Certification

View this topic in
Certification refers to the confirmation of certain characteristics of an object, person, or organization. (Wikipedia.org)






Conferences related to Certification

Back to Top

OCEANS 2016

The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2015 - MTS/IEEE Washington

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2009

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2007

  • OCEANS 2006

  • OCEANS 2005


2015 IEEE Symposium on Product Compliance Engineering (ISPCE)

Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2014 IEEE Symposium on Product Compliance Engineering (ISPCE)

    Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2013 IEEE Symposium on Product Compliance Engineering (ISPCE)

    Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2012 IEEE Symposium on Product Compliance Engineering (ISPCE)

    Focusing on product safety and regulatory compliance in the Consumer, IT, Medical Devices and Industrial Sectors in global markets.

  • 2011 IEEE Symposium on Product Compliance Engineering (ISPCE)

    The symposium is a forum for exchanging ideas through the presentation of formal and informal papers, tutorials and practical experience will colleagues working in the Product Safety Engineering field. The focus is on product safety testing, EMC and RF related effects on functional safety of equipment and processes, components, certification, standards development activities, research and environmental aspects of product design. Networking with colleagues and vendors is a highlight of this event.

  • 2009 IEEE Symposium on Product Compliance Engineering (PSES)

    The symposium is a forum for exchanging ideas through the presentation of formal and informal papers, tutorials and practical experience will colleagues working in the Product Safety Engineering field. The focus is on product safety testing, EMC and RF related effects on functional safety of equipment and processes, components, certification, standards development activities, research and environmental aspects of product design. Networking with colleagues and vendors is a highlight of this event.

  • 2008 IEEE Symposium on Product Compliance Engineering (PSES)

    The symposium is a forum for exchanging ideas, practical experiences, work experiences and business cards. The targeted audiences include but not limited to people involved with compliance engineering.

  • 2007 IEEE Symposium on Product Compliance Engineering (PSES)

    The scope of the conference is to involve multiple engineering disciplines as it relates to the study, research and application of Safety practices and awareness throughout everyone's daily lives.


2014 Sixth Annual IEEE Green Technologies Conference (GreenTech)

The IEEE Green Technologies Conference, set for April 3-4, 2014, will provide a forum for engineers, technicians, and practitioners to consider all aspects of Green Technologies and their application. The conference organizing committee is requesting technical papers, workshops, panels, and tutorial submissions for this opportunity to share ideas, plans, and significant results. Contributed papers are welcome in the following and related topics: • Alternative energy sources for home, business, community • Energy and resource usage, conservation, and efficiency • Alternative energy choices and effects in product development • Green requirements, specifications, and emerging standards • Environmental, economic, and political impacts of “Going Green” • Indoor and outdoor environmental use, impacts, and quality

  • 2013 IEEE Green Technologies Conference

    The 2013 Greentech Conference provides a forum to consider all aspects of Green Technologies: Power Distribution, Energy Efficiency, Green Technologies, Smart Grid, Policy Impact

  • 2012 IEEE Green Technologies Conference

    The annual IEEE Green Technologies Conference provides a continuing forum for engineers, technologists, and enthusiasts alike to consider all aspects of green alternative solutions; from energy generation and distribution solutions including solar, nuclear, bio, battery, and wind to green architectural solutions for the home and business.

  • 2011 IEEE Green Technologies Conference

    The annual IEEE Green Technologies Conference provides a continuing forum for engineers, technologists, and enthusiasts alike to consider all aspects of green alternative solutions; from energy generation and distribution solutions including solar, nuclear, bio, battery, and wind to green architectural solutions for the home and business.

  • 2010 IEEE Green Technologies Conference

    Provides a forum engineers, technicians and practitioners to consider all aspects of Green technologies and their applications: alternative energy, energy usage & conservation, requirements & standards, ecological, econmical, and poolitical impacts and effects.


2013 IEEE Electric Ship Technologies Symposium (ESTS)

Progress and future of electric ship technologies. Areas include research, design and future advanced in electric ship technologies, integrated electric power systems, open architecture, systems, component specifications, electric propulsion, dynamic loads, electric power conversion, storage, distribution systems, AC, medium voltage dc, high frequency ac, reconfiguration, testing, standards, etc.

  • 2011 IEEE Electric Ship Technologies Symposium (ESTS)

    Progress and future of electric ship technologies. Areas include research, design and future advanced in electric ship technologies, integrated electric power systems, open architecture, systems, component specifications, electric propulsion, dynamic loads, electric power conversion, storage, distribution systems, AC, medium voltage dc, high frequency ac, reconfiguration, testing, standards, etc.

  • 2009 IEEE Electric Ship Technologies Symposium (ESTS 2009)

    Studies, reseach, design and future advances in Electric Ship technologies, e.g., integrated electric power systems, open architectures Systems and components specifications, electrical propulsion, electrical power conversion, distribution, storage, tests, evaluation, certification, standards, etc.


2012 16th IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

ISPLC 2012 will bring together academia and industry professionals as well as students and researchers to present and discuss ongoing work on existing and future power line communication (PLC) systems, PLC applications, PLC standardization activities. The contributions presented at ISPLC will span all aspects of communications over power lines, including access, home networking, in-vehicle applications, utility applications, smart grids, and more.

  • 2011 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

    ISPLC 2011 will bring together academia and industry professionals as well as students and researchers to present and discuss ongoing work on existing and future power line communication (PLC) systems, PLC applications, PLC standardization activities. The contributions presented at ISPLC will span all aspects of communications over power lines, including access, home networking, in-vehicle applications, utility applications, smart grids, and more.

  • 2010 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

    The ISPLC conference was started in 1997 by communications researchers in Europe and Asia as a forum for the discussion of the issues associated with the use of electrical power distribution wires as a viable communication channel.

  • 2009 IEEE International Symposium on Power Line Communications and Its Applications (ISPLC)

    Technology of Powerline Communications and its applications


More Conferences

Periodicals related to Certification

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...




Xplore Articles related to Certification

Back to Top

A Protocol for Secure Content Distribution in Pure P2P Networks

E. Palomar; J. M. Estevez-Tapiador; J. C. Hernandez-Castro; A. Ribagorda 17th International Workshop on Database and Expert Systems Applications (DEXA'06), 2006

A significant challenge for peer-to-peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently and unpredictably join and leave the system. In such networks, it is necessary that some security mechanisms will be applied with the aim of avoiding attacks based on non-authorized content modifications. In this paper, we propose ...


Certification educational and workplaces in educational establishments of Tomsk region

A. N. Derenok; N. A. Chulkov; A. A. Sechin Science and Technology, 2004. KORUS 2004. Proceedings. The 8th Russian-Korean International Symposium on, 2004

The questions of realization of certification of workplaces in educational establishments of city of Tomsk are considered. The work carried out in Tomsk Polytechnic University as agreed of different techniques of realization of certification of workplaces is shown, with the purpose of reception of the discount from payments in fund of social insurance.


The “Authorized Economic Operator” certification and firm performance

Mohamed Sahbi Miled; Claude Fiore Advanced Logistics and Transport (ICALT), 2014 International Conference on, 2014

The complexity of the international supply chain, diversity and increasing number of stakeholders requires a wider range of resources, knowledge, experience, skills and technology that private company can't alone possess. Moreover, after the increase of various threats and risks to international supply chains especially after the nine eleven, firms became more responsible and accountable to their respective government for providing ...


Schedulability Analysis of Mixed-Criticality Systems on Multiprocessors

Risat Mahmud Pathan 2012 24th Euromicro Conference on Real-Time Systems, 2012

The advent of multicore processors has attracted many safety-critical systems, e.g., automotive and avionics, to consider integrating multiple functionalities on a single, powerful computing platform. Such integration leads to host functionalities with different criticality levels on the same platform. The design of such ``mixed-criticality'' systems is often subject to certification from one or more certification authorities. Coming up with an ...


Planning models for software reliability and cost

M. E. Helander; Ming Zhao; N. Ohlsson IEEE Transactions on Software Engineering, 1998

This paper presents modeling frameworks for distributing development effort among software components to facilitate cost-effective progress toward a system reliability goal. Emphasis on components means that the frameworks can be used, for example, in cleanroom processes and to set certification criteria. The approach, based on reliability allocation, uses the operational profile to quantify the usage environment and a utilization matrix ...


More Xplore Articles

Educational Resources on Certification

Back to Top

eLearning

A Protocol for Secure Content Distribution in Pure P2P Networks

E. Palomar; J. M. Estevez-Tapiador; J. C. Hernandez-Castro; A. Ribagorda 17th International Workshop on Database and Expert Systems Applications (DEXA'06), 2006

A significant challenge for peer-to-peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently and unpredictably join and leave the system. In such networks, it is necessary that some security mechanisms will be applied with the aim of avoiding attacks based on non-authorized content modifications. In this paper, we propose ...


Certification educational and workplaces in educational establishments of Tomsk region

A. N. Derenok; N. A. Chulkov; A. A. Sechin Science and Technology, 2004. KORUS 2004. Proceedings. The 8th Russian-Korean International Symposium on, 2004

The questions of realization of certification of workplaces in educational establishments of city of Tomsk are considered. The work carried out in Tomsk Polytechnic University as agreed of different techniques of realization of certification of workplaces is shown, with the purpose of reception of the discount from payments in fund of social insurance.


