• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,901
Next 10 →

Starting Date:

by unknown authors , 2012
"... information in a consistent, transparent and comparable manner taking into account specific guidelines and national circumstances. The proposed report is consistent with the “Guidelines for the preparation of national communications from Parties not included in Annex I to the Convention ” (COP Decis ..."
Abstract - Add to MetaCart
information in a consistent, transparent and comparable manner taking into account specific guidelines and national circumstances. The proposed report is consistent with the “Guidelines for the preparation of national communications from Parties not included in Annex I to the Convention ” (COP Decision 17/CP.8). The main components of the report are: description of national circumstances; national inventory of anthropogenic green house gases (GHG) emissions by sources and removals by sinks; assessment of vulnerability and planning of adaptation; climate change mitigation by addressing emissions and removals; capacity building to assess financial and technology needs, modalities to absorb them and host projects; compilation and production of the SNC, including Executive Summary. Lao PDR’s SNC is composed of several chapters. Many chapters have been written by different authors. The remaining chapter is constraints, gaps and related technical and financial needs. It is important to provide information on the gaps and constraints and the related financial, technical and capacity needs identified during the implementation of the national communication. Some of the information to be provided in this section may have already been included under various sections of the national communication. However, it would be necessary to further elaborate on the specific constraints, gaps and

Start Date End Date

by unknown authors , 2006
"... Please complete proposals electronically and enter text into the boxes provided. ..."
Abstract - Add to MetaCart
Please complete proposals electronically and enter text into the boxes provided.

POSSIBLE STARTING DATE: EDUCATION

by unknown authors
"... [Date of graduation] ..."
Abstract - Add to MetaCart
[Date of graduation]

SIT Start Date Active

by Start Date, Start Date, Start Date
"... Grade (credit hours) Specialty (SOM – LOV) License Number Expiry Date ..."
Abstract - Add to MetaCart
Grade (credit hours) Specialty (SOM – LOV) License Number Expiry Date

Country Start Date

by unknown authors , 2009
"... Classification ..."
Abstract - Add to MetaCart
Classification

Expected Starting Date:

by Duty Station
"... 4:30 pm 5 days a week, 15 days annual leave per year) ..."
Abstract - Add to MetaCart
4:30 pm 5 days a week, 15 days annual leave per year)

Starting Date: As soon as possible

by Service Contract (sb, Based In Gaza Fcu/ocha Opt
"... Duration: 6 months with possibility of extension ..."
Abstract - Add to MetaCart
Duration: 6 months with possibility of extension

Starting date: immediately

by Fakültät Für Informatik, Prof Dr, Alexander Pretschner
"... Context Software obfuscation is a code transformation which aims to make a computer program “unintelligible ” while preserving its functionality. A recent breakthrough in the formal study of obfuscation is presented by Garg et al. [1]. They propose a candidate indistinguishability obfuscation approa ..."
Abstract - Add to MetaCart
Context Software obfuscation is a code transformation which aims to make a computer program “unintelligible ” while preserving its functionality. A recent breakthrough in the formal study of obfuscation is presented by Garg et al. [1]. They propose a candidate indistinguishability obfuscation approach, which is applicable to all polynomial-size log-depth circuits and is based on multi-linear jigsaw puzzles (a simplified variant of multi-linear maps). This work promises to be ground-breaking since Goldwasser and Rothblum have proven that indistinguishability obfuscators achive the notion of best-possible obfuscation [2]. Indistinguishability obfuscation has several interesting applications, e.g. functional encryption [1] and deniable encryption [3]. However, as to our knowledge, no studies have been published as to the effectiveness of this approach against reverse engineering attacks of simple algorithms implemented in software or hardware programs. Goal One goal of this thesis is to investigate the applicability of the approach proposed by Garg et al. [1] on modern software and/or hardware programs. In this context, applicability refers

Starting Date # of Direct Reports

by Office Phone, Cell Phone
"... Women in Technology’s mission is to develop and promote women for success in technology in Georgia, and through the Careers in Action programs we give women the tools they need to take their career to the next level. Please ..."
Abstract - Add to MetaCart
Women in Technology’s mission is to develop and promote women for success in technology in Georgia, and through the Careers in Action programs we give women the tools they need to take their career to the next level. Please

5) Proposed Starting Date

by unknown authors , 2007
"... 72 credit hours is the number of hours dictated to satisfy the technician certification and ..."
Abstract - Add to MetaCart
72 credit hours is the number of hours dictated to satisfy the technician certification and
Next 10 →
Results 1 - 10 of 3,901
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University