Vuforia U Sample Clauses

Vuforia U. S. Specified Employees 26 7.2 Vuforia Swiss Employees 27
AutoNDA by SimpleDocs

Related to Vuforia U

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Family and Medical Leave Act (FMLA a. Pursuant to the Family and Medical Leave Act (FMLA, as amended, an employee with more than one (1) year of experience, and who works at least 1250 hours per year, shall be entitled to an unpaid leave of absence, of up to twelve (12) weeks, during a twelve (12) month period, for one or more of the following:

  • Non-U S. Person...............................................................................33

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Family Medical Leave Act (FMLA A. The State acknowledges its commitment to comply with the spirit and intent of the leave entitlement provided by the FMLA and the California Family Rights Act (CFRA) referred to collectively as "FMLA." The State and the Union recognize that on occasion it will be necessary for employees of the State to take job- protected leave for reasons consistent with the FMLA. As defined by the FMLA, reasons for an FMLA leave may include an employee's serious health condition, for the care of a child, spouse, or parent who has a serious health condition, and/or for the birth or adoption of a child.

  • Xxxxx and X Xxxxxxxxxx. Non-Commutative Geometry, Non- Associative Geometry and the Standard Model of Particle Physics, 1401.5083.

  • Xxxx and X Xxxx: Scalable protocols for authenticated group key exchange, in: Advances in Cryp- tology – Crypto’03, LNCS 2729, pp. 110–125, 2003.

  • COVID-19 Residents acknowledge that in March 2020 the World Health Organization declared a global pandemic of the virus leading to COVID-19. The Governments of Canada, the Province of Ontario, and local Governments responded to the pandemic with legislative amendments, controls, orders, by-laws, requests of the public, and requests and requirements to Humber (collectively, the “Directives”). It is uncertain how long the pandemic, and the related Directives, will continue, and it is unknown whether there may be a resurgence of the virus leading to COVID-19 or any mutation thereof (collectively, “COVID- 19”). Without limiting the generality of the foregoing paragraph, Humber shall not be held legally responsible or be deemed to be in breach of this Agreement for any damages or loss arising out of or caused by:

  • Program Fraud and False or Fraudulent Statements or Related Acts (A) The CONTRACTOR acknowledges that the provisions of the Program Fraud Civil Remedies Act of 1986, as amended, 31 U.S.C. § 3801 et seq . and U.S. DOT regulations, "Program Fraud Civil Remedies," 49 C.F.R. Part 31, apply to its actions pertaining to this Project. Upon execution of the underlying contract, the CONTRACTOR certifies or affirms the truthfulness and accuracy of any statement it has made, it makes, it may make, or causes to be made, pertaining to the underlying contract or the FTA assisted project for which this contract work is being performed. In addition to other penalties that may be applicable, the CONTRACTOR further acknowledges that if it makes, or causes to be made, a false, fictitious, or fraudulent claim, statement, submission, or certification, the Federal Government reserves the right to impose the penalties of the Program Fraud Civil Remedies Act of 1986 on the CONTRACTOR to the extent the Federal Government deems appropriate.

  • Xxxxxxxx and X X. Xxxxx. 1930. Checklist of the fishes and fishlike vertebrates of North and Middle America north of the northern boundary of Venezuela and Columbia. Rept. U.S. Fish Comm. 1928(2):1-670. Jordan, D.S. and X.X. Xxxxxxxx. 1896. The fishes of North and Middle America. Part 1. U.S. Natl. Mus. Bul. 47:1-1240. Xxxxx, S. and X. Xxxxxx. 2005..Hydrogeologic setting of the snake valley hydrologic basin, Xxxxxxx County, Utah, and White Pine and Lincoln Counties, Nevada – implications for possible effects of proposed water xxxxx. Report of investigation 254, Utah Geological Survey. Xxxxxxx, M.C. 1982. Status report of three Bonneville basin endemic fishes. Prepared for the U.S. Fish and Wildlife Service. 27 pp. May, B. E. and X. X. Xxxxx. 1981. Comparative effects of sheep and cattle grazing on the Xxxxx Creek drainage. Transactions of the Bonneville Chapter American Fisheries Society. 1981:48-62. Xxxxx, X.X. 1985. Predation and species replacement in American Southwestern fishes: a case study. Southwestern Naturalist. 30:173-187. Xxxxxx, X. X. and X. X. Xxxxxx. 1985. Two New Intergeneric Cyprinid Hybrids from the Bonneville Basin, Utah. Copeia, 1985(2):509-515. Xxxxxx, X.X. 1972. Threatened freshwater fishes of the United States. Trans. Amer, Fish. Soc. 101(2):239-252.

Time is Money Join Law Insider Premium to draft better contracts faster.