"Creative Commons Lizenz: CC-BY-NC-ND"

  • Seite 1 von 340
      • Play to Earn: A Business Model Framework for Blockchain-based Gaming

        Bild:  Play to Earn: A Business Model Framework for Blockchain-based Gaming

        Name that can easily go onto 2 lines

        Author that can easily go onto 2 lines as well

        • Kitchen handle coatings - Requirements and testing

          Bild:  Kitchen handle coatings - Requirements and testing

          Name that can easily go onto 2 lines

          Author that can easily go onto 2 lines as well

          • Monitoring of the Urban heat mitigation potential of Green Roofs

            Bild:  Monitoring of the Urban heat mitigation potential of Green Roofs

            Name that can easily go onto 2 lines

            Author that can easily go onto 2 lines as well

            • Non-steady-state Behaviour of a Building - Potential and Limitations of a Simplified Model for Building Energy Simulation

              Bild:  Non-steady-state Behaviour of a Building - Potential and Limitations of a Simplified Model for Building Energy Simulation

              Name that can easily go onto 2 lines

              Author that can easily go onto 2 lines as well

              • Thermal Stability of a Bioplastics Reactor on the Moon

                Bild:  Thermal Stability of a Bioplastics Reactor on the Moon

                Name that can easily go onto 2 lines

                Author that can easily go onto 2 lines as well

                • Integration einer Sprachsteuerungsfunktion in Mobile Apps (ohne Unterschriften)

                  Bild:  Integration einer Sprachsteuerungsfunktion in Mobile Apps (ohne Unterschriften)

                  Name that can easily go onto 2 lines

                  Author that can easily go onto 2 lines as well

                  • Bericht Sicherheit im Container-Ökosystem Sichere Konfiguration und Schutzmechanismen für Kubernetes (ohne Unterschriften)

                    Bild:  Bericht Sicherheit im Container-Ökosystem Sichere Konfiguration und Schutzmechanismen für Kubernetes (ohne Unterschriften)

                    Name that can easily go onto 2 lines

                    Author that can easily go onto 2 lines as well

                    • Bericht Identifikation von betriebskritischen Daten in KMUs

                      Bild:  Bericht Identifikation von betriebskritischen Daten in KMUs

                      Name that can easily go onto 2 lines

                      Author that can easily go onto 2 lines as well

                      • Bericht Untersuchung zur WiFi-basierten Personenerkennung (ohne Unterschriften)

                        Bild:  Bericht Untersuchung zur WiFi-basierten Personenerkennung (ohne Unterschriften)

                        Name that can easily go onto 2 lines

                        Author that can easily go onto 2 lines as well

                        • Web-Abstract Untersuchung zur WiFi-basierten Personenerkennung

                          Bild:  Web-Abstract Untersuchung zur WiFi-basierten Personenerkennung

                          Name that can easily go onto 2 lines

                          Author that can easily go onto 2 lines as well

                          • Web-Abstract Identifikation von betriebskritischen Daten in KMUs

                            Bild:  Web-Abstract Identifikation von betriebskritischen Daten in KMUs

                            Name that can easily go onto 2 lines

                            Author that can easily go onto 2 lines as well

                            • Web-Abstract Sicherheit im Container-Ökosystem Sichere Konfiguration und Schutzmechanismen für Kubernetes

                              Bild:  Web-Abstract Sicherheit im Container-Ökosystem Sichere Konfiguration und Schutzmechanismen für Kubernetes

                              Name that can easily go onto 2 lines

                              Author that can easily go onto 2 lines as well

                          Vorangehende SeiteDiese SeiteNächste Seite