Search Constraints
« Previous |
111 - 120 of 124
|
Next »
Search Results
Select an image to start the slideshow
Formulating test oracles via anomaly detection techniques
1 of 10
Public library digital services : emergent issues of access and acceptable use
2 of 10
A user-centric framework for addressing vulnerability to social engineering in social networks : a mixed methods study of a Saudi academic community
3 of 10
An introspective approach to robot plan execution
4 of 10
Supporting members of online communities through the use of visualisations
5 of 10
An investigation of the barriers to information access : A study among university students with special reference to Saudi Arabia
6 of 10
Institutional and individual barriers of e-learning adoption in higher education in Oman : academics' perspectives
7 of 10
Protein microenvironments for topology analysis
8 of 10
Bayesian latent variable models for the collaborative Web
9 of 10
Novel text entry and mobile interaction techniques for Arabic language users
10 of 10