The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
(Write Office of the Chief Engineer, Federal Power Commission, Washington, D.C. 20426, regarding Staff Report on Guidelines for Energy Conservation for Immediate Implementation, Small Business and Light ... ENERGY AND MATERIALS POLICY: Proceedings of a May 1972 national conference sponsored by the University of Texas and the National Commission on Materials Policy, examining the interrelationships of various ...
This study concludes that both models can support green computing in Malaysia public sector; however no policy related to processes procedure of BYOD that can be used as guideline for green IT practices ... With the current usage of mobile devices such as the smart phones, tablets, and laptops as the necessity in the working environment, the concept of BYOD went beyond personal use towards workplace. ... Therefore, the IT department needs to make the procurement of computer and provide the computer equipment for their use. ...doi:10.14419/ijet.v7i3.20.19273 fatcat:tgtc5xqjxfdwdpeetvwmqz7uui
We also provide the considerations while defining high-level guidelines, and describe a policy refinement framework that formalizes the requirements to refine high-level guidelines into executable policies ... This article presents a methodological approach towards the policy refinement problem. ... ACKNOWLEDGMENTS This article was supported in part by the EC IST-EMANICS Network of Excellence (#26854). ...doi:10.1109/mcom.2006.1710414 fatcat:jghcraxdfnbazdc3yktfxhtq5e
OFFERS OF BOOKS The ACJ will continue to receive books under its present policy guidelines. These are available on request. ... AUSTRALIAN COMPUTER JOURNAL New Guidelines Electronic Book Review Management and Publication Any books not taken up for review on this basis will then be offered under the existing process of explicit ...
Furthermore, we analyse and evaluate how mitigation options for identified open security issues for CI in the cloud point to individual aspects of standards and guidelines to support the creation of secure ... With the increasing popularity of cloud computing, security in cloud-based applications is gaining awareness and is regarded as one of the most crucial factors for the longterm success of such applications ...  explore security issues of secure cloud computing for CI Providers and investigate security requirements for the CI providers. ...doi:10.1109/cloudcom.2014.172 dblp:conf/cloudcom/PaudelTWHN14 fatcat:fybbweodxvegrpqlzfkzbq3mji
The analysis is based on recent ACM/IEEE curriculum guidelines for IT, a rigorous literature review as well as various viewpoints and their relevance for sustainability-oriented curriculum development ... It also considers recent ACM/IEEE curriculum guidelines for IT professionals, which assert that IT students should explore IT strategies required for developing a culture of green and sustainable IT. ( ... These are interrelated and should be selected in a manner towards an optimum arrangement and alliance. ...doi:10.3390/su12145769 fatcat:qxzcc3ozv5flvhpfyzz72wifoa
Since 1999, the Iberoamerican Congress on Higher Education in Computing (CIESC) has been held as one of the main associated scientific events of the Latin American Conference on Informatics (CLEI). ... Its purpose has been to stimulate and provide a space for academics and professionals to discuss topics centered on undergraduate and graduate education in Computing. ... The sixth selected paper is "A Detailed Study of the Computer Science Degree at the Central University of Venezuela: Towards a New Curriculum Design" by Maria E. Villapol, Zenaida Castillo, Alecia E. ...doi:10.19153/cleiej.17.3.6 fatcat:6aojla4ilnhh5ldx5jksfej4tq
Outcome: The expected outcomes of the implementation of SLR protocol will be the identification of solutions/practices for multisourcing vendors in the development of green and sustainable software in ... Context: Green software engineering (GSE) is a research area gaining reputation to develop green and sustainable software. ... According to Tushi and Bonny  "green computing is the practice of implementing policies and procedures that improve the efficiency of computing resources in such a way as to reduce the energy consumption ...doi:10.5120/ijca2016909712 fatcat:ozum256ijvdatezveltmctmzsy
This master thesis proposal provides the necessary context and outlines the work in progress for exploring machine-actionable Data Management Plans (maDMPs) use cases in an institutional context such as ... These tools guide the researchers through a set of open questions covering the themes of a DMP and provide templates for funder-specific guidance based on the selected RDM policy. ... The development of a demonstrator requires the engineering of web applications including the selection of suitable technologies as covered by the Internet Computing and Distributed Systems Technologies ...doi:10.5281/zenodo.1464188 fatcat:4kafkjt5bbdm5gj5k6dyf6bfea
According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security ... policies. ... International Science Index, Computer and Information Engineering Vol:8, No:8, 2014 waset.org/Publication/9998987 World Academy of Science, Engineering and Technology International Journal of Computer ...doi:10.5281/zenodo.1094160 fatcat:czi6fnzpvbf2bd5igklzywgrzq
Also included is an analysis of existing social media security policies and guidelines within the public and private sectors. ... This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. ... From the selection of policies available, very few mentioned guidance for securing social media technologies specifically, and even fewer associated social engineering with prominent security threats. ...arXiv:1511.06915v1 fatcat:d2vwxv2u6rg43eb5vwvhb4raya
The IT and Computing education in India offered in two platform, in one it is the area of Science (Applied) and in another it is fall under the area of Technology/ Engineering. ... and policies of higher educational institutions. ... Information Assurance is essential for the mobile security as well as other allied security solutions specially the guidelines and principles etc. Design, development, and modernization of a secure and ...doi:10.5281/zenodo.6575947 fatcat:7wgnnkx2dzenhjufwyclrk6hra
COMPUTER-AIDED METHOD ENGINEERING Computer-Aided Software Engineering (CASE) automates automation. In contrast, Computer-Aided Method Engineering (CAME) automates the assembly of methods. ... At the repeatable level, policies for managing a project and procedures to implement those policies are established. ...doi:10.1007/978-0-387-35080-6_1 fatcat:wpfmcpuckzbcjdprdeygon745q
W hile progress toward curricular guidelines continued on numerous fronts, our selective tour picks up next with a 2010 paper by Cooper et al., 4 again under the IA moniker. ... They noted that IA programs may live in academic departments ranging from computer science (CS), computer engineering, information technology, and security, to business, public policy, and forensic science ...doi:10.1109/msec.2021.3093735 fatcat:vvu25um2wffkpcsr6zbfm2uqhy
Lecture Notes in Computer Science
By means of conducting structured and tool-supported attribute and policy management activities, the migration guide supports organizations to distribute privilege assignments in an application-independent ... This paper closes the existing research gap by introducing a novel migration guide for extending static IAM systems with dynamic ABAC policies. ... The research leading to these results was supported by the "Bavarian State Ministry of Education, Science and the Arts" as part of the FORSEC research association. ...doi:10.1007/978-3-319-26961-0_9 fatcat:omucnln6ifdntampbqockzjwku
« Previous Showing results 1 — 15 out of 80,590 results