[1]
|
Tourism Regional Multiplier Effects in Tanzania: Analysis of Singita Grumeti Reserves Tourism in the Mara Region
|
|
Journal of Sustainable Development,
2016 |
|
|
[2]
|
Music generator with Markov Chain: A case study with Beatme Touchdown
|
|
2016 |
|
|
[3]
|
AGOCS—Accurate Google Cloud Simulator Framework
|
|
2016 |
|
|
[4]
|
A Semiotics Approach to Semantic Mismatches.
|
|
2014 |
|
|
[5]
|
Technology and Online Education: Models for Change.
|
|
Contemporary Issues in Education Research,
2014 |
|
|
[6]
|
Communication-oriented business model based on flows
|
|
International Journal of Business Information Systems,
2014 |
|
|
[7]
|
Technology and online education: Models for change
|
|
Contemporary Issues in Education Research (CIER),
2014 |
|
|
[8]
|
Study on Law of European Union
|
|
S Ting - hknccp.org,
2014 |
|
|
[9]
|
A Semiotics Approach to Semantic Mismatches
|
|
Service Science and Knowledge Innovation,
2014 |
|
|
[10]
|
Communication–oriented business model based on flows
|
|
International Journal of Business Information Systems,
2014 |
|
|
[11]
|
Toward flow-based semantics of activities
|
|
Int. J. Software Eng. Appl,
2013 |
|
|
[12]
|
Tourism modelling for the space coast
|
|
Tourism As a Challenge,
2013 |
|
|
[13]
|
FLOW-BASED CONCEPTUAL REPRESENTATION OF PROBLEMS.
|
|
Journal of Theoretical and Applied Information Technology,
2013 |
|
|
[14]
|
Reconceptualization of Class-based Representation in UML
|
|
International Journal of Computer Science Issues(IJCSI),
2012 |
|
|
[15]
|
Reconceptualization of Class onceptualization of Class onceptualization of Class-based Representation Representation Representation in UML
|
|
NULL
2012 |
|
|
[16]
|
Perceived Privacy
|
|
Information Technology: New Generations (ITNG), 2012 Ninth International Conference on. IEEE,
2012 |
|
|
[17]
|
Servant Sustainship Education for Sports Professionalization
|
|
CW Cook, I Florida - asbbs.org,
2012 |
|
|
[18]
|
Ability Training Through Partnered Education
|
|
International Journal of Education and Information Technologies,
2011 |
|
|
[19]
|
Examining moral judgment and ethical decision-making in information technology managers and their relationship
|
|
NULL
2010 |
|
|
[20]
|
A Comparative Analysis of Auditing Within the Healthcare Database
|
|
2010 |
|
|
[21]
|
Examining Moral Judgment and Ethical Decision-Making in Information Technology Managers and Their Relationship.
|
|
University of Phoenix, ProQuest Dissertations Publishing,
2010 |
|
|
[22]
|
Conceptualizing and Generalizing Access Control
|
|
Information Science and Applications (ICISA), 2010 International Conference on. IEEE,
2010 |
|
|
[23]
|
Conceptual foundation for personal information management
|
|
2010 |
|
|
[24]
|
System-based approach to software vulnerability
|
|
Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE,
2010 |
|
|