other styles
9

Iordanou, Ioanna. "Venice’s Secret Agents." In Venice's Secret Service. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198791317.003.0005.

Full text
Abstract:
This chapter discusses the different types of secret agents whom the Venetian authorities employed for their intelligence pursuits. These were drawn from all strata of Venetian society. Representing the patriciate, Venetian ambassadors and governors acted as semi-professional informants whose intelligence-gathering activities were coterminous with the norms of diplomatic decorum. Venetian merchants from either the patriciate or the social order of the cittadini also offered their services as amateur intelligence gatherers, protected under the guise of their professional activity. For outright
APA, Harvard, Vancouver, ISO, and other styles
10

Rimmington, Anthony. "From Swords to Ploughshares." In Stalin's Secret Weapon. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190928858.003.0012.

Full text
Abstract:
A number of long-range research programs were initiated by the Red Army’s biological warfare facilities which would bring about the development and application of a range of civil and defense vaccines during the Second World War. As a result, 8.5 million Soviet troops were vaccinated against plague, 90,000 against anthrax and an unknown number against tularemia. In addition, botulinum toxoids and a vaccine against brucellosis were developed. Although the Red Army’s BW institutes made some useful contribution to the development of antibiotics production, it was UK and US scientists who made cri
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "The DAS(Draw A secret)"

1

Alviano, Mario, and Luis Angel Rodriguez Reiners. "ASP Chef: Draw and Expand." In 21st International Conference on Principles of Knowledge Representation and Reasoning {KR-2023}. International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/kr.2024/68.

Full text
Abstract:
ASP Chef is a versatile tool built upon the principles of Answer Set Programming (ASP), offering a unique approach to problem-solving through the concept of ASP recipes. In this paper, we explore two key components of ASP Chef: the Graph ingredient and one of its extension mechanisms for registering new ingredients. The Graph ingredient serves as a fundamental feature within ASP Chef, allowing users to interpret instances of a designed predicate to construct graphs from the data. Through this capability, ASP Chef facilitates the visualization and analysis of complex relationships and structure
APA, Harvard, Vancouver, ISO, and other styles
2

Das, Sourav, Zhuolun Xiang, Alin Tomescu, Alexander Spiegelman, Benny Pinkas, and Ling Ren. "Verifiable Secret Sharing Simplified." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shehata, Kareem, Han Fangqi, and Sri AravindaKrishnan Thyagarajan. "Verifiable Weighted Secret Sharing." In 2025 Crypto Valley Conference (CVC). IEEE, 2025. https://doi.org/10.1109/cvc65719.2025.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dunphy, Paul, and Jeff Yan. "Do background images improve "draw a secret" graphical passwords?" In the 14th ACM conference. ACM Press, 2007. http://dx.doi.org/10.1145/1315245.1315252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johnson, Zachary, Alex Varon, Justin Blanco, et al. "Classifying Solid State Drive Firmware via Side-Channel Current Draw Analysis." In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2018. http://dx.doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.000-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Qaim, Waleed Bin, and Oznur Ozkasap. "DRAW: Data Replication for Enhanced Data Availability in IoT-based Sensor Systems." In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). IEEE, 2018. http://dx.doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gorišek, Maruša, and Darka Podmenik. "WILL YOUNGER PEOPLE PAY THE HIGHER PRICE OF THE PANDEMIC?" In 6th International Scientific Conference ERAZ - Knowledge Based Sustainable Development. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2020. http://dx.doi.org/10.31410/eraz.2020.75.

Full text
Abstract:
The article examines whether young people are at a greater risk of unemployment than the general population in the post-pandemic crisis. First, the authors draw attention to youth unemployment as a structural problem even before the pandemic, making young people more vulnerable. Further, the paper analyses the age structure of employed in sectors most impacted by the pandemic. The results show that disproportionally high number of young people work in the most impacted sectors, hold less secure types of employment and are thus more vulnerable and at-risk of unemployment in post-pandemic crisis
APA, Harvard, Vancouver, ISO, and other styles
8

Hicsonmez, Samet, Nermin Samet, Fadime Sener, and Pinar Duygulu. "DRAW." In ICMR '17: International Conference on Multimedia Retrieval. ACM, 2017. http://dx.doi.org/10.1145/3078971.3078982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bohari, Umema, Ting-Ju Chen, and Vinayak. "To Draw or Not to Draw." In IUI'18: 23rd International Conference on Intelligent User Interfaces. ACM, 2018. http://dx.doi.org/10.1145/3172944.3172985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bell, Lauren, Steven Meyer, and Brian Herbst. "Evaluation of Forward-Facing Child Safety Seat Harness Retainer Clip Position in 35 mph Frontal Barrier Crash Tests." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-88927.

Full text
Abstract:
Abstract The National Highway Traffic Safety Administration (NHTSA) recommends that children ages 4 to 7 years old should travel in a forward-facing child safety seat (FFCSS) with a harness until reaching the maximum weight or height limit allowed by the car seat manufacturer. There are five types of FFCSS, including convertible, combination, all-in-one, forward-facing only, and integrated (built-in). In the United States, most of the harness systems in FFCSS also include a retainer clip or chest clip; this is a plastic clip that holds the harness shoulder straps together over the child’s ches
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "The DAS(Draw A secret)"

1

Wade, Faye, Christian Calvillo Munoz, Victoria Kasprowicz, et al. Workforce planning to deliver clean, secure energy - ESNZ Committee consultation. Energy Demand Research Centre (EDRC), 2025. https://doi.org/10.20919/hltj7337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pappas, Mersene. Elsie's Secret. Portland State University Library, 2016. http://dx.doi.org/10.15760/honors.277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, Theodore M., and Jeannette M. Wing. Verifiable Secret Redistribution. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada458508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dang, Tri Vi, Gary Gorton, Bengt Holmström, and Guillermo Ordonez. Banks as Secret Keepers. National Bureau of Economic Research, 2014. http://dx.doi.org/10.3386/w20255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seybold, Patricia. Secret to Successful Customer Engagements. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/me09-26-13cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gorman, Paul F. The Secret of Future Victories. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada250718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nottingham, M. The "secret-token" URI Scheme. RFC Editor, 2021. http://dx.doi.org/10.17487/rfc8959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hoffman, P. Additional Master Secret Inputs for TLS. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ehrhard, Thomas P. Air Force UAV's: The Secret History. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada525674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jackson, Timothy, and Laurence Kotlikoff. Banks as Potentially Crooked Secret-Keepers. National Bureau of Economic Research, 2018. http://dx.doi.org/10.3386/w24751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!