Certification

View this topic in
Certification refers to the confirmation of certain characteristics of an object, person, or organization. (Wikipedia.org)






Conferences related to Certification

Back to Top

OCEANS 2016

The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2015 - MTS/IEEE Washington

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2009

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2007

  • OCEANS 2006

  • OCEANS 2005


2015 IEEE Symposium on Product Compliance Engineering (ISPCE)

Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2014 IEEE Symposium on Product Compliance Engineering (ISPCE)

    Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2013 IEEE Symposium on Product Compliance Engineering (ISPCE)

    Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2012 IEEE Symposium on Product Compliance Engineering (ISPCE)

    Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2011 IEEE Symposium on Product Compliance Engineering (ISPCE)

    The symposium is a forum for exchanging ideas through the presentation of formal and informal papers, tutorials and practical experience will colleagues working in the Product Safety Engineering field. The focus is on product safety testing, EMC and RF related effects on functional safety of equipment and processes, components, certification, standards development activities, research and environmental aspects of product design. Networking with colleagues and vendors is a highlight of this event.

  • 2009 IEEE Symposium on Product Compliance Engineering (PSES)

    The symposium is a forum for exchanging ideas through the presentation of formal and informal papers, tutorials and practical experience will colleagues working in the Product Safety Engineering field. The focus is on product safety testing, EMC and RF related effects on functional safety of equipment and processes, components, certification, standards development activities, research and environmental aspects of product design. Networking with colleagues and vendors is a highlight of this event.

  • 2008 IEEE Symposium on Product Compliance Engineering (PSES)

    The symposium is a forum for exchanging ideas, practical experiences, work experiences and business cards. The targeted audiences include but not limited to people involved with compliance engineering.

  • 2007 IEEE Symposium on Product Compliance Engineering (PSES)

    The scope of the conference is to involve multiple engineering disciplines as it relates to the study, research and application of Safety practices and awareness throughout everyone's daily lives.


2014 Sixth Annual IEEE Green Technologies Conference (GreenTech)

The IEEE Green Technologies Conference, set for April 3-4, 2014, will provide a forum for engineers, technicians, and practitioners to consider all aspects of Green Technologies and their application. The conference organizing committee is requesting technical papers, workshops, panels, and tutorial submissions for this opportunity to share ideas, plans, and significant results. Contributed papers are welcome in the following and related topics: • Alternative energy sources for home, business, community • Energy and resource usage, conservation, and efficiency • Alternative energy choices and effects in product development • Green requirements, specifications, and emerging standards • Environmental, economic, and political impacts of “Going Green” • Indoor and outdoor environmental use, impacts, and quality

  • 2013 IEEE Green Technologies Conference

    The 2013 Greentech Conference provides a forum to consider all aspects of Green Technologies: Power Distribution, Energy Efficiency, Green Technologies, Smart Grid, Policy Impact

  • 2012 IEEE Green Technologies Conference

    The annual IEEE Green Technologies Conference provides a continuing forum for engineers, technologists, and enthusiasts alike to consider all aspects of green alternative solutions; from energy generation and distribution solutions including solar, nuclear, bio, battery, and wind to green architectural solutions for the home and business.

  • 2011 IEEE Green Technologies Conference

    The annual IEEE Green Technologies Conference provides a continuing forum for engineers, technologists, and enthusiasts alike to consider all aspects of green alternative solutions; from energy generation and distribution solutions including solar, nuclear, bio, battery, and wind to green architectural solutions for the home and business.

  • 2010 IEEE Green Technologies Conference

    Provides a forum engineers, technicians and practitioners to consider all aspects of Green technologies and their applications: alternative energy, energy usage & conservation, requirements & standards, ecological, econmical, and poolitical impacts and effects.


2013 IEEE Electric Ship Technologies Symposium (ESTS)

Progress and future of electric ship technologies. Areas include research, design and future advanced in electric ship technologies, integrated electric power systems, open architecture, systems, component specifications, electric propulsion, dynamic loads, electric power conversion, storage, distribution systems, AC, medium voltage dc, high frequency ac, reconfiguration, testing, standards, etc.

  • 2011 IEEE Electric Ship Technologies Symposium (ESTS)

    Progress and future of electric ship technologies. Areas include research, design and future advanced in electric ship technologies, integrated electric power systems, open architecture, systems, component specifications, electric propulsion, dynamic loads, electric power conversion, storage, distribution systems, AC, medium voltage dc, high frequency ac, reconfiguration, testing, standards, etc.

  • 2009 IEEE Electric Ship Technologies Symposium (ESTS 2009)

    Studies, reseach, design and future advances in Electric Ship technologies, e.g., integrated electric power systems, open architectures Systems and components specifications, electrical propulsion, electrical power conversion, distribution, storage, tests, evaluation, certification, standards, etc.


