XXXXXX AND COLLATERAL Sample Clauses

XXXXXX AND COLLATERAL. [note to bidders:
XXXXXX AND COLLATERAL. 5.1.Seller’s Credit and Collateral Requirements Seller shall provide no later than the deadline set forth in subsection (b) below and maintain throughout the Term collateral with Buyer in an amount of __________________dollars ($_________) [insert dollar amount equal to the greater of $40/kW multiplied by the highest Monthly Contracted Quantity over the Delivery Period or ten percent (10%) of the sum of the highest estimated Delivered Capacity Payments over a consecutive three (3) calendar year period during the Delivery Period, with such estimated Delivered Capacity Payments being based on the applicable Monthly Quantity values times the applicable Contract Price] (“Performance Assurance”). Seller shall post the Performance Assurance with Buyer within five (5) Business Days of the Execution Date.
XXXXXX AND COLLATERAL 

Related to XXXXXX AND COLLATERAL

  • Collateral Each of the Banks represents to the Agent and each of the other Banks that it in good faith is not relying upon any "margin stock" (as defined in Regulation U) as collateral in the extension or maintenance of the credit provided for in this Agreement.

  • Xxxxxx and X Xxx, “A unified monotonic approach to generalized linear fractional programming,” Journal of Global Optimization, vol. 26, no. 3, pp. 229–259, 2003. [14] X. X. Xxxx, X. X. Xxxxx, and X. Xxxxx, “Xxxxx: Achieving global optimality for a non-convex wireless power control problem,” IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1553–1563, Mar 2009. [15] X. Xxxxxxxx and X. Xxxxxxx, “Common randomness in information theory and cryptography - part I: Secret sharing,” IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993. [16] I. Safaka, X. X. Xxxxxxxxxx, X. Xxxxxxx, E. Atsan, C. Fragouli, X. Xxxxxxxx, and X. Xxxxxxx, “Exchanging Secrets without Using Cryptography,” arXiv:1105.4991 [cs, math], May 2011, arXiv: 1105.4991. [Online]. Available: xxxx://xxxxx.xxx/abs/1105.4991 [17] I. Safaka, C. Fragouli, X. Xxxxxxxx, and X. Xxxxxxx, “Exchanging pairwise secrets efficiently,” in 2013 Proceedings IEEE INFOCOM, Apr. 2013, pp. 2265–2273.‌ [18] E. Atsan, I. Safaka, X. Xxxxxx, and X. Xxxxxxxx, “Low cost security for sensor networks,” in 2013 International Symposium on Network Coding (NetCod), Jun. 2013, pp. 1–6. [19] X. Xxxxxxxx, X. Xxxxxxx, X. Xxxxxx, X. Xxxxxxxx, X. Xxxxxxxxx, and X. Xxxxxxxxxxx, “Creating Secrets out of Erasures,” in Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, ser. MobiCom ’13. New York, NY, USA: ACM, 2013, pp. 429–440. [Online]. Available: xxxx://xxx.xxx.xxx/10.1145/2500423.2500440 [20] X. X. Xxxx and X. Xxxxxxxxxxxx, Convex Optimization. Cambridge University Press, Mar. 2004. [21] X. X. Xxxxxxxxx, X. Xxxxx, and X. X. Xxxxxxxx, Convex Analysis and Optimization. Athena Scientific, 2003. [22] X. Xxxx, X. X. Xxxxxxxxxxx, X. Xxxxxxxx, and X. X. Xxxxxxx, “Secret communication over broadcast erasure channels with state-feedbac,” IEEE Transactions on Information Theory, vol. 61, pp. 4788–4808, Sep. 2015. [23] X. X. XxxXxxxxxxx, The Theory of Error-Correcting Codes, 2nd ed. Amsterdam; New York; New York: North Holland Publishing Co., 1978. [24] C. Fragouli and X. Xxxxxxxx, Network Coding Fundamentals. Hanover, MA: Now Publishers Inc, Jun. 2007.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!