-
El enfoque Aprendizaje Servicio en la asignatura Gobierno de Tecnologías de l...
Participación en las I Jornadas sobre Buenas Prácticas en Calidad de la Universidad de Salamanca, concretamente en la Mesa II: Objetivos de Desarrollo Sostenible y... -
Ein Biographisches Lexikon Für Historische Migrationsforschung In Mitteleuropa
The poster highlights the web application/data model as well as the theoretical assumptions behind our migration research in the ÖBL data. -
DDI is not enough
The Consortium of European Social Science Data Archives CESSDA is a distributed European Infrastructure with 15 member countries (www.cessda.eu). CESSDA, wants to be a key... -
How Do Users of Activity Tracking Technologies Perceive the Data Privacy Envi...
With the omnipresent digitalization and quantification of our everyday life, data privacy became an important topic in research, politics and legislation. In order to contain... -
EPOS Integrated Core Services Architecture Basics - TUTORIAL
The presentation outlines the basics of the EPOS Integrated Core Services Central hub, a system for integrate Data, Data Products, Software and Services provided by European... -
Data Management and User Data Portal at CSNS
China Spallation Neutron Source (CSNS) is a large science facility, and it is public available to researchers from all over the world. The data platform of CSNS is aimed for... -
dedup_wf_001--79e3eef9bd685da7432defeff0eafe2d
This course material is intended for beginners with no previous experience of using OpenFOAM. Existing users can also benefit by broadening their knowledge and learning new... -
ORCID DE - Stand und Rückblick
Diese Präsentation zeigt den aktuellen Stand sowie einen Rückblick auf das ORCID DE Projekt. -
Data Management Plans, why and how?
Workshop given on Data Management Plans (DMPs) by Esther Plomp and Santosh Ilamparuthi for the Helis Academy FAIR Data Stewardship Course in Niel, Belgium, on the 27th of May. -
dedup_wf_001--17993f3d3e427f56a744ae77201a5c81
Over the last few years, great improvements have been made around the areas of reproducible scientific computing research and FAIR (findable, accessible, interoperable and... -
Pid Service Adoption
This presentation describes how the uptake of persistent identifiers can be measured and gives an overview of the main results of the ORCID adoption study. -
An integrative Systems Biology approach to advance in the understanding and t...
Prostate cancer is one of the top three most common types of cancer affecting men around the world. Screening techniques have allowed the detection of this type of cancer at... -
Halki Diabetes Remedy Review: Eric Whitfield | Halki Diabetes Reverse Type 2 ...
Eric Whitfield’s Halki Diabetes Remedy is a 21-days of 60-second system designed to eliminating Type 2 Diabetes. It will provide you with exercises, meals and recipes to help... -
Striped Data Analysis Framework
A columnar data representation is known to be an efficient way for data storage, specifically in cases when the analysis is often done based only on a small fragment of the... -
Creación del perfil digital de los investigadores peruanos
Taller impartido en el II Congreso Internacional de Tendencias en Innovación Educativa (CITIE 2018), celebrado en Arequipa (Perú) del 26-30 de noviembre de 2018. El objetivo... -
Constraining magnetic fields in intermediate-mass main-sequence stars with as...
This is the digital version of the poster presented by Jordan Van Beeck at the Nederlandse Astronomenconferentie (NAC), 2019. (https://www.astro.rug.nl/nac2019/) Additional... -
Adapting ATLAS@Home to trusted and semi-trusted resources
ATLAS@Home is a volunteer computing project which enables members of the public to contribute computing power to run simulations of the ATLAS experiment at CERN’s Large Hadron... -
A brief investigation on CDSP data users
This presentation investigates the profile and opinions of CDSP data users from 2012 to 2019. As disseminating data is amongst CDSP's historic missions, knowledge of who asks... -
Authorization Using the Publish-Subscribe Model
Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers.... -
Accountability and Availability
Learning objectives: Comprehend the principles of security accountability and availability. Overview: Key principles of security accountability and availability are outlined...