نتایج جستجو برای: license status

تعداد نتایج: 467754  

Journal: :Inverse problems 2011
H T Banks Kathleen Holm Franz Kappel

Typical optimal design methods for inverse or parameter estimation problems are designed to choose optimal sampling distributions through minimization of a specific cost function related to the resulting error in parameter estimates. It is hoped that the inverse problem will produce parameter estimates with increased accuracy using data collected according to the optimal sampling distribution. ...

Journal: :Environmental science & technology 2014
Margaret A Palmer Kelly L Hondula

Compensatory mitigation is commonly used to replace aquatic natural resources being lost or degraded but little is known about the success of stream mitigation. This article presents a synthesis of information about 434 stream mitigation projects from 117 permits for surface mining in Appalachia. Data from annual monitoring reports indicate that the ratio of lengths of stream impacted to length...

Journal: :RFC 2012
Alexey Melnikov Barry Leiba Kepeng Li

This document describes how the "CONVERT" IMAP extension can be used within the Sieve mail filtering language to transform messages before final delivery. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your righ...

Journal: :RFC 2012
Colin Perkins Jean-Marc Valin

This memo discusses potential security issues that arise when using variable bit rate (VBR) audio with the secure RTP profile. Guidelines to mitigate these issues are suggested. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as ...

1939

This specification describes how SRV records can be used to locate email services. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extra...

2011
H. Soliman K. Kuladinithi

This document introduces extensions to Mobile IPv6 that allow nodes to bind one or more flows to a care-of address. These extensions allow multihomed nodes to instruct home agents and other Mobile IPv6 entities to direct inbound flows to specific addresses. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at include Simplified ...

Journal: :RFC 2011
Randy Presuhn

This memo defines a Management Information Base (MIB) module containing textual conventions (TCs) to represent floating-point numbers. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions ...

Journal: :RFC 2010
Donald P. Karp

This document describes an IMAP protocol extension enabling server-side message sorting on the commonly displayed portion of the From and To header fields. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your rig...

Journal: :RFC 2013
Nathaniel S. Borenstein Murray S. Kucherawy

This document defines a response set for describing assertions a reputation service provider can make about email identifiers, for use in generating reputons. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as they describe your ...

Journal: :RFC 2011
Sean Turner

This document describes the conventions for using several cryptographic algorithms with the Cryptographic Message Syntax (CMS) to protect the symmetric key package content type. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at in effect on the date of publication of this document. Please review these documents carefully, as ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید