72 Ergebnisse für "protec"

UZH_EF_Guidelines_2020Februar

... technology (e.g. existing or envisaged intellectual property protec- tion); § Personal potential of the ... technology (e.g. existing or envisaged intellectual property protec- tion); § Personal potential of the ...

Microsoft Word - Code of conduct.docx

... conne basis of th onal and c ed, namely ative perso edom to te tive protec ent of phys RSETHZ 4 urich ... conne basis of th onal and c ed, namely ative perso edom to te tive protec ent of phys RSETHZ 4 urich ...

https://spcl.inf.ethz.ch/Teaching/2014-osnet/lectures/lec9_1.pdf

... -­‐bit  words   –  Widely  used  in,  e.g.,  TCP/IP/UDP   •  Stronger   protec&on  than  parity   1500 ...   protec&on   –  Given  n  data  bits,  generate  k  check  bits  such  that  the  n+k  bits   are  evenly ... -­‐bit  words   –  Widely  used  in,  e.g.,  TCP/IP/UDP   •  Stronger   protec&on  than  parity   1500 ...   protec&on   –  Given  n  data  bits,  generate  k  check  bits  such  that  the  n+k  bits   are  evenly ...

bp_2016_05.pdf

... driving and protec- tion functions for higher frequencies (40...200kHz), higher operation temperatures and ... complex driving and protec- tion functions for higher frequencies (40...200kHz), higher operation ...

Smart Parking - Best Practices for Image Recognition

... , ensure that facial and number plate recognition is avoided and the protec- tion of personal data thus ... measure on its own is sufficient to ensure responsible and data protec- tion-compliant handling of image ... , ensure that facial and number plate recognition is avoided and the protec- tion of personal data thus ... measure on its own is sufficient to ensure responsible and data protec- tion-compliant handling of image ...

http://www.ibme.uzh.ch/dam/jcr:ffffffff-bef3-f5ee-ffff-ffffcbf75bf7...

... same time provide adequate protec- tion for those who are not able to decide for themselves at a given ... calibrate necessary protec- tion against inappropriate protectionism, and how to respond to the nuances of ... same time provide adequate protec- tion for those who are not able to decide for themselves at a given ... calibrate necessary protec- tion against inappropriate protectionism, and how to respond to the nuances of ...

https://files.ifi.uzh.ch/CSG/staff/franco/extern/publications/IfI-T...

... security market size worth billions of dollars, which represents investments to acquire protec- tion ... -generation protec- tion services – as an instance of cybersecurity management – can adapt to flexible ... security market size worth billions of dollars, which represents investments to acquire protec- tion ... -generation protec- tion services – as an instance of cybersecurity management – can adapt to flexible ...

http://www.geo.uzh.ch/%7Echuggel/riskcourse/lateltin_ch_landsl05.pdf

... measures, in order to insure protec- tion against acceptable events of a given magnitude that depends on ... (e.g. no dormitories in the basement); in the yellow zone, local protec- tion is recommended for new ... measures, in order to insure protec- tion against acceptable events of a given magnitude that depends on ... (e.g. no dormitories in the basement); in the yellow zone, local protec- tion is recommended for new ...

Mehr Ergebnisse

Nach oben