History and crisis in Ernesto De Martino's thought

Search for the full text: Google

Trapanese G. (2015) History and crisis in Ernesto De Martino's thought, in Archivio di Storia della Cultura 28, 249-260.

Ann Taves's Religious Experience Reconsidered is a sign of a global apocalypse that will kill us all

Search for the full text: Google | DOI

Curtis F. (2010) Ann Taves's Religious Experience Reconsidered is a sign of a global apocalypse that will kill us all, in Religion 40, 288-292.

Through the megacrisis: The passage to global maturity

Search for the full text: Google | DOI

Halal W. (2013) Through the megacrisis: The passage to global maturity, in Foresight 15, 392-404.

An analysis of the use of cognitive surplus in disaster relief scenarios

Search for the full text: Google

Roddy M. (2014) An analysis of the use of cognitive surplus in disaster relief scenarios, in CEUR Workshop Proceedings 953, [pages not available].

Risk and vulnerability indicators at different scales:. Applicability, usefulness and policy implications

Search for the full text: Google | DOI

Birkmann J. (2007) Risk and vulnerability indicators at different scales:. Applicability, usefulness and policy implications, in Environmental Hazards 7, 20-31.

Anthropo-entomophagy: Cultures, evolution and sustainability

Search for the full text: Google | DOI

Ramos-Elorduy J. (2009) Anthropo-entomophagy: Cultures, evolution and sustainability, in Entomological Research 39, 271-288.

Emerging Trends in Seedbanking for Food and Agriculture: An International Perspective

Search for the full text: Google | DOI

Reddy D.E. (2017) Emerging Trends in Seedbanking for Food and Agriculture: An International Perspective, in Journal of Agricultural and Food Information 18, 145-160.

The great portal of Cluny III: The correlations of Late Antiquity, Roman and Islamic traditions on an atypical monument

Search for the full text: Google

Christe Y. (2014) The great portal of Cluny III: The correlations of Late Antiquity, Roman and Islamic traditions on an atypical monument, in Hortus Artium Mediaevalium 20, 658-665.

Risk of extreme events in multiobjective decision trees. Part 2. Rare events

Search for the full text: Google | DOI

Frohwein H.I., Haimes Y.Y., Lambert J.H. (2000) Risk of extreme events in multiobjective decision trees. Part 2. Rare events, in Risk Analysis 20, 125-134.

Where are all the cyber terrorists? from waiting for cyber attack to understanding audiences

Search for the full text: Google | DOI

Waldek L., Droogan J. (2016) Where are all the cyber terrorists? from waiting for cyber attack to understanding audiences, in Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016 [volume not available], 100-106.

Previous page Next page

Page number: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76