Your search for 47005 returns 5875 document(s) |
When is the shape of a scene unique given its light-field: a fundamental theorem of 3D vision?, page 100 |
Author: S. Baker | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When filling the wait makes IT feel longer: a paradigm shift perspective for managing inline delay, page 383-406 |
Author: Weiyin Hong, Traci J.Hess, Andrew Hardin | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When does technology use enable network change in organizations? a comparative study of feature use and shared affordances, page 749-775 |
Author: Paul M.Leonardi | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Using Retweets When Shaping Our Online Persona: Topic Modeling Approach, Page 501-524 |
Author: Hilah Geva, Gal Oestreicher-Singer, and Maytal Saar-Tsechansky | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Benchmark untuk web security, page 18 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
State of IT security 2006, page 26 |
Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Memahami modul enkripsi dan security data/ |
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Security issues in data warehouseing, HAL. 346-351 |
Author: Kunjal B. Joshi; | Call Number: SEM-291 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Principles of data security/ Ernst L. Leiss |
Author: Leiss, Ernst L.; | Call Number: 05.8 Lei p | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Innovation killers: how financial tools destroy your capacity to do new things, page 98 |
Author: Clayton M. Christensen, Stephen P. Kaufman and Willy S. Shih | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|