24177 publications

  1. Prion Proteins
  2. Prions
  3. Prions
  4. Prions Prions Prions
  5. Prions and Brain Diseases in Animals and Humans
  6. Prions and Diseases
  7. Prions and Diseases
  8. Prions and Diseases
  9. Prior Processes and Their Applications
  10. Prior Processes and Their Applications
  11. Priorisierte Medizin
  12. Priorisierung in der Medizin
  13. Priorisierung in der Medizin
  14. Prioritising Business Processes
  15. Prioritization Theory and Defensive Foreign Policy
  16. Prioritization in Medicine
  17. Prioritizing the Environment in Urban Sustainability Planning
  18. Priority Nominalism
  19. Priority Rule Violations and Perverse Banking Behaviors
  20. Priority of Needs?
  21. Priority-Zone Mapping for Reforestation
  22. Prioritäten richtig setzen
  23. Prise en charge médicale et diététique des maladies héréditaires du métabolisme
  24. Prismatic Media, Transnational Circuits
  25. Prison Breaks
  26. Prison Discourse
  27. Prison Dog Programs
  28. Prison Food
  29. Prison Gangs Behind Bars and Beyond
  30. Prison Inmates Living with HIV in India
  31. Prison Narratives from Boethius to Zana
  32. Prison Officers
  33. Prison Riots in Britain and the USA
  34. Prison Shakespeare
  35. Prison Shakespeare and the Purpose of Performance: Repentance Rituals and the Early Modern
  36. Prison Tattoos
  37. Prison Vocational Education and Policy in the United States
  38. Prison in Iran
  39. Prison in Peru
  40. Prisoner Reentry
  41. Prisoners of England
  42. Prisoners of Rhodesia
  43. Prisoners of War
  44. Prisoners of War and Local Women in Europe and the United States, 1914-1956
  45. Prisoners of War and the German High Command
  46. Prisoners of the International Community
  47. Prisoners on Prison Films
  48. Prisons 2000
  49. Prisons Crowding: A Psychological Perspective
  50. Prisons and Imprisonment
  51. Prisons and Punishment in Texas
  52. Prisons, Inmates and Governance in Latin America
  53. Prisons, Peace and Terrorism
  54. Prisons, Politics and Practices in England and Wales 1945–2020
  55. Prisons, Punishment and the Pursuit of Security
  56. Prisons, State and Violence
  57. Pristine Perspectives on Logic, Language, and Computation
  58. Pristine Transfinite Graphs and Permissive Electrical Networks
  59. Privacy Computing
  60. Privacy Enhancing Technologies
  61. Privacy Enhancing Technologies
  62. Privacy Enhancing Technologies
  63. Privacy Enhancing Technologies
  64. Privacy Enhancing Technologies
  65. Privacy Enhancing Technologies
  66. Privacy Enhancing Technologies
  67. Privacy Enhancing Technologies
  68. Privacy Enhancing Technologies
  69. Privacy Enhancing Technologies
  70. Privacy Enhancing Technologies
  71. Privacy Enhancing Technologies
  72. Privacy Enhancing Technologies
  73. Privacy Impact Assessment
  74. Privacy Online
  75. Privacy Preservation in Distributed Systems
  76. Privacy Preservation in IoT: Machine Learning Approaches
  77. Privacy Preserving Data Mining
  78. Privacy Risk Analysis
  79. Privacy Risk Analysis of Online Social Networks
  80. Privacy Symposium 2022
  81. Privacy Symposium 2023
  82. Privacy Technologies and Policy
  83. Privacy Technologies and Policy
  84. Privacy Technologies and Policy
  85. Privacy Technologies and Policy
  86. Privacy Technologies and Policy
  87. Privacy Technologies and Policy
  88. Privacy Technologies and Policy
  89. Privacy Technologies and Policy
  90. Privacy Technologies and Policy
  91. Privacy Technologies and Policy
  92. Privacy Technologies and Policy
  93. Privacy and Anonymity in Information Management Systems
  94. Privacy and Criminal Justice
  95. Privacy and Data Protection Challenges in the Distributed Era
  96. Privacy and Data Protection Issues of Biometric Applications
  97. Privacy and Data Protection Seals
  98. Privacy and Data Protection in Software Services
  99. Privacy and Health Care
  100. Privacy and Identity Management
  101. Privacy and Identity Management
  102. Privacy and Identity Management for Emerging Services and Technologies
  103. Privacy and Identity Management for Life
  104. Privacy and Identity Management for Life
  105. Privacy and Identity Management for Life
  106. Privacy and Identity Management for Life
  107. Privacy and Identity Management for the Future Internet in the Age of Globalisation
