1
by Hampton, James A.
Published 2017
Format:
Table of Contents: ... -- 2 Cognitively Plausible Theories of Concept Composition -- Abstract -- 1 Background Framework -- 1...
Click to View
2
by Lambers, Leen.
Published 2023
Format:
Table of Contents: ... and Verification -- 4.1 Composition Requirements -- 4.2 OS Requirements -- 4.3 Verifying the Requirements -- 4.4 OS...
Click to View
3
Published 2023
Format:
Table of Contents: ... of the friction drilling proc -- The main groups of factors capable of influencing -- - Chemical composition...
Click to View
4
by Ansal, Atilla.
Published 2015
Format:
Table of Contents: ... Analysis -- 4.6 Conclusions -- References -- Chapter 5: Seismic Code Developments for Steel and Composite...
Click to View
5
by Vincent, Charles.
Published 2016
Format:
Table of Contents: ... of Strategies to Clinical Context -- References -- 7: Safety Strategies in Hospitals -- A Little History...
Click to View
6
by Gerber, Nina.
Published 2023
Format:
Table of Contents: ... Privacy Theories -- 2.1 How (Not) to Define Privacy -- 3 Why Do We Need Privacy? -- References -- From...
Click to View
7
by Lemke, Claudia.
Published 2021
Format:
Table of Contents: ... by the four composite sustainable development measures -- References....
Click to View
8
by Ehrlicher, Werner.
Published 1983
Format:
Table of Contents: ... Properties of Money -- Inflation Requires Money-Supply Targets -- Areas of Convergence of Views....
Click to View
9
by Kim, Kyoung-Yun.
Published 2022
Format:
Table of Contents: ... Program Chairs -- Industrial Program Chairs -- Communication and Media Chairs -- Conference Managers...
Click to View
10
by Anjum, Rani Lill.
Published 2020
Format:
Table of Contents: ... of CauseHealth -- Reference -- Abbreviations -- Contents -- List of Figures -- Contributors to Part II...
Click to View
11
by Li, Hui.
Published 2021
Format:
Table of Contents: ....2.1 Composition of Cyberspace -- 1.2.2 Network Sovereignty in the New Era -- 1.3 Exploration of Network...
Click to View
12
by Avoine, Gildas.
Published 2021
Format:
Table of Contents: ... and Scenarios -- 5.1.3 Goals of Protocol Execution -- 5.2 Threats and Security Requirements -- 5.2.1 Assets -- 5...
Click to View