Your search for 15238 returns 3808 document(s) |
Project promises accessible technology for the disabled* two efforts aim to upgrade mobile memory* Prime breakthorgh may improve encryption, page 26 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using Shape Analysis to Reduce Finite-State Models of Concurrent Java Programs, page 51-93 |
Author: James C. Corbett | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
State of the information privacy literature: where are we now and where should we go?, page 977-988 |
Author: Paul A. Pavlou | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Effects of state-based and event-based data representation on user performance in query formulation tasks, page 269-290 |
Author: Gove N. Allen and Salvatore T. March | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information Technology and Administrative Efficiency in U.S. State Governments: A Stochastic Frontier Approach, page 1079-1101 |
Author: Min-Seok Pang, Ali Tafti, and M. S. Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, Page 1043-1067 |
Author: Juhee Kwon and M. Eric Johnson | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SAFKASI: A Security Mechanism for Language-Based Systems, page 341-378 |
Author: Dan S. Wallach, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital government security infrastructure design challenges, page 66 |
Author: James Joshi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust-based security in pervasive computing environments, page 154 |
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Wanted: more network-security graduates and research, page 22 |
Author: Linda Dailey P. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|