The “Authorized Economic Operator” certification and firm performance

Mohamed Sahbi Miled; Claude Fiore Advanced Logistics and Transport (ICALT), 2014 International Conference on, 2014

The complexity of the international supply chain, diversity and increasing number of stakeholders requires a wider range of resources, knowledge, experience, skills and technology that private company can't alone possess. Moreover, after the increase of various threats and risks to international supply chains especially after the nine eleven, firms became more responsible and accountable to their respective government for providing ...


Schedulability Analysis of Mixed-Criticality Systems on Multiprocessors

Risat Mahmud Pathan 2012 24th Euromicro Conference on Real-Time Systems, 2012

The advent of multicore processors has attracted many safety-critical systems, e.g., automotive and avionics, to consider integrating multiple functionalities on a single, powerful computing platform. Such integration leads to host functionalities with different criticality levels on the same platform. The design of such ``mixed-criticality'' systems is often subject to certification from one or more certification authorities. Coming up with an ...


Planning models for software reliability and cost

M. E. Helander; Ming Zhao; N. Ohlsson IEEE Transactions on Software Engineering, 1998

This paper presents modeling frameworks for distributing development effort among software components to facilitate cost-effective progress toward a system reliability goal. Emphasis on components means that the frameworks can be used, for example, in cleanroom processes and to set certification criteria. The approach, based on reliability allocation, uses the operational profile to quantify the usage environment and a utilization matrix ...


More eLearning Resources

IEEE-USA E-Books

  • Index

    The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.

  • Instrumentation

    This chapter introduces the most commonly used instrumentation available for performing measurements. Time-domain analysis is helpful during debugging and troubleshooting and for investigating effects of signal integrity. Frequency- domain analysis is used to measure RF energy, be it for certification testing or troubleshooting. In this chapter, we examine only major features regarding the most common devices used. Photographs provided are a representative sample of products available and do not imply endorsement of any particular vendor or product.

  • Editor's Biography

    The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.

  • Standards and Best Practices in Digital and Multimedia Forensics

    One of the main goals of digital forensics is to produce digital evidence admissible to the court, which requires that the digital forensic process or techniques used are not flawed in such a way that the evidence or intelligence generated can be questioned. This chapter provides a comprehensive review of important international, regional and national standards relevant to digital forensics and electronic evidence in general, as well as many best practice guides produced by different bodies. Two standards made by ASTM International are reviewed. Policies for handling customer complaints, document control and disclosure of information are also mentioned. Training, education and certification of digital forensics examiners and any personnel working on cases involving digital and multimedia evidence are important for digital and multimedia forensics because of the need to ensure legal admissibility of evidence. Best practice guides on accreditation of digital forensics laboratories are also discussed.

  • SUBSAFE: An Example of a Successful Safety Program

    This chapter contains sections titled: History, SUBSAFE Goals and Requirements, SUBSAFE Risk Management Fundamentals, Separation of Powers, Certification, Audit Procedures and Approach, Problem Reporting and Critiques, Challenges, Continual Training and Education, Execution and Compliance over the Life of a Submarine, Lessons to Be Learned from SUBSAFE

  • Authentication

    The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.

  • Probes, Antennas, and Support Equipment

    The purpose of this chapter is to highlight various tools used to measure RF currents or electromagnetic fields. It is important to recognize that each type of transmission is different depending on the application or functional use. Formal certification testing requires many of the probes and antennas described in this chapter; however, for purposes of troubleshooting, one may need to use multiple sensors to provide an indication of where RF currents are created and how they are propagated.

  • Overview of Mobile WiMAX Air Interface in Release 1.0

    This chapter contains sections titled: Introduction Overview of Mobile WiMAX PHY Layer (Release 1.0) Overview of Mobile WiMAX MAC Layer (Release 1.0) WiMAX Forum System and Certification Profiles in Release 1.0 Summary

  • Certified, Accredited, Licensed, Approved

    This chapter contains sections titled: The Rush to Certify, The Party, Trust, Risk, Science, Standards, and Certification, Accreditation, The Tripartite Standards Regime and Its Problems, The Violence of Audits, The Limits to the Tripartite Standards Regime, Conclusion: Governing the Market Society

  • WiMAX Air Interface Enhancements in Release 1.5

    This chapter contains sections titled: Introduction Support for Frequency Division Duplexing (FDD HFDD) Optional MIMO Enhancements MAC Enhancements System Profile and Certification Profiles in Release 1.5 Summary



Standards related to Certification

Back to Top

No standards are currently tagged "Certification"


Jobs related to Certification

Back to Top