Your search for 25543 returns 2634 document(s) |
Information processing using citation to investigate journal influence in accounting, page 341 |
Author: Alireza Tahai | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How should technology-Mediated organizational change be explained? a comparison of the contributions of critical realism and activity theory, page 835-854 |
Author: David K. Allen, Andrew Brown, Stan Karanasios and Alistair Norman | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Review: a review of culture in information systems research: toward a theory of information technology culture conflict, page 357-399 |
Author: Dorothy E. Leidner and Timothy Kayworth | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisis penerimaan teknologi internet oleh pengajar dengan menggunakan model unified theory of acceptance and use of technology (UTAUT) |
Author: Cholila Djavad Nammah; | Call Number: SK-1141 (Softcopy SK-622) | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Application of 2D barcode in hardcopy document verification system,(LNCS-Lecture Notes in Computer Science 5576) Hal 644-651 |
Author: Mazleena Salleh; Teoh Chin Yew; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Some application of polynomials for the design of cryptographic protocols, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-13 |
Author: Eyal Kushilevitz; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An authorization model for e-consent requirement in a health care application, (LNCS-Lecture Notes in Computer Science 2576) Hal 191-205 |
Author: Chun Ruan; Vijay Varadharajan; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Random stimuli generation for functional hardware verification as a CP application, (LNCS-Lecture Notes in Computer Science 3709) Hal 882 |
Author: Yehuda Naveh, Roy Emek; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A generator of efficient abstract machine implementations and its application to emulator minimization, (LNCS-Lecture Notes in Computer Science 3668) Hal 21-36 |
Author: Jose F. Morales; Manuel Carro; German Puebla; Manuel V. Hermenegildo; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An efficient decision procedure for the theory of fixed-sized bit-vectors, (LNCS-Lecture Notes in Computer Science 1254) Hal 60-71 |
Author: David Cyrluk; Oliver Moller; Harald Rueb; | Call Number: 004 Int c | Edition: (LNCS-Lecture Notes in Computer Science 985) | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|