Your search for 20736 returns 3731 document(s) |
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394 |
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Recursive Subdivision of Polygonal Complexes and its Applications in Computer-Aided, page 595-620 |
Author: A. H. Nasri | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Two-phase locking performance and its thrashing behaviour, page 579 |
Author: Thomasian, Alexander | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Multicast policy and its relationship to replicated data placement, page 181 |
Author: Wolfson Q. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
ITS and user interface consistency: a response to grudin, page 112 |
Author: Charles Wiecha | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Adaptive contour closure algorithm and its experimental evaluation, page 1252 |
Author: X. Jiang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Evaluationary pursuit and its application to face recognition, page 570 |
Author: C. Liu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Sorting things out: classification and its consequences, page 361 |
Author: Clare Beghtol | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An efficient document clustering algorithm and its application to a document browser, page 541 |
Author: Hideki Tanaka | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Volume data mining using 3D field topology analysis, page 46 |
Author: Issei F. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|