Techniques Sample Clauses

Techniques. Framework agreement: Framework agreement, partly without reopening and partly with reopening of competition Information about the dynamic purchasing system No dynamic purchase system Electronic auction:
AutoNDA by SimpleDocs
Techniques. Framework agreement: Framework agreement, without reopening of competition Information about the dynamic purchasing system: No dynamic purchase system
Techniques. Framework agreement: Framework agreement, without reopening of competition Maximum number of participants: 1 Information about the dynamic purchasing system No dynamic purchase system Electronic auction:
Techniques. Notification of C.P.R. classes will be sent to all employees via DOECAST, and schedules will be posted on the DOE intranet. The names of all current employees who have received C.P.R. Training shall be posted and annually updated electronically so as to insure proper employee awareness.
Techniques. Procedures;
Techniques. In an effort to minimize the performance management burden, simplified surveillance methods shall be used by the University to evaluate Contractor performance when appropriate. The primary methods of surveillance are:
Techniques. To the extent possible and cost effective, and where feasible, agencies must use advanced technologies and material recycling techniques that reduce the cost of maintaining and rehabilitating the streets and highways, and that exhibit reduced levels of greenhouse gas emissions through material choice and construction method.
AutoNDA by SimpleDocs
Techniques. Our protocol uses non-interactive threshold signatures and a random-access coin-tossing scheme from cryptography; these have efficient implementations in the random oracle model. The random oracle model was first used in a rather informal way by Fiat and Shamir [22]; it was first formalized and used in other contexts by Bellare and Rogaway [4] and has since been used to analyze a number of practical cryptographic protocols. Of course, it would be better not to rely on random oracles, as they are essentially a heuristic device; nevertheless, random oracles are a useful tool—they allow us to design truly practical protocols that admit a security analysis, which yields very strong evidence for their security. As far as we know, our work is the first of its kind to apply the random oracle model to the Byzantine agreement problem. The notion of a threshold signature scheme was introduced by Xxxxxxx, Xxxxxxx and oth- ers [17, 18, 8, 16] and has been widely studied since then (X. Xxxxx [33] provides new results and a survey of recent literature). It is a protocol for n parties tolerating up to t corruptions, where each party holds a share of the signing key and k cooperating parties together can generate a signature. In a non-interactive threshold signature scheme, each party outputs a signature share upon request and there is an algorithm to combine k valid signature shares to consti- tute a valid signature. Such non-interactive combination is used in our agreement protocol: a party can justify its vote for a particular value by a single threshold signature generated from k signature shares. This saves a factor n in terms of bit complexity.
Techniques. The following discipline management techniques may be used—alone or in combination—for behavior prohibited by the Student Code of Conduct or by campus or classroom rules:  Verbal correction, oral or written.  Cooling-off time or “time-out.”  Seating changes within the classroom or vehicles owned or operated by the district.  Temporary confiscation of items that disrupt the educational process.  Rewards or demerits.  Behavioral contracts.  Counseling by teachers, school counselors, or administrative personnel.  Parent-teacher conferences.  Grade reductions for cheating, plagiarism, and as otherwise permitted by policy.  Detention, including outside regular school hours.  Sending the student to the office or other assigned area, or to in-school suspension.  Assignment of school duties such as cleaning or picking up litter.  Withdrawal of privileges, such as participation in extracurricular activities, eligibility for seeking and holding honorary offices, or membership in school-sponsored clubs and organizations.  Penalties identified in individual student organizations’ extracurricular standards of behavior.  Restriction or revocation of district transportation privileges.  School-assessed and school-administered probation.  Corporal punishment, unless the student’s parent or guardian has provided a signed statement prohibiting its use.  Out-of-school suspension, as specified in the Out-of-School Suspension section of this Code.  Placement in a DAEP, as specified in the DAEP section of this Code.  Placement and/or expulsion in an alternative educational setting, as specified in the Placement and/or Expulsion for Certain Offenses section of this Code.  Expulsion, as specified in the Expulsion section of this Code.  Referral to an outside agency or legal authority for criminal prosecution in addition to disciplinary measures imposed by the district.  Other strategies and consequences as determined by school officials.
Techniques. The following discipline management techniques may be used—alone or in combination—for behavior prohibited by the Student Code of Conduct or by campus or classroom rules:
Time is Money Join Law Insider Premium to draft better contracts faster.