Results 291 to 300 of about 669,189 (326)
Optimal on-off scheduling for intermittent pumping wells under grid-connected pv systems. [PDF]
Qiao M, Ren F, Li Y, Jia D.
europepmc +1 more source
Dimensional crossover transitions of strongly interacting two- and three-boson systems
M. T. Yamashita +5 more
openalex +1 more source
Transient and Long-Term Risks of Common Physical Activities in People With Low Back Pain.
Suri P +14 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Economic Psychology, 2007
Herein we further explore whether the power of arbitrage to induce people to exhibit more rational behavior extends to diverse decision-making tasks and stated valuation over preferences for gambles. We examine how arbitrage in a preference reversal setting affects behavior for the valuation of low probability food safety risks, the Allais Paradox, and
Cherry, Todd L., Shogren, Jason F.
openaire +1 more source
Herein we further explore whether the power of arbitrage to induce people to exhibit more rational behavior extends to diverse decision-making tasks and stated valuation over preferences for gambles. We examine how arbitrage in a preference reversal setting affects behavior for the valuation of low probability food safety risks, the Allais Paradox, and
Cherry, Todd L., Shogren, Jason F.
openaire +1 more source
Proceedings of the 29th Annual Computer Security Applications Conference, 2013
Bring your own device policies allow private phones to be used in corporate environments. Solutions with multiple operating system personalities aim at solving the tension between the user's needs and the corporate's security policies. These solutions succeed at isolating personal and corporate information at the data level.
Matthias Lange, Steffen Liebergeld
openaire +2 more sources
Bring your own device policies allow private phones to be used in corporate environments. Solutions with multiple operating system personalities aim at solving the tension between the user's needs and the corporate's security policies. These solutions succeed at isolating personal and corporate information at the data level.
Matthias Lange, Steffen Liebergeld
openaire +2 more sources

