منابع مشابه
Dependence by any other name smells just as sweet: reply to van der Velde and van der Heijden (1997)
The hypothesis that people selectively attend to entire objects predicts that all attributes of an object will be reported either very accurately (if the object was attended) or very inaccurately (if it was unattended). Hence, reports of object attributes should show positive dependence. M. Monheit and J. Johnston (1994) have confirmed this prediction. F. van der Velde and A. H. C. van der Heij...
متن کاملdas g?ttliche aus der sicht rumis und der romantiker
die kultur eines jeden landes kann als ein nicht in sich abgeschlossenes system angesehen werden, das durch das handeln der menschen, durch anpassung, ubernahme, bereicherung etc. mit unterschiedlichem grad der dynamik, st?ndig im wandel ist. als eine ihrer auspr?gungen, werden in der literatur verschiedener kulturkreise die interkulturellen gemeinsamkeiten deutlich sichtbar. der ursprung vorha...
متن کاملFirst Name Last Name Title
Applying weighted network measures to distance matrices Many approaches to the analysis of weighted networks are not designed for fully connected weighted networks. However, as any distance matrix between objects is a fully connected weighted network, such networks are extremely common. In earlier work we derived an approach for the analysis of weighted networks which also works on fully connec...
متن کاملThrone Name in the Achaemenid period
The Achaemenid kings after Darius I elected Darius, Xerxes, and Artaxerxes as their throne name, when they were nominating or substituting for succession. Each of these kings has chosen one of these names according to what happen for they before they reached the king's throne, how to achieve the throne and based on their design and program. These names are not personal and real names, but they ...
متن کاملFirst name / Family name Efi Papatheocharous
Context: Traditionally, embedded systems (ES) are tightly linked to physical products, and closed both for communication to the surrounding world and to additions or modifications by third parties. New technical solutions are however emerging that allow addition of plug-in software, as well as external communication for both software installation and data exchange. These mechanisms in combinati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Datenschutz und Datensicherheit - DuD
سال: 2015
ISSN: 1614-0702,1862-2607
DOI: 10.1007/s11623-015-0350-7