Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 21-30 of 651 (Search time: 0.003 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
21
Knowledge maps for e-learning

Lee, Jae Hwa; Segev, Avivresearcher, COMPUTERS EDUCATION, v.59, no.2, pp.353 - 364, 2012-09

22
A study on the motivational aspects of information management practice

Hwang, Yujong; Kettinger, William J.; Yi, Mun Yongresearcher, INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, v.33, no.1, pp.177 - 184, 2013-02

23
Robust vehicle routing problem with deadlines and travel time/demand uncertainty

Lee, C.; Lee, K.; Park, Sungsooresearcher, JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, v.63, no.9, pp.1294 - 1306, 2012-09

24
The extended activity cycle diagram and its generality

Kang, Dong-Hun; Choi, Byoung-Kyuresearcher, SIMULATION MODELLING PRACTICE AND THEORY, v.19, no.2, pp.785 - 800, 2011-02

25
Review on Modeling and Simulation of Large-scale and Complex Disaster Scenarios

Moon, Il-Chulresearcher; Lee, Taesikresearcher, SCS M&S Magazine, v.9, pp.11 - 17, 2012-01

26
Multiproduct Lot Merging-Splitting Algorithms for Semiconductor Wafer Fabrication

Bang, June-Young; Kim, Yeong-Daeresearcher; Choi, Seong-Woo, IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, v.25, no.2, pp.200 - 210, 2012-05

27
A Manufacturing/Remanufacturing System with the Consideration of Required Quality of End-of-used Products

Guo, Jianquan; Ko, Young-Dae; 황학researcher, Industrial Engineeering & Management Systems, v.9, no.3, pp.204 - 214, 2010-09

28
Heuristics for determining a patrol path of an unmanned combat vehicle

Park, Chul-Hwan; Kim, Yeong-Daeresearcher; Jeong, BongJoo, COMPUTERS & INDUSTRIAL ENGINEERING, v.63, no.1, pp.150 - 160, 2012-08

29
Fatigue problems in remote pointing and the use of an upper-arm support

Park, Kyung Sooresearcher; Hong, Gi Beom; Lee, Sangwon, INTERNATIONAL JOURNAL OF INDUSTRIAL ERGONOMICS, v.42, no.3, pp.293 - 303, 2012-05

30
취약점의 권한 획득 정도에 따른 웹 애플리케이션 취약성 수치화 프레임워크

조성영; 유수연; 전상훈; 임채호; 김세헌researcher, 정보보호학회논문지, v.22, no.3, pp.601 - 613, 2012-06

rss_1.0 rss_2.0 atom_1.0