Search for persons
X
?
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Pervasive Computing Technologies for Healthcare ,
4
A Data-Driven Methodology and Workflow Process Leveraging R..:
, In:
?
Threats to Peace and International Security: Asia versus West; Advanced Sciences and Technologies for Security Applications ,
5
China's Borderless Expansionism. Could Be a Threat to Inter..:
, In:
?
12th IET International Conference on Ionospheric Radio Systems and Techniques (IRST 2012) ,
6
Spatial domain mitigation of out of band strong interferers..:
, In:
?
12th IET International Conference on Ionospheric Radio Systems and Techniques (IRST 2012) ,
7
Analog mitigation of out of band strong interferers in wide..:
, In:
?
Comparison-Shopping Services and Agent Designs ,
8
Comparison Shopping Behaviour in Online Environments: The C..:
, In:
?
Comparison-Shopping Services and Agent Designs ,
9
Comparison Shopping Behaviour in Online Environments: The C..:
, In:
?
Information Technology and Economic Development ,
10
Key Drivers of Internet Banking Adoption: The Case of Spani..:
, In:
?
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education ,
11
Motivators and Inhibitors of Distance Learning Courses Adop..:
, In:
?
Tutorial Topics in Infection for the Combined Infection Training Programme ,
12
Zoonotic Infections:
, In:
?
Tutorial Topics in Infection for the Combined Infection Training Programme ,
13
Infections in the Immunocompromised Host:
, In:
?
IFMBE Proceedings; XV Mediterranean Conference on Medical and Biological Engineering and Computing – MEDICON 2019 ,
14
Comparative Assessment Between 3D and Conventional 2D Imagi..:
, In:
?
Concepts and Models for Drug Permeability Studies ,
15