Artykuły w czasopismach na temat „Computer safety”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Computer safety.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Computer safety”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

MUKAIDONO, Masao. "Computer Safety and Functional Safety". IEICE ESS FUNDAMENTALS REVIEW 4, nr 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Gorodetskii, V. I., I. V. Kotenko i R. M. Yusupov. "Computer networks safety". Herald of the Russian Academy of Sciences 76, nr 4 (lipiec 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Nestler, Simon. "Safety-critical human computer interaction". it - Information Technology 61, nr 1 (25.02.2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.

Pełny tekst źródła
Streszczenie:
Abstract Dealing with usability issues of safety-critical interactive systems is essential for an efficient, effective and joyful use of these systems. This paper describes a prototypical safety-critical environment and discusses the HCI (human computer interaction) challenges of different interactive systems for safety-critical environments. We designed, developed and evaluated various interactive systems which solve different challenges in so-called mass casualty incidents (MCIs). In summary, we made contributions to three different areas of application: Mobile computing in safety-critical environments, simulation of safety-critical environments and social media in safety-critical environments. Finally, this paper gives further insights how all these research results can to be brought together in the future in order to be able to build usable interactive systems for safety-critical environments.
Style APA, Harvard, Vancouver, ISO itp.
4

Walczak, Andrzej, i Karol Antczak. "Patient Safety versus Computer Diagnosis". MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Zalewski, Janusz. "Safety of Computer Control System". IFAC Proceedings Volumes 34, nr 22 (listopad 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zalewski, Janusz. "Safety aspects of computer control". Control Engineering Practice 3, nr 3 (marzec 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Cao, Yuan, Hongkang Lu i Tao Wen. "A Safety Computer System Based on Multi-Sensor Data Processing". Sensors 19, nr 4 (17.02.2019): 818. http://dx.doi.org/10.3390/s19040818.

Pełny tekst źródła
Streszczenie:
The safety computer in the train control system is designed to be the double two-vote-two architecture. If safety-critical multi-input data are inconsistent, this may cause non-strict multi-sensor data problems in the output. These kinds of problems may directly affect the decision making of the safety computer and even pose a serious threat to the safe operation of the train. In this paper, non-strict multi-sensor data problems that exist in traditional safety computers are analyzed. The input data are classified based on data features and safety computer features. Then, the input data that cause non-strict multi-sensor data problems are modeled. Fuzzy theory is used in the safety computer to process multi-sensor data and to avoid the non-strict multi-sensor problems. The fuzzy processing model is added into the onboard double two-vote-two architecture safety computer platform. The fuzzy processing model can be divided into two parts: improved fuzzy decision tree and improved fuzzy weighted fusion. Finally, the model is verified based on two kinds of data. Verification results indicate that the fuzzy processing model can effectively reduce the non-strict identical problems and improve the system efficiency on the premise of ensuring the data reliability.
Style APA, Harvard, Vancouver, ISO itp.
8

Chen, Li-Shan, Yen-Ming Tseng i Xiao-Na Lin. "Artificial intelligence in safety system". MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.

Pełny tekst źródła
Streszczenie:
This research aims to study learning environment, and let the learning environment become smart. Swarm intelligence, cloud computing, and active Ultra-High Frequency RFID were used on it. We built friendly human-computer-interface software for users to use as pad phone. The Extensible Markup Language (XML) and C sharp language were used in this research. If the users begin to search, the kernel safety learning system automatically communicates with other RFID readers by agents, and the agents can search the closer camera for users. This study’s result has successfully implemented to Chin-Huo educational organization, and it would be helpful for the paterfamilias to hold all situations about their children at Chin-Huo educational organization. Paterfamilias can understand their children’s learning, going to Chin-Huo and leaving Chin-Huo through personal computers, or notebooks simultaneously or asynchronously by the computer-mediated communication. That will be great help in the grip of whole after-school remedial education, teaching and learning situation.
Style APA, Harvard, Vancouver, ISO itp.
9

