Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 3436 to 3455 of 8221 < previous   next >
Issue DateTitleAuthor(s)
2009Identification of major factors influencing ELISpot-based monitoring of cellular responses to antigens from mycobacterium tuberculosisSmith, SG; Joosten, SA; Verscheure, V; Pathan, AA; McShane, H, et al
2009Identification of nonlinear interconnected systemsDate, P; Pepona, Eleni
2012Identification of nonlinear lateral flow immunoassay state-space models via particle filter approachZeng, N; Wang, Z; Li, Y; Du, M; Liu, X
2009Identification of novel tumour suppressor genes involved in the development of cutaneous malignant melanomaOuboussad, Lylia
2007Identification of segments of European banks with a latent class frontier modelBarros, CP; Caporale, GM; Gil-Alana, LA
2004Identification of subpopulations of cells with differing telomere lengths in mouse and human cell lines by flow FISHNewbold, R F; Cabury, E; Newton, C; Roberts, T; Slijepcevic, P
2004Identifying and Solving Multivariate Rational Expectations Models (Updated: 01/2005)Hunter, J; Ioannidis, C
2004Identifying asymmetric, multi-period Euler equations estimated by non-linear IV/GMMHunter, J; Ioannidis, C
2007Identifying benefits and barriers for IS adoption: A sociotechnical framework applied to health careSerrano, A; Fitzgerald, G; Piris Pinilla, Maria Luisa
2007Identifying healthcare actors involved in the adoption of information systemsMantzana, V; Themistocleous, M; Irani, Z; Morabito, V
2000Identifying long-run behaviour with non-stationary dataHunter, J; Bauwens, L
2009Identifying reverse 3PL performance critical success factorsSharif, A M
2012Identifying the mechanisms underpinning recognition of structured sequences of actionNorth, JS; Hope, ER; Williams, AM
2013Identifying the visual information and processes underlying expert judgements of deceptive intentJackson, R; Barton, Hayley
1990Identity development of people with learning difficulties through the recognition of workRay, C; Macdonald, Ian
2010Identity security and Turkish foreign policy in the post-cold war period: Relations with the EU, Greece and the Middle EastMacMillan, J; Hughes, M; G├╝lseven, Enver
2007Identity studies: Multiple perspectives and implications for corporate-level marketingHe, HW; Balmer, JMT
2009The ideology of ergonomicsWilkin, P
2008IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs [Medium access control protocols for wireless LANs]Skordoulis, D; Ni, Q; Chen, HH; Stephens, AP; Liu, C, et al
2004If the condom fits, wear it: a qualitative study of young African-American menCrosby, RA; Graham, CA; Yarber, WL; Sanders, SA