Results 111 to 120 of about 197 (148)

Epithelial Cdc42 Deletion Induced Enamel Organ Defects and Cystogenesis. [PDF]

open access: yesJ Dent Res, 2018
Zheng J   +11 more
europepmc   +1 more source

Personale Kundenorientierungsskala (PeKS)

2021
Die Kundenorientierung von Servicemitarbeiterinnen und -mitarbeitern gilt als zentral für die Kundenzu-friedenheit (Dormann et al., 2003; Dormann & Zapf, 2007). Kundenorientierung wird definiert als Be-reitschaft und Bemühung, Erwartungen und Anforderungen von Kunden zu verstehen und zu erfüllen (Dormann et al., 2003; Nerdinger, 2003).
openaire   +1 more source

Sequential Prolog machine PEK

New Generation Computing, 1986
The sequential Prolog machine PEK currently under development is described. PEK is an experimental machine designed for high speed execution of Prolog programs. The PEK machine is controlled by horizontal-type microinstructions. The machine includes bit slice microprocessor elements comprising a microprogram sequencer and ALU, and possesses hardware ...
Yukio Kaneda   +5 more
openaire   +1 more source

Nyctycia utilis Hacker & Peks 1993

Published as part of Joshi, Rahul, Raha, Angshuman, Bandyopadhyay, Uttaran, Bhattacharyya, Kamalika & Singh, Navneet, 2025, A catalogue of Noctuidae Latreille, 1809 (Lepidoptera: Noctuoidea) from India, pp.
Joshi, Rahul   +4 more
  +7 more sources

Political Efficacy Kurzskala (PEKS)

2014
Die PEKS ist ein ökonomisches Instrument zur Erfassung politischer Kompetenz- und Einflusserwartungen im politischen Bereich. Die Validierungsuntersuchungen haben gezeigt, dass die PEKS eine reliable und valide Messung der internen und externen politischen Kompetenz- und Einflusserwartungen erlaubt.
Beierlein, C.   +3 more
openaire   +1 more source

A flaw in the security proof of BDOP-PEKS and PEKS-STAT

Wuhan University Journal of Natural Sciences, 2007
Provable security has been widely used for analyzing the security of cryptosystems. Its main idea is to reduce the security to some well-defined computational assumption. The reduction process is called the security proof. In this paper, we find a flaw in the security proof of BDOP-PEKS and PEKS-STAT, present a new conclusion for the security of BDOP ...
Yajuan Zhang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy