Gotowa bibliografia na temat „Sensitive date”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Sensitive date”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Sensitive date"
Canet, R. "Sowing Date for Photoperiod Sensitive Caribe 7." International Rice Research Newsletter 11, no. 2 (1986): 30–31. https://doi.org/10.5281/zenodo.7121702.
Pełny tekst źródłaCulp, Rex E. "Up-to-Date, but Are They Culturally Sensitive?" Contemporary Psychology: A Journal of Reviews 37, no. 9 (1992): 899. http://dx.doi.org/10.1037/032570.
Pełny tekst źródłaKovi, Mallikarjuna Rao, Yong Hu, Xufeng Bai, and Yongzhong Xing. "QTL mapping for thermo-sensitive heading date in rice." Euphytica 205, no. 1 (2015): 51–62. http://dx.doi.org/10.1007/s10681-015-1383-6.
Pełny tekst źródłaFang, Jinggui, and ChihCheng T. Chao. "Methylation Sensitive Amplification Polymorphism in Date Palms and Their Offshoots." HortScience 41, no. 4 (2006): 994A—994. http://dx.doi.org/10.21273/hortsci.41.4.994a.
Pełny tekst źródłaCRANSTON, PETER S., FRANK-THORSTEN KRELL, KEN WALKER, and DAVID HEWES. "Wiley's Early View constitutes valid publication for date-sensitive nomenclature." Systematic Entomology 40, no. 1 (2015): 2–4. http://dx.doi.org/10.1111/syen.12119.
Pełny tekst źródłaAbdulai, A. L., M. Kouressy, M. Vaksmann, F. Asch, M. Giese, and B. Holger. "Latitude and Date of Sowing Influences Phenology of Photoperiod-Sensitive Sorghums." Journal of Agronomy and Crop Science 198, no. 5 (2012): 340–48. http://dx.doi.org/10.1111/j.1439-037x.2012.00523.x.
Pełny tekst źródłaZiouti, A., C. Modafar, A. Fleuriet, S. Boustani, and J. J. Macheix. "Phenolic compounds in date palm cultivars sensitive and resistant toFusarium oxysporum." Biologia plantarum 38, no. 3 (1996): 451–57. http://dx.doi.org/10.1007/bf02896679.
Pełny tekst źródłaTownsend, Teresa, Leigh Lane, and James Martin. "Context-Sensitive Solutions." Transportation Research Record: Journal of the Transportation Research Board 1904, no. 1 (2005): 66–74. http://dx.doi.org/10.1177/0361198105190400107.
Pełny tekst źródłaPetrides, George, and Wouter Verbeke. "Cost-sensitive ensemble learning: a unifying framework." Data Mining and Knowledge Discovery 36, no. 1 (2021): 1–28. http://dx.doi.org/10.1007/s10618-021-00790-4.
Pełny tekst źródłaNANDITA. N, DEVI, KOMANG DHARMAWAN, and DESAK PUTU EKA NILAKUSMAWATI. "ANALISIS SENSITIVITAS HARGA OPSI MENGGUNAKAN METODE GREEK BLACK SCHOLES." E-Jurnal Matematika 7, no. 2 (2018): 148. http://dx.doi.org/10.24843/mtk.2018.v07.i02.p197.
Pełny tekst źródłaRozprawy doktorskie na temat "Sensitive date"
Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.
Pełny tekst źródłaFolkesson, Carl. "Anonymization of directory-structured sensitive data." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-160952.
Pełny tekst źródłaSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Pełny tekst źródłaBakri, Mustafa al. "Uncertainty-Sensitive Reasoning over the Web of Data." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM073.
Pełny tekst źródłaLjus, Simon. "Purging Sensitive Data in Logs Using Machine Learning." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411610.
Pełny tekst źródłaOshima, Sonoko. "Neuromelanin‐Sensitive Magnetic Resonance Imaging Using DANTE Pulse." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263531.
Pełny tekst źródłaEl-Khoury, Hiba. "Introduction of New Products in the Supply Chain : Optimization and Management of Risks." Thesis, Jouy-en Josas, HEC, 2012. http://www.theses.fr/2012EHEC0001/document.
Pełny tekst źródłaGholami, Ali. "Security and Privacy of Sensitive Data in Cloud Computing." Doctoral thesis, KTH, Parallelldatorcentrum, PDC, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186141.
Pełny tekst źródłaMathew, George. "A Perturbative Decision Making Framework for Distributed Sensitive Data." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/269109.
Pełny tekst źródłaAnsell, Peter. "A context sensitive model for querying linked scientific data." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/49777/1/Peter_Ansell_Thesis.pdf.
Pełny tekst źródłaKsiążki na temat "Sensitive date"
Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.
Znajdź pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.
Pełny tekst źródłaPhotopoulos, Constantine. Managing catastrophic loss of sensitive data. Syngress Pub., 2008.
Znajdź pełny tekst źródłaClaire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruylant, 2007.
Znajdź pełny tekst źródłaOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. The Office, 1992.
Znajdź pełny tekst źródłaGreat Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, 2002.
Znajdź pełny tekst źródłaDaniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2nd ed. Georgia State Univ. Business Press, 1993.
Znajdź pełny tekst źródłaComputer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Computer Security Analysts, 1986.
Znajdź pełny tekst źródłaE, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Sage Publications, 1986.
Znajdź pełny tekst źródłaFicco, Massimo, and Gianni D'Angelo, eds. Artificial Intelligence Techniques for Analysing Sensitive Data in Medical Cyber-Physical Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-70775-9.
