Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 1405 - 1416 of 9893
Notice of Intent

Information Technology - Programming Languages...

This part of ISO/IEC 13211 is designed to promote the applicability and portability of Prolog modules that contain Prolog text complying with the requirements of the Programming Language Prolog as specified in this part of...
Notice of Intent

Information technology - Security techniques - ...

This document gives guidelines for — a process on privacy impact assessments, and — a structure and content of a PIA report. It is applicable to all types and sizes of organizations, including public companies, private...
Notice of Intent

Information technology - Programming languages...

1 This document specifies the form and establishes the interpretation of programs expressed in the base Fortran language. The purpose of this document is to promote portability, reliability, maintainability, and efficient...
Notice of Intent

Information technology - Security techniques - ...

This International Standard provides organizations with high-level guidance about how to assess their capability to manage privacy-related processes. In particular, it — specifies steps in assessing processes to determine...
Notice of Intent

Information technology - Upper level ontology...

This document establishes general principles and gives guidelines for an indicator upper level ontology (IULO) for smart cities that enables the representation of indicator definitions and the data used to derive them. It...
Notice of Intent

Information technology - Object oriented BioAPI...

This document specifies an interface of a BioAPI Java framework and BioAPI Java BSP, which will mirror the corresponding components, specified in ISO/IEC 30106-1. The semantic equivalent of ISO/IEC 30106-1 is maintained in...
Notice of Intent

Information technology - Security techniques - ...

ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties. This document defines the parties involved in a secret sharing scheme, the terminology used in the context of secret sharing...