Research methods

Results: 16271



#Item
431

Closing the natural interaction loop with neuroscience-based robotics In this talk, I will present an approach to social robotics that is based on objective methods of neuroscience in human-robot interaction research. I

Add to Reading List

Source URL: www.icsoro.org

Language: English - Date: 2015-07-29 07:30:36
    432

    Behavior Research Methods 2008, 40 (3), doi: BRMAsymptotic and resampling strategies for assessing and comparing indirect effects

    Add to Reading List

    Source URL: www.quantpsy.org

    Language: English - Date: 2011-08-12 01:45:53
      433Education / Euthenics / Qualitative research / Quantitative research / Social research / SPSS / Data analysis / Sociology / Academic dishonesty / Homework

      Research Methods II SociologyRhode Island College, Spring 2012 Tuesdays and Thursdays 4:00-4:50 pm, Gaige 168 Prerequisite: Soc 302, Pol 300, or consent of instructor Instructor Information

      Add to Reading List

      Source URL: www.ric.edu

      Language: English - Date: 2012-01-19 11:54:05
      434

      Forum for Electromagnetic Research Methods and Application Technologies (FERMAT) A Systematic Approach for Port-Decoupling of Closely Separated Antennas George Shaker, Gholamreza Rafi, Nagula Sangary, and Safieddin Safa

      Add to Reading List

      Source URL: www.e-fermat.org

      Language: English - Date: 2014-11-27 12:10:55
        435University of St. Gallen

        University of St.Gallen (HSG) GSERM Global School in Empirical Research Methods Tellstrasse 2 CH-9000 St.Gallen Switzerland

        Add to Reading List

        Source URL: anmeldung.gserm.ch

        Language: English - Date: 2015-09-10 12:59:50
          436

          Citizenship, Rights & Policy Economic Policy Environmental Policy European Union Policy Regulatory Governance Research Methods

          Add to Reading List

          Source URL: www.ucd.ie

          Language: English - Date: 2016-02-04 19:39:06
            437Cryptography / Theoretical computer science / E-commerce / Secure communication / Model checking / Cryptographic protocol / Public-key cryptography / Communications protocol / Formal methods / Computer security / Secure multi-party computation

            Secure Protocols for Secrecy Hanane Houmani and Mohamed Mejri LSFM Research Group Computer Science Department LAVAL University Quebec, Canada

            Add to Reading List

            Source URL: www.qatar.cmu.edu

            Language: English - Date: 2004-12-05 23:21:27
            438Fractals / Iterated function / Operations research / Artificial neural network / Mathematical optimization / Numerical analysis / Pi / Tiny Encryption Algorithm

            Physics without Laws - Making exact Predictions with data based Methods

            Add to Reading List

            Source URL: reglos.de

            Language: English - Date: 2009-11-01 18:19:41
            439

            LNCSA Review of Mobile HCI Research Methods

            Add to Reading List

            Source URL: people.cs.aau.dk

            Language: English - Date: 2013-06-06 03:59:17
              440

              Experiments and formal methods for privacy research Sören Preibusch University of Cambridge, Computer Laboratory Cambridge CB3 0FD , privacy-calculus.net

              Add to Reading List

              Source URL: scone.cs.st-andrews.ac.uk

              Language: English - Date: 2010-08-18 16:06:40
                UPDATE