Your search for 22710 returns 7590 document(s) |
Marlon Dumas, Wil M. van der Aalst, Arthur H. ter Hofstede, Process-Aware Information Systems Bridging People and Software Through Process Technology September 2005, Hardcover, 432 pp. ISBN: 0-471-66306-9, US $99.95, page 1396 |
Author: Schahram D. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Witold Pedrycz, knowledge-based clustering: From Data to Information Granules, January 2005 (336 pp., Hardcover), ISBN: 0-471-46966-1, US $84.95, page 321 |
Author: Mihaela U. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Process innovation: reengineering work through information technology |
Author: Davenport, Thomas; | Call Number: 338.064 Dav p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Capitalizing on Health Information Technology to Enable Advantage in U.S. Hospitals, Page 113-140 |
Author: Elena Karahanna, Adela Chen, Qianqian Ben Liu, and Christina Serrano | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information Technology and People |
Call Number: 9 (1996): 1-4 | Type: Jurnal/ Majalah
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Adam D. Moore (Ed), information ethics, privacy, property and power, university of wshington Press, 2005 , 455 pp, ISBN: 0-29598489-9, paper $30.00, page 854 |
Author: Judith Wagner D. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems, page 21-54 |
Author: Viswanath Venkatesh, Susan A. Brown, Hillol Bala | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Information Technology and Administrative Efficiency in U.S. State Governments: A Stochastic Frontier Approach, page 1079-1101 |
Author: Min-Seok Pang, Ali Tafti, and M. S. Krishnan | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Development of steganography software with least significant bit and substitution monoalphabetic cipher methods for security of message through image (hal 432 - 435) |
Author: Iswar Kumbara, Erwin; | Call Number: SEM - 362 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Karen E. Fisher, Sanda Erdelez, Lynn (EF) McKechnie, Theories of information science behavior. ASIST monograph series, information today, Inc. Medford New Jersey, 2005, 431 pp, cost: $49.50, page 1392 |
Author: Bernard J. Jnasen | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|