Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7669 - 7680 of 8448
Notice of Intent

Information Technology - Portable Common Tool...

This part of ISO/IEC 13719 defines the binding of the Portable Common Tool Environment (PCTE), as specified in ISO/IEC 13719-1, to the C programming language. A number of features are not completely defined in ISO/IEC 13719-1...
Notice of Intent

Textile test methods — Determination of length...

This method specifies two procedures for the determination of the length of yarns and threads in package form subject to the limitations as to stretchiness, linear density of the yarn being measured and the length of the yarn...
Notice of Intent

Information Technology - Telecommunications and...

ISO/IEC 15505:2003 specifies supplementary service Message Waiting Indication (SS-MWI), which is related, but not limited, to various basic services supported by Private Integrated Services Networks (PISNs). Basic services...
Notice of Intent

Information Technology - Telecommunications and...

ISO/IEC 15051:2003 specifies supplementary service Recall (SS-RE), which is applicable to various basic services supported by Private Integrated Services Networks (PISN). Basic services are specified in ISO/IEC 11574. SS-RE...
Notice of Intent

Information Technology - Telecommunications and...

ISO/IEC 15053:2003 specifies Additional Network Feature Call Interception (ANF-CINT), which is applicable to various basic services supported by Private Integrated Services Networks (PISN). Basic services are specified in ISO...
Notice of Intent

Information technology - High efficiency coding...

This document specifies a set of tests and procedures designed to indicate whether encoders or decoders meet the normative requirements specified in Rec. ITU-T H.265 | ISO/IEC 23008-2. NOTE The conformance bitstreams...
Notice of Intent

Amendment 1 - Information technology - Security...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...