  108. Privacy and Identity Management. Between Data Protection and Security
  109. Privacy and Identity Management. Data for Better Living: AI and Privacy
  110. Privacy and Identity Management. Facing up to Next Steps
  111. Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data
  112. Privacy and Identity Management. Sharing in a Digital World
  113. Privacy and Identity Management. The Smart Revolution
  114. Privacy and Identity Management. Time for a Revolution?
  115. Privacy and Security Issues in Big Data
  116. Privacy and Security Issues in Data Mining and Machine Learning
  117. Privacy and Security for Cloud Computing
  118. Privacy and Technologies of Identity
  119. Privacy and the American Constitution
  120. Privacy and the Commercial Use of Personal Information
  121. Privacy and the Digital State: Balancing Public Information and Personal Privacy
  122. Privacy at Sea
  123. Privacy for Location-based Services
  124. Privacy im Internet
  125. Privacy in Dynamical Systems
  126. Privacy in Location-Based Applications
  127. Privacy in Mobile and Pervasive Computing
  128. Privacy in Social Networks
  129. Privacy in Statistical Databases
  130. Privacy in Statistical Databases
  131. Privacy in Statistical Databases
  132. Privacy in Statistical Databases
  133. Privacy in Statistical Databases
  134. Privacy in Statistical Databases
  135. Privacy in Statistical Databases
  136. Privacy in Statistical Databases
  137. Privacy in Statistical Databases
  138. Privacy in Statistical Databases
  139. Privacy in a Cyber Age
  140. Privacy in a Digital, Networked World
  141. Privacy vs. Security
  142. Privacy, Data Protection and Cybersecurity in Europe
  143. Privacy, Security And Forensics in The Internet of Things (IoT)
  144. Privacy, Security and Trust within the Context of Pervasive Computing
  145. Privacy, Security, and Trust in KDD
  146. Privacy, Security, and Trust in KDD
  147. Privacy, Surveillance and Public Trust
  148. Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
  149. Privacy-Enhancing Fog Computing and Its Applications
  150. Privacy-Invading Technologies and Privacy by Design
  151. Privacy-Preserving Data Mining
  152. Privacy-Preserving Data Publishing
  153. Privacy-Preserving Deep Learning
  154. Privacy-Preserving Machine Learning
  155. Privacy-Preserving Machine Learning for Speech Processing
  156. Privacy-Preserving in Edge Computing
  157. Privacy-Preserving in Mobile Crowdsensing
  158. Privacy-Respecting Intrusion Detection
  159. Privat Immobilien verkaufen
  160. Privat Immobilien verkaufen
  161. Privat – öffentlich – politisch: Gesellschaftstheorien in feministischer Perspektive
  162. Privat-Haftpflichtversicherung
  163. Privat-Haftpflichtversicherung
  164. Private Action for Public Purpose
  165. Private Actors in International Investment Law
  166. Private Alterssicherung über den Kapitalmarkt
  167. Private Altersvorsorge
  168. Private Bankers in the Italian 19th Century
  169. Private Banking
  170. Private Banking and Wealth Management Futures 2030
  171. Private Banking im Qualitätswettbewerb um den Kunden
  172. Private Banking im Schlaglicht internationaler Regulierungen
  173. Private Banking in Deutschland
  174. Private Banking und Wealth Management
  175. Private Business … Public Battleground
  176. Private Communities and Urban Governance
  177. Private Company Valuation
  178. Private Data and Public Value
  179. Private Development Aid in Europe
  180. Private Education Policy in China
  181. Private Education in China
  182. Private Enterprise in Eastern Europe
  183. Private Enterprise-Led Economic Development in Sub-Saharan Africa
  184. Private Environmental Regimes in Developing Countries
  185. Private Equity
  186. Private Equity Exit
  187. Private Equity Exits
  188. Private Equity Finance
  189. Private Equity Financing in Infrastructure and Real Estate
  190. Private Equity Fund Investments
  191. Private Equity Investing in Emerging Markets
  192. Private Equity Investments
  193. Private Equity Investments
  194. Private Equity Secondary Transactions
  195. Private Equity Targets
  196. Private Equity Unchained
  197. Private Equity als Anlageklasse für Fondsgebundene Lebensversicherungen
  198. Private Equity and Financial Development in Latin America
  199. Private Equity and Venture Capital
  200. Private Equity für Familienunternehmen