2012 16th IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

ISPLC 2012 will bring together academia and industry professionals as well as students and researchers to present and discuss ongoing work on existing and future power line communication (PLC) systems, PLC applications, PLC standardization activities. The contributions presented at ISPLC will span all aspects of communications over power lines, including access, home networking, in-vehicle applications, utility applications, smart grids, and more.

  • 2011 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

    ISPLC 2011 will bring together academia and industry professionals as well as students and researchers to present and discuss ongoing work on existing and future power line communication (PLC) systems, PLC applications, PLC standardization activities. The contributions presented at ISPLC will span all aspects of communications over power lines, including access, home networking, in-vehicle applications, utility applications, smart grids, and more.

  • 2010 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

    The ISPLC conference was started in 1997 by communications researchers in Europe and Asia as a forum for the discussion of the issues associated with the use of electrical power distribution wires as a viable communication channel.

  • 2009 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

    Technology of Powerline Communications and its applications


More Conferences

Periodicals related to Certification

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...




Xplore Articles related to Certification

Back to Top

Demo abstract: Closed-loop testing for implantable cardiac pacemakers

Zhihao Jiang; Miroslav Pajic; Rahul Mangharam Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2011

The increasing complexity of software in implantable medical devices such as cardiac pacemakers and defibrillators accounts for over 40% of device recalls. Testing remains the principal means of verification in the medical device certification regime. Traditional software test generation techniques, where the tests are generated independently of the operational environment, are not effective as the device must be tested within ...


Experience in Training Software Quality Engineers to Achieve a Professional Certification

Marcelo Jenkins 20th Conference on Software Engineering Education & Training (CSEET'07), 2007

Very little has been published on the subject of software quality certification training programs. This paper describes a case study on training software professionals to become certified software quality engineers (CSQE). We describe the design of the training course and practice exams, how we conducted the coaching of the students, and summarize the results obtained and the lessons learned during ...


Quantifying the reliability of software: statistical testing based on a usage model

C. Trammell Proceedings of Software Engineering Standards Symposium, 1995

When a population is too large for study, as is the case for all possible uses of a software system, a statistically correct sample must be drawn as a basis for inferences about the population. In statistical testing of software based on a Markov chain usage model, the rich body of analytical results available for Markov chains provides numerous insights ...


Total quality management in a joint-venture company: a case study

E. Trybus; G. Trybus Management of Engineering and Technology, 1999. Technology and Innovation Management. PICMET '99. Portland International Conference on, 1999

Summary form only given. Researchers have claimed that partnerships such as joint ventures and licensing often lead to the transfer of valuable technological knowledge to partners, which can be detrimental to an innovating firm. In many situations, however, more benefits than losses come from the technology transfer. A case study presented in this paper illustrates benefits of both technology and ...


It ain't broke, so don't fix it [software engineering]

T. DeMarco IEEE Software, 1999

The author considers how setting up a formal licensing mechanism for software engineers (even one limited to those involved in the most safety-critical applications) would be a blunder, doomed to undo its own best intentions. It would be, at best, a dangerous mischief and, at worst, lead us into a positive ethical quagmire


More Xplore Articles

Educational Resources on Certification

Back to Top

eLearning

Demo abstract: Closed-loop testing for implantable cardiac pacemakers

Zhihao Jiang; Miroslav Pajic; Rahul Mangharam Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2011

The increasing complexity of software in implantable medical devices such as cardiac pacemakers and defibrillators accounts for over 40% of device recalls. Testing remains the principal means of verification in the medical device certification regime. Traditional software test generation techniques, where the tests are generated independently of the operational environment, are not effective as the device must be tested within ...


Experience in Training Software Quality Engineers to Achieve a Professional Certification

Marcelo Jenkins 20th Conference on Software Engineering Education & Training (CSEET'07), 2007

Very little has been published on the subject of software quality certification training programs. This paper describes a case study on training software professionals to become certified software quality engineers (CSQE). We describe the design of the training course and practice exams, how we conducted the coaching of the students, and summarize the results obtained and the lessons learned during ...


Quantifying the reliability of software: statistical testing based on a usage model

C. Trammell Proceedings of Software Engineering Standards Symposium, 1995

When a population is too large for study, as is the case for all possible uses of a software system, a statistically correct sample must be drawn as a basis for inferences about the population. In statistical testing of software based on a Markov chain usage model, the rich body of analytical results available for Markov chains provides numerous insights ...