Singh, Lalit Kumar, i Hitesh Rajput. "Ensuring safety in design of safety critical computer based systems". Annals of Nuclear Energy 92 (czerwiec 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Zhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma i Yinghong Wen. "Safety Mechanism Design and Verification of Safety Computer Parallel Program". Chinese Journal of Electronics 27, nr 6 (1.11.2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

S, Sathesh. "Computer Vision based Real Time Tracking System to Identify Overtaking Vehicles for Safety Precaution Using Single Board Computer". Journal of Advanced Research in Dynamical and Control Systems 12, SP7 (25.07.2020): 1551–61. http://dx.doi.org/10.5373/jardcs/v12sp7/20202258.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Leveson, Nancy G. "Software safety in embedded computer systems". Communications of the ACM 34, nr 2 (luty 1991): 34–46. http://dx.doi.org/10.1145/102792.102799.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Weaver, E. Strode. "Do Computer Systems Increase Medication Safety?" Oncology Issues 20, nr 6 (listopad 2005): 7. http://dx.doi.org/10.1080/10463356.2005.11883266.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Cram, Nick. "Computer Safety Testing: Myth & Fact". Journal of Clinical Engineering 25, nr 3 (maj 2000): 139–40. http://dx.doi.org/10.1097/00004669-200025030-00006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Udartseva, O., i O. Nikolsky. "Computer Science in Environmental Safety Research". IOP Conference Series: Earth and Environmental Science 459 (15.04.2020): 042043. http://dx.doi.org/10.1088/1755-1315/459/4/042043.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Yang, S. H., i P. W. H. Chung. "Safety considerations of computer-controlled plants". IFAC Proceedings Volumes 32, nr 2 (lipiec 1999): 8769–74. http://dx.doi.org/10.1016/s1474-6670(17)57496-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Hauptmanns, U. "Computer-Aided Valuation of Safety Management". Process Safety and Environmental Protection 76, nr 4 (listopad 1998): 286–90. http://dx.doi.org/10.1205/095758298529641.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Nicholson, Mark. "Computer Safety For Modern Bridge Systems". Journal of Navigation 66, nr 5 (29.05.2013): 789–97. http://dx.doi.org/10.1017/s0373463313000180.

Pełny tekst źródła
Streszczenie:
Computer Based Systems (CBS) and Integrated Bridge Systems (IBS) are being introduced. They provide enhanced navigation capabilities and promote ship safety. However, they are highly complex and are becoming the primary source of data/information used to navigate ships. CBS issues have arisen that challenge current safety assurance and certification practices. This paper explores the potential contribution of System Safety Engineering including technical, operational management and crew capability contributions to CBS/IBS safety. A six step roadmap for the production of best practice guidance for the safe development and operation of such systems is presented.
Style APA, Harvard, Vancouver, ISO itp.
19

Bloomfield, R. E. "Standards for safety related computer systems". Reliability Engineering & System Safety 43, nr 2 (styczeń 1994): 135–42. http://dx.doi.org/10.1016/0951-8320(94)90059-0.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Badea, Daniel Onuț, Doru Costin Darabont, Dominic Bucerzan, Alina Trifu, Eduard Smîdu, Eugenia Bulboacă i Vergilică Haralambie. "Occupational safety issues related to computer equipment installation, maintenance and use". MATEC Web of Conferences 354 (2022): 00001. http://dx.doi.org/10.1051/matecconf/202235400001.

Pełny tekst źródła
Streszczenie:
This paper presents the findings of an ongoing INCDPM project developed in collaborations with BB Computers that addresses the occupational safety issues related to computer equipment installation, maintenance and use, with emphasis on risk identification. The method used was The Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA). Using the chart flow and the list of items of this method, a literature search was conducted in Science Direct Freedom Collection, Elsevier database, Web of Science - Core Collection, Springer Link Journals. Keywords such as occupational risks, computer equipment installation, computer maintenance were used to retrieve relevant studies which explicitly reported on occupational risks related to computer equipment installation, maintenance and use. The literature search yielded 900 references, of which 20 articles were selected for full-text screening as specified by the inclusion criteria, and ultimately 10 were included in this review. It was developed an extensive and comprehensive list of occupational risks related to computer equipment installation, maintenance and use. After a classification of the equipment in calculation and processing equipment, electronic displays, printer, special printers network equipment the main risks identified in all categories mentioned above are as follows: electric shock, stress, high workload, slips and trips.
Style APA, Harvard, Vancouver, ISO itp.
21

Wang, Pin. "Safety Testing Method Analysis of Computer Software". Applied Mechanics and Materials 299 (luty 2013): 135–38. http://dx.doi.org/10.4028/www.scientific.net/amm.299.135.

