Search Result Save to File Save as CSV
Your search for 43396 returns 1229 document(s)
A Detection Method Based on Clustering for Review Spam (V1-194 -- V1-197)
Author: Hong Zhu Wentang Tan Mingke He Bin Ge Fangfang Li; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Review on the State-Of-The-Art Service Management and Monitoring Using Autonomic Computing (336-344)
Author: Ahmad Tarmizi Abdul Ghani Mohamad Shanudin Zakaria; | Call Number: SEM-331 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Social Software and Knowledge Sharing: A Systematic Literature Review (389-394)
Author: Anita Safitri Mahendrawathi ER; | Call Number: SEM-371 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
AGi research: developing technology for specifying and generating critical data processing programs(Final Report of RUTI Project Year 2005)
Author: Heru Suhartanto; Belawati Widjaja; L.Y. Stefanus; Siti Aminah; Jimmy; I.S.W.B. Prasetya; Ade Azurat; | Call Number: LAP-RUTI-2005-2005 | Type: Hasil Laporan Research
Find Similar |  Add To Favorites |  Detail in New Window 
Some aspect of dependability based trust in IP-Network for the mission critical real-time services, HAL. 1229-1234
Author: Rajiv Kumar and Krishna Gopal; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Critical success factors for the implementation of information center in Hong Kong's banking industry, Hal 78-89
Author: Willie Yip; Chi Wing To; Louis C.K.Ma; | Call Number: SEM-195 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Dissemenanting critical target-specific synchronization information in parallel discrete event simulation, Hal.52-59
Author: Carmen M> Pacerella; | Call Number: SEM-188 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
How should technology-Mediated organizational change be explained? a comparison of the contributions of critical realism and activity theory, page 835-854
Author: David K. Allen, Andrew Brown, Stan Karanasios and Alistair Norman | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Causal explanation in the coordinating process: a critical realist case study of federated IT governance dtructures, page 933-964
Author: Clay K. Williams, Elena Karahanna | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Threshold and bounded-delay voting in critical control systems, ((LNCS-Lecture Notes in Computer Science 1926) Hal 70-81
Author: Paul Caspi; Rym Salem; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   19 20 21 22 23 24 25 26 27 28  Next