Total quality management in a joint-venture company: a case study

E. Trybus; G. Trybus Management of Engineering and Technology, 1999. Technology and Innovation Management. PICMET '99. Portland International Conference on, 1999

Summary form only given. Researchers have claimed that partnerships such as joint ventures and licensing often lead to the transfer of valuable technological knowledge to partners, which can be detrimental to an innovating firm. In many situations, however, more benefits than losses come from the technology transfer. A case study presented in this paper illustrates benefits of both technology and ...


It ain't broke, so don't fix it [software engineering]

T. DeMarco IEEE Software, 1999

The author considers how setting up a formal licensing mechanism for software engineers (even one limited to those involved in the most safety-critical applications) would be a blunder, doomed to undo its own best intentions. It would be, at best, a dangerous mischief and, at worst, lead us into a positive ethical quagmire


More eLearning Resources

IEEE-USA E-Books

  • An Overview of Reliability and Resiliency in Today's Mission Critical Environment

    This chapter contains sections titled: Introduction Risk Assessment Capital Costs Versus Operation Costs Critical Environment Workflow and Change Management Testing and Commissioning Documentation and the Human Factor Education and Training Operation and Maintenance Employee Certification Standards and Benchmarking Conclusion Risk Analysis and Improvement

  • SECURING MANAGEMENT AND MANAGING SECURITY

    This chapter provides an overview of modern network and infrastructure management as a context to the management of deployed security mechanisms. It discusses the need for management to stay involved in security management activities. This is followed by a discussion of operational security, necessary mechanisms, including forensics, third-party access reviews, and certification. The chapter then examines security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. It also considers the need for compliance relative to security policies that must be adhered to by operations and management personnel. An operational security compliance program exists to ensure that all those business requirements, policy statements, and specific security dictates are being complied with. The chapter concludes with consideration of activities related to security when developing or purchasing functions, subsystems, or complete solutions.

  • Consumable Supplies and Packaging Materials

    This chapter contains sections titled: Introduction Cleanroom and ESD Gloves Functional vs. Nonfunctional Testing Glove Use Strategies Initial Qualification vs. the Need for Ongoing Lot Certification Glove Washing ESD Performance of Gloves Glove Laundering Wipers and Swabs Reusable and Disposable Packaging Materials Facial Coverings References and Notes

  • Overview of Mobile WiMAX Air Interface in Release 1.0

    This chapter contains sections titled: Introduction Overview of Mobile WiMAX PHY Layer (Release 1.0) Overview of Mobile WiMAX MAC Layer (Release 1.0) WiMAX Forum System and Certification Profiles in Release 1.0 Summary

  • OPERATIONAL MANAGEMENT OF SECURITY

    In this final chapter, we provide an overview of modern network and infrastructure management as a context for the management of deployed security mechanisms. In this review we discuss the need for management mechanisms specific to the management of security at all layers within the Telecommunications Management Network (TMN). We then progress to a discussion of operational security, necessary mechanisms, including forensics, third- party access reviews, and certification. We conclude our treatment of security management with consideration of how to withdraw equipment from service without exposing information to unauthorized access. The third aspect of security management considered is that of compliance. Compliance links back to security policies and requirements that must be adhered to by operations and management personnel.

  • The Humanitarian Free and Open-Source Software Project: Engaging Students in Service-Learning through Building Software

    This chapter contains sections titled: Introduction Goals and Objectives Concepts, Methodologies, and Outcomes HFOSS in Practice Results and Outcomes HFOSS Summer Institutes, Certification, Workshops, and Symposia Future Challenges: Growth of HFOSS Chapters, Curriculum, and Sustainability Conclusions

  • Future Enhancements to the TMN Security

    This chapter contains sections titled: Secure Interworking Public Key Infrastructure Internal Certification of External Entities External Certification Authorities Security Alarm Management Security Audit Trail Management X Interface Security F Interface Security Update of Related Standards

  • SUBSAFE: An Example of a Successful Safety Program

    This chapter contains sections titled: History, SUBSAFE Goals and Requirements, SUBSAFE Risk Management Fundamentals, Separation of Powers, Certification, Audit Procedures and Approach, Problem Reporting and Critiques, Challenges, Continual Training and Education, Execution and Compliance over the Life of a Submarine, Lessons to Be Learned from SUBSAFE

  • WiMAX Air Interface Enhancements in Release 1.5

    This chapter contains sections titled: Introduction Support for Frequency Division Duplexing (FDD HFDD) Optional MIMO Enhancements MAC Enhancements System Profile and Certification Profiles in Release 1.5 Summary

  • Applications

    The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.



Standards related to Certification

Back to Top

No standards are currently tagged "Certification"


Jobs related to Certification

Back to Top