| Protecting the rights of the child in the context of migration One day open-ended consultation on “protecting the rights of the child in the context of migration” 52.23 Kb. 1 | read |
| A unified Modeling Approach to Climate System Prediction James Hurrell* 1, Gerald A. Meehl 1, David Bader 2 Rosenstiel School of Marine and Atmospheric Science, University of Miami, Miami, fl and 82.14 Kb. 1 | read |
| Tools for Thought: What Is New and Important About the "E-conomy" Central bankers are by nature and training cautious: their words move markets. Thus when a central banker announces that there is an ongoing technological leap 72.65 Kb. 1 | read |
| Federal Communications Commission fcc 14-141 Before the Federal Communications Commission By the Commission: Chairman Wheeler and Commissioners Clyburn, Rosenworcel, Pai and O’Rielly issuing separate statements 491.66 Kb. 14 | read |
| Amphibian Contributions to Ecosystem Services Submitted: 19 December 2013; Accepted: 25 February 2014; Published: 11 June 2014 144.35 Kb. 2 | read |
| Free Speech and the Myth of the Internet as an Unintermediated Experience II. Judicial Decisions Recognizing Intermediation and Editorial Discretion as Promoting Important Free Speech Values 25 385.78 Kb. 14 | read |
| Rail safety news issue 6 – October 2011 Please note: The newsletter was originally issued in October 2011. This accessible version was created in December 2012 and contains web addresses, phone numbers and names of staff which are no longer accurate 138.43 Kb. 5 | read |
| Management Information System Assignment 3 on Privacy and Security Cases Disclosure of individually identifiable information can occur deliberately or accidentally and can occur within an organization or be the result of an external breach of security. Examples include 30.6 Kb. 1 | read |
| Case study notes Principally this is case explores the issue of licensing and how successful firms can become unsuccessful. It is not a case about Apple and why it has become successful 187.23 Kb. 11 | read |
| Side event: indigenous connectivity 2005 United Nations Permanent Forum on Indigenous Issues Thursday, May 19 2005 Good afternoon, colleagues, and welcome to the 2005 Side Event on Indigenous Connectivity 77.61 Kb. 1 | read |
| Academic Program Review 2.13 Mb. 31 | read |
| Review on Wireless Sensor Network Techniques for Security in Railways In this paper, a survey on various technologies available in Wireless Sensor Networks (wsns) is presented which could be used effectively to prevent such accidents so that enhanced security could be achieved in rail transportation 34.55 Kb. 1 | read |
| Virginia commonwealth university health promotion for people with disabilities project virginia department of health For individuals with disabilities, the idea of devoting time and energy to recreation and activity is too often not even on the radar 96.7 Kb. 1 | read |
| Journal of Good Governance and Sustainable Development in Africa (jggsda), Vol. 2, No 2, May, 2014 Ict infrastructure and small and medium scale enterprises (smes) in nigeria: an impact assessment of microfinance banks 97.71 Kb. 1 | read |
| E-graffiti: evaluating real-world use of a context-aware system We released e-graffiti to 57 students who were using laptops that could access the campus wireless network. Their use of e-graffiti was logged in a remote database and they were also required to fill out a questionnaire towards the end of 49.9 Kb. 1 | read |