Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8185 - 8196 of 9117
Notice of Intent

Information technology - High efficiency coding...

The formats defined in this document enable the interchange, editing, and display of images, as well as the carriage of metadata associated with those images. The Image File Format builds on tools defined in ISO/IEC 14496-12...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies: extended security functional...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series. It...
Notice of Intent

Information security, cybersecurity and privacy...

This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs...
Notice of Intent

Information technology - Business operational...

This document: examines the basic concepts that have been developed for both cloud computing and Open-edi; identifies key Open-edi concepts relevant to cloud computing; identifies key cloud computing concepts relevant to Open...
Notice of Intent

Internet of things (IoT) - Data exchange platform...

This document specifies requirements for an Internet of Things (IoT) data exchange platform for various services in the technology areas of: the middleware components of communication networks allowing the co-existence of IoT...
Notice of Intent

Information security - Criteria and methodology...

For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides...
Notice of Intent

Information technology - Guidance for the use...

This document describes the regular expression support in SQL (ISO/IEC 9075-2) adopted from the regular expression syntax of XQuery and XPath Functions and Operators 3.1, which is derived from Perl. This document discusses...
Notice of Intent

Information technology - Guidance for the use...

This document describes the support in SQL for time-related information. This document discusses the following features of the SQL language: Time-related data types Operations on time-related data Time-related Predicates...
Notice of Intent

Information technology - Guidance for the use...

This document describes the support for the use of SQL within programs written in Java. This document discusses the following features of the SQL language: The embedding of SQL expressions and statements in programs written...
Notice of Intent

Information technology - Guidance for the use...

This document provides a tutorial of SQL routines and types using the Java™ programming language. This document discusses the following features of the SQL Language: The use of routines written in the Java programming...
Notice of Intent

Information technology - Guidance for the use...

This document discusses the syntax and semantics for recognizing patterns in rows of a table, as defined in ISO/IEC 9075-2, commonly called “SQL/RPR”. SQL/RPR defines two features regarding row pattern recognition: Feature...