Computational Access Sample Clauses

Computational Access. Authorized Users may use the Licensed Materials to perform and engage in text and/or data mining activities for academic research, scholarship, and other educational purposes and may utilize and share the results of text and/or data mining (“TDM output”) with research collaborators, and in their scholarly work and make the results available for use by others, so long as the purpose is not to create a product for use by third parties that would substitute for the Licensed Materials. Authorized users may include TDM Output as part of original works of scholarship, e.g. articles that describe, analyze, and interpret research, presentations at academic conferences, and inclusion in an academic thesis. ACM will cooperate with Institutions and Authorized Users as reasonably necessary in making the Licensed Materials available in a manner and form most useful to the Authorized Users for computational access. ACM shall provide this access without any additional fees. Institutions and Authorized Users shall be able to conduct TDM by An API provided by vendor or a mutually agreed third-party provider. In all cases where Licensed Materials offers both HTML/XML and PDF versions of the Licensed Materials, both versions shall be accessible for TDM. The Licensed Materials provided for TDM shall be provided in such a manner as to be useful to Authorized Users. For example, there will be no rate or volume limits placed on TDM by ACM unless there has been evidence of disruption of ACM’s normal services, and any such limits shall be communicated to Institutions in advance of taking effect. Uses of TDM Output: It is mutually understood that Licensed Materials and “TDM Output” (the result of any Text and Data Mining activity or operation, capable of fixation, reproduction and/or communication in any form) provided or generated under this Agreement may be retained by Authorized Users throughout the full lifecycle of the TDM project, including for publication, and as necessary for replication and validation of research results.
AutoNDA by SimpleDocs
Computational Access. Authorized Users may use the Licensed Materials to perform and engage in text and/or data mining activities for academic research, scholarship, and other educational purposes and may utilize and share the results of text and/or data mining (“TDM output”) with research collaborators, and in their scholarly work and make the results available for use by others, so long as the purpose is not to create a product for use by third parties that would substitute for the Licensed Materials. Authorized users may include TDM Output as part of original works of scholarship, e.g. articles that describe, analyze, and interpret research, presentations at academic conferences, and inclusion in an academic thesis. ACM will cooperate with National Library of Sweden, Licensees and Authorized Users as reasonably necessary in making the Licensed Materials available in a manner and form most useful to the Authorized Users for computational access. ACM shall provide this access without any additional fees. The National Library of Sweden, Licensees and Authorized Users shall be able to conduct TDM by An API provided by Vendor or a mutually agreed third-party provider. In all cases where Licensed Materials offers both HTML/XML and PDF versions of the Licensed Materials, both versions shall be accessible for TDM. The Licensed Materials provided for TDM shall be provided in such a manner as to be useful to Authorized Users. For example, there will be no rate or volume limits placed on TDM by ACM unless there has been evidence of disruption of ACM’s normal services, and any such limits shall be communicated to the National Library of Sweden in advance of taking effect. Uses of TDM Output: It is mutually understood that Licensed Materials and “TDM Output” (the result of any Text and Data Mining activity or operation, capable of fixation, reproduction and/or communication in any form) provided or generated under this Agreement may be retained by Authorized Users throughout the full lifecycle of the TDM project, including for publication, and as necessary for replication and validation of research results.
Computational Access. Authorized Users may use the Licensed Materials to perform and engage in text and/or data mining activities for academic research, scholarship, and other educational purposes and may utilize and share the results of text and/or data mining (“TDM output”) with research collaborators, and in their scholarly work and make the results available for use by others, so long as the purpose is not to create a product for use by third parties that would substitute for the Licensed Materials. Authorized users may include TDM Output as part of original works of scholarship, e.g. articles that describe, analyze, and interpret research, presentations at academic conferences, and inclusion in an academic thesis.

Related to Computational Access

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except: a. for adaptive learning or customized student learning purposes; b. to market an educational application or product to a parent or legal guardian of a student if Contractor did not use Data, shared by or collected per this Contract, to market the educational application or product; c. to use a recommendation engine to recommend to a student i. content that relates to learning or employment, within the third-party contractor's internal application, if the recommendation is not motivated by payment or other consideration from another party; or

  • Meteorological Data Reporting Requirement (Applicable to wind generation facilities only)

  • Data Universal Number System (DUNS) number Requirement Grantee will provide their valid DUNS number contemporaneous with execution of this Agreement.

  • Additional Access Rights For the avoidance of doubt any grant of Access Rights not covered by the Grant Agreement or this Consortium Agreement shall be at the absolute discretion of the owning Party and subject to such terms and conditions as may be agreed between the owning and receiving Parties.

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference.

  • Child Abuse Reporting Requirement Grantee will: a. comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse. b. develop, implement and enforce a written policy that includes at a minimum the System Agency’s Child Abuse Screening, Documenting, and Reporting Policy for Grantees/Providers and train all staff on reporting requirements. c. use the System Agency Child Abuse Reporting Form located at xxxxx://xxx.xxxx.xxxxx.xx.xx/Contact Us/report abuse.asp as required by the System Agency. d. retain reporting documentation on site and make it available for inspection by the System Agency.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • Number Resources, Rate Center Areas and Routing Points 8.1 Nothing in this Agreement shall be construed to limit or otherwise adversely affect in any manner either Party’s right to employ or to request and be assigned any Central Office Codes (“NXX”) pursuant to the Central Office Code Assignment Guidelines and any relevant FCC or Commission orders, as may be amended from time to time, or to establish, by Tariff or otherwise, Rate Center Areas and Routing Points corresponding to such NXX codes. 8.2 It shall be the responsibility of each Party to program and update its own switches and network systems pursuant to information provided in the LERG in order to recognize and route traffic to the other Party’s assigned NXX codes. Except as expressly set forth in this Agreement, neither Party shall impose any fees or charges whatsoever on the other Party for such activities. 8.3 Unless otherwise required by Commission order, the Rate Center Areas will be the same for each Party. During the term of this Agreement, Onvoy shall adopt the Rate Center Area and Rate Center Points that the Commission has approved for Frontier within the LATA and Tandem serving area. Onvoy shall assign whole NPA-NXX codes to each Rate Center Area unless otherwise ordered by the FCC, the Commission or another governmental entity of appropriate jurisdiction, or the LEC industry adopts alternative methods of utilizing NXXs. 8.4 Onvoy will also designate a Routing Point for each assigned NXX code. Onvoy shall designate one location for each Rate Center Area in which the Onvoy has established NXX code(s) as the Routing Point for the NPA-NXXs associated with that Rate Center Area, and such Routing Point shall be within the same LATA as the Rate Center Area but not necessarily within the Rate Center Area itself. Unless specified otherwise, calls to subsequent NXXs of Onvoy will be routed in the same manner as calls to Xxxxx’s initial NXXs. 8.5 Notwithstanding anything to the contrary contained herein, nothing in this Agreement is intended, and nothing in this Agreement shall be construed, to in any way constrain Onvoy’s choices regarding the size of the local calling area(s) that Onvoy may establish for its Customers, which local calling areas may be larger than, smaller than, or identical to Frontier’s local calling areas.

  • Emergency Operator Access Registry Operator shall provide bulk access to the zone files for the TLD to the Emergency Operators designated by ICANN on a continuous basis in the manner ICANN may reasonably specify from time to time.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!