Search

Refine Results
Type
Status
Period range

From

To

Displaying 73 - 84 of 323
Notice of Intent

Information Technology -- Real Time Locating ...

This Standard defines the test methods for determining the conformance of Ultra Wide Band real-time locating system (RTLS) tags with the specifications given in the corresponding parts of ISO/IEC 24730‑62, but does not apply...
Notice of Intent

Information Technology . Language Independent...

This part of ISO/IEC 10967 de.nes the properties of numerical approximations for many of the real elementary numerical functions available in standard libraries for a variety of programming languages in common use for...
Information Technology - Telecommunications and Information Exchange Between Systems - Private Integrated Services Network - Circuit-Mode 64 kbit/s Bearer Services - Service Description, Functional Capabilities and Information Flows
This International Standard specifies the service description and control aspects, including functional capabilities and information flows, of standardised circuit-mode bearer services which may be supported by a Private...
Notice of Intent

Information Technology - Telecommunications and...

This International Standard specifies the service description and control aspects, including functional capabilities and information flows, of standardised circuit-mode bearer services which may be supported by a Private...
Notice of Intent

Electric Vehicle Infrastructure Accessibility...

Note: As requested by the responsible SDO, this NOI being reissued as the standard was in the initial stages of development for more than 12 months. An additional comment period of February 6 to February 27, 2024 (originally...
Notice of Intent

Information Technology - Language Independent...

This part of ISO/IEC 10967 specifies the properties of numerical approximations for complex arithmetic operations and many of the complex elementary numerical functions available in a variety of programming languages in...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...