Search Result Save to File Save as CSV
Your search for 42694 returns 3817 document(s)
Networks on chips: a new soc paradigm, page 70
Author: Luca Benini | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Who's liable for insecure networks, page 93
Author: Erin K. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Denial of service in sensor networks, page 54
Author: Amthony D. W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Sensors+agents+networks=aware agents, page 84
Author: Michael N.H. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Harnessing your staff's informal networks, page 82
Author: Richard Mcdermott and Douglas Archibald | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Top Persuader Prediction for Social Networks, Page 63-82
Author: Xiao Fang and Paul Jen-Hwa Hu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Using Organismic Integration Theory to Explore the Associations Between Users’ Exercise Motivations and Fitness Technology Feature Set Use, Page 287-312
Author: Tabitha L. James, Linda Wallace, and Jason K. Deane | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
What Users Do Besides Problem-Focused Coping When Facing IT Security Threats: An Emotion-Focused Coping Perspective, Page 373-394
Author: Huigang Liang, Yajiong Xue, Alain Pinsonneault, and Yu “Andy” Wu | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Data communications: a users guide
Author: Sherman, Kenneth; | Call Number: 004.6 She d | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Unix for super-users
Author: Foxley, Eric; | Call Number: 005.43 Fox u | Type: Buku Pusat
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next