Search Result Save to File Save as CSV
Your search for 12333 returns 1066 document(s)
Hoare's logic incomplete when it does not have to be, (LNCS-Lecture Notes in Computer Science 131) Hal. 9-23
Author: J. Bergstra; | Call Number: 004 Lec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
How Does the Internet Affect the Financial Market? An Equilibrium Model of Internet-Facilitated Feedback Trading, page 17-38
Author: Xiaoquan (Michael) Zhang and Lihong Zhang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Monetizing Freemium Communities: Does Paying for Premium Increase Social Engagement?, Page 719-735
Author: Ravi Bapna, Jui Ramaprasad, and Akhmed Umyarov | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How Does Strategic Alignment Affect Firm Performance? The Roles of Information Technology Investment and Environmental Uncertainty, Page 453-474
Author: Rajiv Sabherwal, Sanjiv Sabherwal, Taha Havakhor, and Zach Steelman | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Does Inertia Effect E-Learning System Acceptance Among University Lecturers? Insights from Sriwijaya University (307-312)
Author: Vidya Qoriah Putri Muhammad Rifqi Shihab Achmad Nizar Hidayanto; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Linux advances on both desktop and palmtop* does your computer know where you are?* changes to UCITA may not end controversy, page 17
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Assessing the Design Choices for Online Recommendation Agents for Older Adults: Older Does Not Always Mean Simpler Information Technology, Page 329-346
Author: Maryam Ghasemaghaei, Khaled Hassanein, and Izak Benbasat | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Does it need trusted third party? design of buyyer-seller watermarking protocol without trusted third party, (LNCS-Lecture Notes in Computer Science 2576) Hal 265-279
Author: Jae-Gwi Choi; Kouichi Sakurai; Ji-Hwan Park; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Programming languages
Author: Tucker, Allen B.; | Call Number: 001.642 4 Tuc p | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next