Search Result Save to File Save as CSV
Your search for 25211 returns 3985 document(s)
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks, Page 497-523
Author: Kai-Lun Hui, Seung Hyun Kim, and Qiu-Hong Wang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
From Monologue to Dialogue: Performative Objects to Promote Collective Mindfulness in Computer-Mediated Team Discussions, Page 559-581
Author: Aaron M. Curtis, Alan R. Dennis, and Kelly O. McNamara | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information, Page 763-785
Author: Young Kwark, Jianqing Chen, and Srinivasan Raghunathan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Social Network Integration and User Content Generation: Evidence from Natural Experiments, Page 1035-1058
Author: Ni Huang, Yili Hong, and Gordon Burtch | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Information Technology Investments and Firm Risk Across Industries: Evidence from the Bond Market, Page 1347-1367
Author: Keongtae Kim, Sunil Mithas, and Michael Kimbrough | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Transfer Learning Dari Model Vit-B/16 Dataset Imagenet Ke Describable Textures Dataset Dan Flowers-102
Author: Fauzan Muhammad; | Call Number: T-1382 (Softcopy T-1091) MAK PI-182 TR-CSUI-054 | Edition: 2024 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Discovering communication threads in emails using a conceptual clustering approach, HAL. 221-229
Author: Anjali Ganesh Jivant; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A System for discovering relationship by feature extraction form text databases
Author: Jack G. Conrad; Mary Hunter Utt; | Call Number: SEM-256 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Discovering typical structures of documents: a road map approach, Hal. 146-163
Author: Ke Wang; | Call Number: SEM-250 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Shellcoder's handbook: discovering and exploiting security holes 2nd ed.
Call Number: 005.8 She | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   16 17 18 19 20 21 22 23 24 25  Next