UZH_EF_Guidelines_2020Februar
... technology (e.g. existing or envisaged intellectual property protec- tion); § Personal potential of the ... technology (e.g. existing or envisaged intellectual property protec- tion); § Personal potential of the ...
Microsoft Word - Code of conduct.docx
... conne basis of th onal and c ed, namely ative perso edom to te tive protec ent of phys RSETHZ 4 urich ... conne basis of th onal and c ed, namely ative perso edom to te tive protec ent of phys RSETHZ 4 urich ...
https://spcl.inf.ethz.ch/Teaching/2014-osnet/lectures/lec9_1.pdf
... -‐bit words – Widely used in, e.g., TCP/IP/UDP • Stronger protec&on than parity 1500 ... protec&on – Given n data bits, generate k check bits such that the n+k bits are evenly ... -‐bit words – Widely used in, e.g., TCP/IP/UDP • Stronger protec&on than parity 1500 ... protec&on – Given n data bits, generate k check bits such that the n+k bits are evenly ...
bp_2016_05.pdf
... driving and protec- tion functions for higher frequencies (40...200kHz), higher operation temperatures and ... complex driving and protec- tion functions for higher frequencies (40...200kHz), higher operation ...
Smart Parking - Best Practices for Image Recognition
... , ensure that facial and number plate recognition is avoided and the protec- tion of personal data thus ... measure on its own is sufficient to ensure responsible and data protec- tion-compliant handling of image ... , ensure that facial and number plate recognition is avoided and the protec- tion of personal data thus ... measure on its own is sufficient to ensure responsible and data protec- tion-compliant handling of image ...
http://www.ibme.uzh.ch/dam/jcr:ffffffff-bef3-f5ee-ffff-ffffcbf75bf7...
... same time provide adequate protec- tion for those who are not able to decide for themselves at a given ... calibrate necessary protec- tion against inappropriate protectionism, and how to respond to the nuances of ... same time provide adequate protec- tion for those who are not able to decide for themselves at a given ... calibrate necessary protec- tion against inappropriate protectionism, and how to respond to the nuances of ...
https://files.ifi.uzh.ch/CSG/staff/franco/extern/publications/IfI-T...
... security market size worth billions of dollars, which represents investments to acquire protec- tion ... -generation protec- tion services – as an instance of cybersecurity management – can adapt to flexible ... security market size worth billions of dollars, which represents investments to acquire protec- tion ... -generation protec- tion services – as an instance of cybersecurity management – can adapt to flexible ...
http://www.geo.uzh.ch/%7Echuggel/riskcourse/lateltin_ch_landsl05.pdf
... measures, in order to insure protec- tion against acceptable events of a given magnitude that depends on ... (e.g. no dormitories in the basement); in the yellow zone, local protec- tion is recommended for new ... measures, in order to insure protec- tion against acceptable events of a given magnitude that depends on ... (e.g. no dormitories in the basement); in the yellow zone, local protec- tion is recommended for new ...
