Journal of Computer Security, ‎0926-227X

Journal

Recently viewed

Researchers

  1. Zhiyong Xie

Activities

  1. Digital Teaching and Learning
  2. Rethinking Fragmentation within the Biodiversity Regime: Compliance in a post-2020 Biodiversity Framework
  3. Social perceptiveness: Its role for performance in selection procedures and for the prediction of job performance
  4. Founding Workshop of the ERC Project Principles Of Disruption - ERC 2013
  5. Sustainable Consumption - Mapping the terrain
  6. Wavelets in Technical Applications II
  7. What makes sense and what can be sensed: reconsidering the question of organization
  8. Präsidium (Organisation)
  9. Structure as Infrastructure: Interrelation of Fiber and Construction
  10. Appropriating Digital Transformation: Transformative Ideas about Technology
  11. Sino-German Summer School on Design and data analysis of biodiversity-ecosystem functioning experiments 2011
  12. Towards decent platform work
  13. Legitimizing Digital Transformation within an Incumbent: How Unaccepted Leaders Can Initiate Strategic Changes
  14. Exploring the potential role of priority effects for ecological restoration
  15. How stakeholder characteristics influence the perception and evaluation of CSR communication: a mixed-method approach to communication reception
  16. Comfort and Intervention Behavior of Drivers in Highly Automated Vehicles with Headway Control
  17. Validity of a mathematics test for the selection of university applicants for teacher training
  18. The Public is Fine With Us: Idealized Value Mergers in Top Management
  19. Panel Cointegration Testing with Time Trend and Analysis of Money Demand in OECD Countries
  20. Center for Voting and Parties
  21. Traces of varying task formulations within the texts of students
  22. Inter- and Transdisciplinary Learning
  23. Reden über Generationen

Publications

  1. Support vector machines with example dependent costs
  2. What Makes for a Good Theory? How to Evaluate a Theory Using the Strength Model of Self-Control as an Example
  3. Validation of Inspection Frameworks and Methods
  4. A Trajectory Generation Algorithm for Optimal Consumption in Electromagnetic Actuators
  5. Emotional text design in multimedia learning
  6. (How) Can didactic research find its way into the classroom? Results from a questionnaire survey on the lesson preparation and continuing professional development of German teachers
  7. Orchestrating distributed data governance in open social innovation
  8. Combining sense of place theory with the ecosystem services concept: empirical insights and reflections from a participatory mapping study
  9. Interplays between relational and instrumental values
  10. A matrix of evaluation and comparsion of Case-Based Reasoning (CBR) software tools to facilitate understanding and appreciation
  11. The Pervasive Power of PowerPoint
  12. Participation in multi-level policy implementation: exploring the influence of governance culture
  13. Knowledge Graph Question Answering Datasets and Their Generalizability
  14. Internet: Impact and Potential for Learning and Instruction
  15. The Open Anchoring Quest Dataset: Anchored Estimates from 96 Studies on Anchoring Effects
  16. The use of a monolithic column to improve the simultaneous determination of caffeine, paracetamol, pseudoephedrine, aspirin, dextromethorphan, chlorpheniramine in pharmaceutical formulations by HPLC-A comparison with a conventional reversed-phase silica-based column
  17. Errors in Working with Office Computers
  18. Toward a lifespan metric of reading fluency
  19. John Howard Yoder
  20. The dynamics of prior entry in serial visual processing
  21. Steering of land use in the context of sustainable development
  22. New descriptions and typifications of syntaxa within the project 'Plant communities of Mecklenburg-Vorpommern and their vulnerability' - Part II