Pełny tekst źródła
Streszczenie:
Along with the computer network application becomes more popular, along with our country Internet market becoming stronger, more and more individuals or enterprises to commercial activities into the electronic commerce platform, so the computer software security has become increasingly important. Therefore, to strengthen the security of computer software protection research is very necessary, and guarantee the software safety is one of the effective means of software security hidden trouble detection. This paper will discuss the computer software system in safety detection method. Computer software security testing technology is existing computer software safety based, effective recognition computer software security problems in.
Style APA, Harvard, Vancouver, ISO itp.
22

M. "A Methodological Framework for Software Safety in Safety Critical Computer Systems". Journal of Computer Science 8, nr 9 (1.09.2012): 1564–75. http://dx.doi.org/10.3844/jcssp.2012.1564.1575.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Goring, C. J. "Safety first—applying computer-based safety systems in the offshore environment". Computing & Control Engineering Journal 4, nr 6 (1993): 245. http://dx.doi.org/10.1049/cce:19930057.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

kotti, Jayasri, i Seetharamaiah Panchumarthy. "The Quantitative Safety Assessment and Evaluation for Safety-Critical Computer Systems". ACM SIGSOFT Software Engineering Notes 41, nr 1 (22.02.2016): 1–8. http://dx.doi.org/10.1145/2853073.2853091.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Kuldashov, O. H., A. O. Komilov i D. A. Abdusamatov. "COMPUTER MODEL OF IONIZER". International Journal of Advance Scientific Research 02, nr 12 (1.12.2022): 133–39. http://dx.doi.org/10.37547/ijasr-02-12-19.

Pełny tekst źródła
Streszczenie:
Depending on the field of application and nature of high voltage generation technologies used in various economic sectors, several requirements are imposed, in particular, requirements such as service life, environmental safety, work efficiency and energy efficiency. In this work, a computer model for generating high voltages that are safe for humans using transistors designed to amplify semiconductor electrical signals is described.
Style APA, Harvard, Vancouver, ISO itp.
26

Yamano, Hidemasa, Yoshiharu Tobita, Satoshi Fujita, Tohru Suzuki, Kenji Kamiyama, Koji Morita, Werner Maschek i Sylvain Pigny. "ICONE15-10462 SIMMER-III : A COUPLED NEUTRONICS-THERMOHYDRAULICS COMPUTER CODE FOR SAFETY ANALYSIS". Proceedings of the International Conference on Nuclear Engineering (ICONE) 2007.15 (2007): _ICONE1510. http://dx.doi.org/10.1299/jsmeicone.2007.15._icone1510_246.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Yuan, Tangming, i Tim Kelly. "Argument Schemes in Computer System Safety Engineering". Informal Logic 31, nr 2 (14.07.2011): 89. http://dx.doi.org/10.22329/il.v31i2.2965.

Pełny tekst źródła
Streszczenie:
Safe Safety arguments are key components in a safety case. Too often, safety arguments are constructed without proper reasoning. To address this, we argue that informal logic argument schemes have important roles to play in safety argument construction and reviewing process. Ten commonly used reasoning schemes in computer system safety domain are proposed. The role of informal logic dialogue games in computer system safety arguments reviewing is also discussed and the intended work in this area is proposed. It is anticipated that this work will contribute toward the development of computer system safety arguments, and help to move forward the interplay between research in informal logic and research in computer system safety engineering.
Style APA, Harvard, Vancouver, ISO itp.
28

Yoshida, Ruriko, Lillian Paul i Peter Nesbitt. "Stochastic Safety Radius on UPGMA". Algorithms 15, nr 12 (18.12.2022): 483. http://dx.doi.org/10.3390/a15120483.

