Table 2: Problems in Quantifyingp-Hacking and Evidential Value From Ap-Curve Using Text-Mined Data.

doi 10.7717/peerj.1715/table-2
Full Text
Abstract

Available in full text

Date

Unknown

Authors

Unknown

Publisher

PeerJ