Your search for 53357 returns 318 document(s) |
A Study of logistic industty modularization mode based on value-network theory: case on taizhon logistics park in zhejiang, China, Hal. 3069-3073 |
Author: Shen Yuyan; Qian Yan; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of the effect of beacon order and superframe order value to the performance of multishop wireless , hal 93-98 |
Author: Rudiyanto, Riri Fitri Sari; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Structuring a prallel simulation to improve cache behavior in a shared-memory multiprocessor: the value of distributed synchronization, Hal. 159-162 |
Author: David R. Cheriton; Hendrik A. Goosen; Hugh Holbrook; Philip Machanick; | Call Number: SEM-188 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digital businenss strategy and value creation: framing the dynamic cycle of control points, page 617-632 |
Author: Margherita Pagani | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Arguing the value of virtual worlds: patterns of discursive sensemaking of an innovative technology, page 685-709 |
Author: Nicholas Berente, Sean Hansen, Jacqueline C. Pike, and Patrick J. Bateman | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Value of IT-Enabled Retailer Learning: Personalized Product Recommendations and Customer Store Loyalty in Electronic Markets, page 859-881 |
Author: Tongxiao (Catherine) Zhang, Ritu Agarwal, and Henry C. Lucas, Jr. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Deployment value model for inrusion detection sensors, (LNCS-Lecture Notes in Computer Science 5576) Hal. 250-260 |
Author: Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Minucode a fixed-value representation of fingerprint minutiae for biometric cryptosystem, (LNCS-Lecture Notes in Computer Science 5576) Hal. 382-391 |
Author: Jingyang Shi and Kwok Yan Lam; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Automatic detection of variable and value symmetries, (LNCS-Lecture Notes in Computer Science 3709) Hal 475-489 |
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Breaking all value symmetries in surjection problems, (LNCS-Lecture Notes in Computer Science 3709) Hal 490-504 |
Author: Jean-Francois Puget; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|