Search alternatives:
aina » ainaa (Expand Search), bina (Expand Search), anna (Expand Search)
spie » spin (Expand Search)
fine » find (Expand Search), five (Expand Search)
pingn » ping (Expand Search), pinn (Expand Search), pinon (Expand Search), pinggn (Expand Search), spingn (Expand Search)
pings » ping (Expand Search), rings (Expand Search), wings (Expand Search), pinggs (Expand Search), spings (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
ling » long (Expand Search), link (Expand Search), lin (Expand Search)
line » like (Expand Search), life (Expand Search)
aina » ainaa (Expand Search), bina (Expand Search), anna (Expand Search)
spie » spin (Expand Search)
fine » find (Expand Search), five (Expand Search)
pingn » ping (Expand Search), pinn (Expand Search), pinon (Expand Search), pinggn (Expand Search), spingn (Expand Search)
pings » ping (Expand Search), rings (Expand Search), wings (Expand Search), pinggs (Expand Search), spings (Expand Search)
pin » ping (Expand Search), spin (Expand Search)
ling » long (Expand Search), link (Expand Search), lin (Expand Search)
line » like (Expand Search), life (Expand Search)
-
461
Quantification of operational risk in U.S. property and casualty insurance companies
Published 2012Get full text
Final Year Project (FYP) -
462
性格特征、代际差异与职场冲突 :中国90后研究 = Personality traits, generation gaps and challenges in the workplace : a study of China’s post-90s generation
Published 2016Get full text
Final Year Project (FYP) -
463
The impact of product delay and recall announcements on firm performance.
Published 2008Get full text
Thesis -
464
A study of notebook purchase intentions of undergraduates in Singapore
Published 2008Get full text
Final Year Project (FYP) -
465
Antioxidative properties of roselle (Hibiscus sabdariffa L.) in linoleic acid model system
Published 2002Article -
466
-
467
-
468
-
469
-
470
Server-aided revocable predicate encryption : formalization and lattice-based instantiation
Published 2021“…The latter, introduced by Katz et al. (2008, EUROCRYPT), provides fine-grained and role-based access to encrypted data and can be viewed as a generalization of identity-based and attribute-based encryption. …”
Get full text
Journal Article -
471
-
472
Towards an optimal and unbiased approach for tumor cell isolation
Published 2013“…This approach achieves an average of >90 % recovery of spiked tumor cells and >99 % total WBC depletion in whole blood across multiple cell lines, in a simple and easy-to-use assay. The results presented herein and ongoing improvements aim to fulfill the need for a highly reliable, unbiased, standardized, and optimized CTC isolation platform, using component technologies that are validated for cell isolation.…”
Get full text
Get full text
Journal Article -
473
-
474
-
475
-
476
Applying Frederick Herzberg's motivator-hygiene theory to tourism.
Published 2008Get full text
Final Year Project (FYP) -
477
Exploratory study on how advertising affects credit card usage of young professionals : the case of Singapore.
Published 2008Get full text
Final Year Project (FYP) -
478
-
479
-
480
Abelian codes in principal ideal group algebras
Published 2013Get full text
Get full text
Get full text
Journal Article