Search Result Save to File Save as CSV
Your search for 13875 returns 4733 document(s)
G3 integrates three system technologies, page 107
Author: Joseph Achkar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What makes security technologies relevant?, page 38
Author: Li Gong | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Disruptive technologies: catching the wave, page 33
Author: Joseph L. Bower and Clayton M. Christensen, page 33 | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
New Editorial Policies, page 571-572
Author: Robert Goldstone | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cyberprivacy in the new millennium, page 132
Author: Hal Berghel | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Cyberprivacy in the new millennium, page 132
Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Coming of the new organization, page 103
Author: Peter F. Drucker | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Best Bounds on the Approximation of Polynomials and Splines by Their Control Structure, page 579-589
Author: U. Reif | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Getting to Best: Efficiency Versus Optimality in Negotiation, page 169-204
Author: Elaine B. Hyder, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Ordering and finding the best of K.2 supervised learning algorithms, page 392
Author: O.T. Yildiz | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next