Your search for 41577 returns 8798 document(s) |
Content sharing in a social broadcasting environment: evidence from twitter, page 123-142 |
Author: Zhan Shi, Huaxia Rui, and Andrew B. Whinston | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Herding and Social Media Word-of-Mouth: Evidence from Groupon, Page 1331-1351 |
Author: Xitong Li and Lynn Wu | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Flexible authorization mechanism for ralational data management systems, page 101 |
Author: Elisa B. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Soumen chakrabarti, Mining the Web: discovering knowledge from hypertext data, 2002, Morgan -Kaufmann Publishers, 352 pp., ISBN: 1-55860-754-4-$54.95, page 317 |
Author: Bernard J. Jansen | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Witold Pedrycz, knowledge-based clustering: From Data to Information Granules, January 2005 (336 pp., Hardcover), ISBN: 0-471-46966-1, US $84.95, page 321 |
Author: Mihaela U. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Knowledge based production management systems |
Call Number: 658.5 Kno | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Knowledge bassed systems for management decisions |
Author: Mockler, Robert J.; | Call Number: 658.403 Moc k | Type: Buku Pusat
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Enhancing the design of web navigation systems: the influence of user disorientation on engagement and performance, page 661-678 |
Author: Jane Webster and Jaspreet S. Ahuja | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Management information from data bases/ T. Crowe |
Author: Crowe, T.; | Call Number: 658.403 8 Cro m | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|