Pełny tekst źródła
Streszczenie:
Unweighted Pair Group Method with Arithmetic Mean (UPGMA) is one of the most popular distance-based methods to reconstruct an equidistant phylogenetic tree from a distance matrix computed from an alignment of sequences. Since we use equidistant trees as gene trees for phylogenomic analyses under the multi-species coalescent model and since an input distance matrix computed from an alignment of each gene in a genome is estimated via the maximum likelihood estimators, it is important to conduct a robust analysis on UPGMA. Stochastic safety radius, introduced by Steel and Gascuel, provides a lower bound for the probability that a phylogenetic tree reconstruction method returns the true tree topology from a given distance matrix. In this article, we compute the stochastic safety radius of UPGMA for a phylogenetic tree with n leaves. Computational experiments show an improved gap between empirical probabilities estimated from random samples and the true tree topology from UPGMA, increasing confidence in phylogenic results.
Style APA, Harvard, Vancouver, ISO itp.
29

Maslov, O. N., i D. Ju Panferov. "Electromagnetic radiation safety of portable computer devices". Infokommunikacionnye tehnologii 13, nr 4 (grudzień 2015): 458–64. http://dx.doi.org/10.18469/ikt.2015.13.4.16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

&NA;. "GP computer network data confirms loratadine's safety". Reactions Weekly &NA;, nr 424 (październik 1992): 4. http://dx.doi.org/10.2165/00128415-199204240-00009.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Danilczuk, Wojciech. "Computer aided quantitative methods in machine safety". AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, nr 1-2 (28.02.2018): 53–57. http://dx.doi.org/10.24136/atest.2018.007.

Pełny tekst źródła
Streszczenie:
The paper present aspect of machine safety in addition to current legal regulations and international standards and computer aided method of risk analysis. Based on literate and international standards paper author presents most common factors and method of safety estimation. Next, based on author industry experience, computer aided risk analysis has been present. To proceed conformity assessment author used SISTEMA software developed by German institute IFA [10]. The example shown shows simplify calculation method of risk analysis and decrees level of mistake during to designee of machine safety component. Another advantages of computer aided method is simplify to scale it to the more complex system.
Style APA, Harvard, Vancouver, ISO itp.
32