Pełny tekst źródłaCzęści książek na temat "Sensitive date"
Christen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Introduction." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_1.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Computational Efficiency." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_10.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Practical Considerations." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_11.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Empirical Evaluation." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_12.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Real-world Applications." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_13.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Future Research Challenges and Directions." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_14.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Regulatory Frameworks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_2.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Linking Sensitive Data Background." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_3.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Private Information Sharing Protocols." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_4.
Pełny tekst źródłaChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. "Assessing Privacy and Risks." In Linking Sensitive Data. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1_5.
Pełny tekst źródłaStreszczenia konferencji na temat "Sensitive date"
Zhang, Liwei, Tong Zhang, Wenxue Wu, Xiaoqin Feng, Guoxi Lin, and Fengyuan Ren. "Fault- Tolerant Cyclic Queuing and Forwarding in Time-Sensitive Networking." In 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2024. http://dx.doi.org/10.23919/date58400.2024.10546689.
Pełny tekst źródłaMacdonald, Digby D., Mima Urquidi-Macdonald, and Chun Liu. "The Deterministic Prediction of Damage in Light Water Nuclear Reactors." In CORROSION 1993. NACE International, 1993. https://doi.org/10.5006/c1993-93173.
Pełny tekst źródłaHolmes, R. M., and D. J. Surman. "XPS and Auger Investigation of Mechanisms Affecting Corrosion Inhibition of Metals." In CORROSION 1989. NACE International, 1989. https://doi.org/10.5006/c1989-89609.
Pełny tekst źródłaAndresen, Peter L., and Clyde L. Briant. "Environmentally Assisted Cracking of 304L/316L/316NG Stainless Steels in 288°C Water." In CORROSION 1988. NACE International, 1988. https://doi.org/10.5006/c1988-88262.
Pełny tekst źródłaChandran, Sandeep, Smruti R. Sarangi, and Preeti Ranjan Panda. "Space Sensitive Cache Dumping for Post-silicon Validation." In Design Automation and Test in Europe. IEEE Conference Publications, 2013. http://dx.doi.org/10.7873/date.2013.113.
Pełny tekst źródłaOttlik, Sebastian, Christoph Gerum, Alexander Viehl, Wolfgang Rosenstiel, and Oliver Bringmann. "Context-sensitive timing automata for fast source level simulation." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927042.
Pełny tekst źródłaLi, Ang, Peng Li, Tingwen Huang, and Edgar Sanchez-Sinencio. "Noise-sensitive feedback loop identification in linear time-varying analog circuits." In 2017 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2017. http://dx.doi.org/10.23919/date.2017.7927190.
Pełny tekst źródłaSchmidt, Tim, Zhongqi Cheng, and Rainer Domer. "Port call path sensitive conflict analysis for instance-aware parallel SystemC simulation." In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2018. http://dx.doi.org/10.23919/date.2018.8342034.
Pełny tekst źródłaGuerra, R., and G. Fohler. "On-line scheduling of target sensitive periodic tasks with the gravitational task model." In 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012). IEEE, 2012. http://dx.doi.org/10.1109/date.2012.6176536.
Pełny tekst źródłaChen, Shu-Yung, Chien-Hao Chen, and Ren-Song Tsay. "An activity-sensitive contention delay model for highly efficient deterministic full-system simulations." In Design Automation and Test in Europe. IEEE Conference Publications, 2014. http://dx.doi.org/10.7873/date.2014.226.
Pełny tekst źródłaRaporty organizacyjne na temat "Sensitive date"
Taylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Understanding the Threat. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375686.
Pełny tekst źródłaTaylor, Christopher Y., and Eric V. Walton. Date Sensitive Computing Problems: Dangers and Opportunities. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada375687.
Pełny tekst źródłaToomey, Rickard, Vincent Santucci, Justin Tweet, Vincent Santucci, Rickard Toomey, and Justin Tweet. Mammoth Cave National Park: Paleontological resource inventory (sensitive version). National Park Service, 2024. http://dx.doi.org/10.36967/2306041.
Pełny tekst źródłaCurtis, Rob, Sonia Bingham, and Megan Shaeffer. Natural resource assessment of the proposed Columbia Sensitive Resource Zone, Cuyahoga Valley National Park, Ohio. National Park Service, 2025. https://doi.org/10.36967/2310114.
Pełny tekst źródłaCohen, Yuval, Christopher A. Cullis, and Uri Lavi. Molecular Analyses of Soma-clonal Variation in Date Palm and Banana for Early Identification and Control of Off-types Generation. United States Department of Agriculture, 2010. http://dx.doi.org/10.32747/2010.7592124.bard.
Pełny tekst źródłaAlders, George. L51630A In-Line Detection and Sizing of Stress Corrosion Cracks Using EMAT Ultrasonics - Phase II. Pipeline Research Council International, Inc. (PRCI), 1991. http://dx.doi.org/10.55274/r0011370.
Pełny tekst źródłaKeller, Dr Jared Robert. How do data institutions facilitate safe access to sensitive data? Open Data Institute, 2021. http://dx.doi.org/10.61557/heje5130.
Pełny tekst źródłaMarchant, Christian, Ryan Kirkpatrick, and David Ober. Coincidence processing of photon-sensitive mapping lidar data. Engineer Research and Development Center (U.S.), 2020. http://dx.doi.org/10.21079/11681/35599.
Pełny tekst źródłaFalk, J., and M. Kucherawy, eds. Redaction of Potentially Sensitive Data from Mail Abuse Reports. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6590.
Pełny tekst źródłaPayton, Jamie, Gruia-Catalin Roman, and Christine Julien. Simplifying Context-Aware Agent Coordination Using Context-Sensitive Data Structures. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada484172.
Pełny tekst źródła