Your search for 27082 returns 3672 document(s) |
Keeping your colleagues honest, page 114 |
Author: Mary C. Gentile | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Experts Agree: Using Non-Affiliated Experts to Rank Popular Topics, page 47-58 |
Author: K. Bharat, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When flexible routines meet flexible technologies: affordance, constraint, and the imbrication of human and material agencies, page 147-167 |
Author: Paul M. Leonardi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Introducing a new problem: shape-from sillhouette when the relative positions of the viewpoints is unknown, page 1484 |
Author: A. Bottino | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Effects of tranlational misalignment when self-calibrating rotating and zooming cameras, page 1015 |
Author: E. Hayman | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When is the shape of a scene unique given its light-field: a fundamental theorem of 3D vision?, page 100 |
Author: S. Baker | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When filling the wait makes IT feel longer: a paradigm shift perspective for managing inline delay, page 383-406 |
Author: Weiyin Hong, Traci J.Hess, Andrew Hardin | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When does technology use enable network change in organizations? a comparative study of feature use and shared affordances, page 749-775 |
Author: Paul M.Leonardi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using Retweets When Shaping Our Online Persona: Topic Modeling Approach, Page 501-524 |
Author: Hilah Geva, Gal Oestreicher-Singer, and Maytal Saar-Tsechansky | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|