Sayed, Tarek, Karim Ismail, Mohamed H. Zaki i Jarvis Autey. "Feasibility of Computer Vision-Based Safety Evaluations". Transportation Research Record: Journal of the Transportation Research Board 2280, nr 1 (styczeń 2012): 18–27. http://dx.doi.org/10.3141/2280-03.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Stanislaw, Harold. "Computer-Intensive Methods in Traffic Safety Research". International Journal of Occupational Safety and Ergonomics 8, nr 3 (styczeń 2002): 353–63. http://dx.doi.org/10.1080/10803548.2002.11076535.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Sowjanya, P. "Computer aided software integrated automated safety system". International Journal of Computer Aided Engineering and Technology 11, nr 4/5 (2019): 561. http://dx.doi.org/10.1504/ijcaet.2019.10020299.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Sowjanya, P. "Computer aided software integrated automated safety system". International Journal of Computer Aided Engineering and Technology 11, nr 4/5 (2019): 561. http://dx.doi.org/10.1504/ijcaet.2019.100456.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Yang, S. H., O. Stursberg, P. W. H. Chung i S. Kowalewski. "Automatic safety analysis of computer-controlled plants". Computers & Chemical Engineering 25, nr 4-6 (maj 2001): 913–22. http://dx.doi.org/10.1016/s0098-1354(01)00656-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Smith, I. C. "The Maintenance of Computer Based Safety Systems". IFAC Proceedings Volumes 21, nr 18 (listopad 1988): 27–33. http://dx.doi.org/10.1016/s1474-6670(17)54527-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Abrahamsen, Cathie. "Optimal patient safety a computer chip away?" Nursing Management (Springhouse) 35, nr 3 (marzec 2004): 47–48. http://dx.doi.org/10.1097/00006247-200403000-00015.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Dunn, W. R. "Cover feature - Designing safety-critical computer systems". Computer 36, nr 11 (listopad 2003): 40–46. http://dx.doi.org/10.1109/mc.2003.1244533.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Graber, Mark. "The Safety of Computer-Based Medication Systems". Archives of Internal Medicine 164, nr 3 (9.02.2004): 339. http://dx.doi.org/10.1001/archinte.164.3.339-b.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Leathley, Bridget A. "Human–computer interaction in safety critical systems". Quality and Reliability Engineering International 11, nr 6 (1995): 429–33. http://dx.doi.org/10.1002/qre.4680110606.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Fang, Weili, Lieyun Ding, Peter E. D. Love, Hanbin Luo, Heng Li, Feniosky Peña-Mora, Botao Zhong i Cheng Zhou. "Computer vision applications in construction safety assurance". Automation in Construction 110 (luty 2020): 103013. http://dx.doi.org/10.1016/j.autcon.2019.103013.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Ould, M. "Achieving safety and reliability with computer systems". Information and Software Technology 32, nr 6 (lipiec 1990): 444. http://dx.doi.org/10.1016/0950-5849(90)90134-d.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Hwang, E., A. J. Park, G. Han i E. Song. "Human-Computer interaction in analyzing neighborhood safety". Gerontechnology 21, s (23.10.2022): 1. http://dx.doi.org/10.4017/gt.2022.21.s.689.opp1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Kotti, Jayasri, i Venkataramana Attada. "The Research Framework for Quantitative Safety Assessment for Safety-Critical Computer Systems". Indian Journal of Science and Technology 10, nr 9 (1.02.2017): 1–8. http://dx.doi.org/10.17485/ijst/2017/v10i9/101298.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Braun, Matt. "Safety vs. Safety". Biomedical Instrumentation & Technology 47, nr 5 (1.09.2013): 440. http://dx.doi.org/10.2345/0899-8205-47.5.440.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Naik, Nikhil, Ramesh Raskar i César A. Hidalgo. "Cities Are Physical Too: Using Computer Vision to Measure the Quality and Impact of Urban Appearance". American Economic Review 106, nr 5 (1.05.2016): 128–32. http://dx.doi.org/10.1257/aer.p20161030.

Pełny tekst źródła
Streszczenie:
For social scientists, developing an empirical connection between the physical appearance of a city and the behavior and health of its inhabitants has proved challenging due to a lack of data on urban appearance. Can we use computers to quantify urban appearance from street-level imagery? We describe Streetscore: a computer vision algorithm that measures the perceived safety of streetscapes. Using Streetscore to evaluate 19 American cities, we find that the average perceived safety has a strong positive correlation with population density and household income; and the variation in perceived safety has a strong positive correlation with income inequality.
Style APA, Harvard, Vancouver, ISO itp.
48

An, Gang, Yu Li i Xin Li. "Architecture Design of Aviation Fault-tolerant Computer Based on ARINC659 Bus Technology". MATEC Web of Conferences 179 (2018): 03025. http://dx.doi.org/10.1051/matecconf/201817903025.

Pełny tekst źródła
Streszczenie:
The ARINC659 backplane bus is suitable for high safety and high reliability requirements of aircraft on-board computer communication systems. This paper analyzes the structure of ARINC 659 serial backplane bus and the bus fault tolerance mechanism. On the basis of backplane bus, a 4 degree of aviation fault-tolerant computer is designed. Moreover, the computer architecture and computer system of the instruction branch and monitoring branch are designed in the computer channel. The fault-tolerant management of the computer is realized by bus fault tolerance, redundancy voting between computers and the monitoring of the instruction and monitoring branches.
Style APA, Harvard, Vancouver, ISO itp.
49

Hughes, Katie E., Scott M. Lewis, Laurence Katz i Jonathan Jones. "Safety of Computer Interpretation of Normal Triage Electrocardiograms". Academic Emergency Medicine 24, nr 1 (styczeń 2017): 120–24. http://dx.doi.org/10.1111/acem.13067.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Yuan, Tangming, Tim Kelly i Tianhua Xu. "Computer-assisted safety argument review – a dialectics approach". Argument & Computation 6, nr 2 (24.06.2014): 130–48. http://dx.doi.org/10.1080/19462166.2014.927921.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii