Care process in the health field: Ontology, hermeneutics and teleology

Search for the full text: Google | DOI

Contatore O.A., de Barros N.F., Malfitano A.P.S. (2017) Care process in the health field: Ontology, hermeneutics and teleology, in Interface: Communication, Health, Education 21, 553-563.

Utility function security in artificially intelligent agents

Search for the full text: Google | DOI

Yampolskiy R.V. (2014) Utility function security in artificially intelligent agents, in Journal of Experimental and Theoretical Artificial Intelligence 26, 373-389.

A possibilities of dangerous dynamic phenomena prediction in a rock mass surrounding the excavations

Search for the full text: Google | DOI

Peryshkin A.Y., Cherepov A.A., Eremin M.O., Makarov P.V. (2014) A possibilities of dangerous dynamic phenomena prediction in a rock mass surrounding the excavations, in AIP Conference Proceedings 1623, 87-90.

Optimal dike investments under uncertainty and learning about increasing water levels

Search for the full text: Google | DOI

van der Pol T.D., Weikard H.P., van Ierland E.C. (2014) Optimal dike investments under uncertainty and learning about increasing water levels, in Journal of Flood Risk Management 7, 308-318.

Proportional hazards models of infrastructure system recovery

Search for the full text: Google | DOI

Barker K., Baroud H. (2014) Proportional hazards models of infrastructure system recovery, in Reliability Engineering and System Safety 124, 201-206.

Implementing elements of fear invoking anxiety using a game platform

Search for the full text: Google | DOI

Lawson J., Semwal S.K. (2016) Implementing elements of fear invoking anxiety using a game platform, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9756, 117-124.

Development towards sustainability: How to judge past and proposed policies?

Search for the full text: Google | DOI

Dittmar M. (2014) Development towards sustainability: How to judge past and proposed policies?, in Science of the Total Environment 472, 282-288.

Emergent risks and key vulnerabilities

Search for the full text: Google | DOI

Luber G., Takahashi K., Licker R., Hsiang S., Brklacich M., Oppenheimer M., Birkmann J., Warren R., O’Neill B., Semenov S., Campos M. (2015) Emergent risks and key vulnerabilities, in Climate Change 2014 Impacts, Adaptation and Vulnerability: Part A: Global and Sectoral Aspects [volume not available], 1039-1100.

The natural and built environments of future human settlements

Search for the full text: Google

Bruce Etherington A. (1996) The natural and built environments of future human settlements, in Acta Polytechnica Scandinavica, Civil Engineering and Building Construction Series 105, 13-19.

Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats

Search for the full text: Google | DOI

Lawson S. (2013) Beyond Cyber-Doom: Assessing the Limits of Hypothetical Scenarios in the Framing of Cyber-Threats, in Journal of Information Technology and Politics 10, 86-103.

Previous page Next page

Page number: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76