Suche


Aktuelle Facetten:

Facetten hinzufügen:

Wenden Sie Filter/Facetten an, um Ihre Suche zu verfeinern.

 | 

Treffer 51-60 von 101 (Suchzeit: 0.007 Sekunden).
Treffer Dokumente:
ErscheinungsdatumTitelAutor(en)
23-Apr-2020Cognitive Research and Mathematics Education - How Can Basic Research Reach the Classroom?Simplicio, Henrique; Gasteiger, Hedwig; Dorneles, Beatriz Vargas; Grimes, Ka Rene; Haase, Vitor Geraldi; Ruiz, Carola; Liedtke, Francéia Veiga; Moeller, Korbinian
23-Mär-2022Real-Time Monitoring the Growth of Epitaxial CoxFe3−xO4 Ultrathin Films on Nb-Doped SrTiO3(001) via Reactive Molecular Beam Epitaxy by Means of Operando HAXPESRuwisch, Kevin; Pohlmann, Tobias; Bertram, Florian; Schlüter, Christoph; Gloskovskii, Andrei; Küpper, Karsten; Wollschläger, Joachim
9-Dez-2020Evaluating trust and shared group identities in emergent social learning processes in the Zambezi river basinLumosi, Caroline; Pahl-Wostl, Claudia; Scholz, Geeske
26-Jan-2022A Survey of Domain-Specific Architectures for Reinforcement LearningRothmann, Marc; Porrmann, Mario
29-Dez-2021Systematic Approach for Remote Sensing of Historical Conflict Landscapes with UAV-Based LaserscanningStorch, Marcel; Jarmer, Thomas; Adam, Mirjam; de Lange, Norbert
23-Dez-2021A computational framework for modeling complex sensor network data using graph signal processing and graph neural networks in structural health monitoringBloemheuvel, Stefan; van den Hoogen, Jurgen; Martin, Atzmüller
27-Dez-2020UAV-Based RGB Imagery for Hokkaido Pumpkin (Cucurbita max.) Detection and Yield EstimationWittstruck, Lucas; Kühling, Insa; Trautz, Dieter; Kohlbrecher, Maik; Jarmer, Thomas
22-Jul-2022Individual-based modeling of microbial systems under consideration of consumer-resource interactions and evolutionBogdanowski, André
14-Sep-2020Small-Polaron Hopping and Low-Temperature (45–225 K) Photo-Induced Transient Absorption in Magnesium-Doped Lithium NiobateMesserschmidt, Simon; Krampf, Andreas; Vittadello, Laura; Imlau, Mirco; Nörenberg, Tobias; Eng, Lukas M.; Emin, David
4-Sep-2020Phantom Malware: Conceal Malicious Actions From Malware Detection Techniques by Imitating User ActivityWitte, Tim Niklas