Skip to main content

Search results for "prey limitation"

Filters: Computers and Information Technology Computers and Information Technology ×
Viewing 1 - 20 of 137 results by relevance
Proceedings

Computers, Communications, and Public Policy: Report of a Workshop at Woods Hole, Massachusetts, August 14-18, 1978  (1981)

Protecting Individual Privacy in Evaluation Research  (1975)

Being Fluent with Information Technology  (1999)

Consensus Study Report

Decrypting the Encryption Debate: A Framework for Decision Makers  (2018)

Consensus Study Report

Assessing the Impacts of Changes in the Information Technology R&D Ecosystem: Retaining Leadership in an Increasingly Global Environment  (2009)

Consensus Study Report

The Future of Computing Performance: Game Over or Next Level?  (2011)

Cryptography's Role in Securing the Information Society  (1996)

Consensus Study Report

Identification of Research Needs Relating to Potential Biological or Adverse Health Effects of Wireless Communication Devices  (2008)

Summary of a Forum on Spectrum Management Policy Reform  (2004)

Proceedings

Opportunities from the Integration of Simulation Science and Data Science: Proceedings of a Workshop  (2018)

Proceedings

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop  (2017)

Consensus Study Report

Avoiding Surprise in an Era of Global Technology Advances  (2005)

Consensus Study Report

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues  (2003)

Consensus Study Report

Global Networks and Local Values: A Comparative Look at Germany and the United States  (2001)

Consensus Study Report

The Internet's Coming of Age  (2001)

The Unpredictable Certainty: Information Infrastructure Through 2000  (1996)

Consensus Study Report

Getting Up to Speed: The Future of Supercomputing  (2005)