Search alternatives:
spike » spie (Expand Search)
fine » find (Expand Search), line (Expand Search), five (Expand Search)
spends » spend (Expand Search)
fins » finds (Expand Search), find (Expand Search), ins (Expand Search)
ping » ling (Expand Search), ming (Expand Search), peng (Expand Search), sping (Expand Search)
pina » bina (Expand Search), aina (Expand Search), nina (Expand Search), spina (Expand Search)
pin » spin (Expand Search)
spike » spie (Expand Search)
fine » find (Expand Search), line (Expand Search), five (Expand Search)
spends » spend (Expand Search)
fins » finds (Expand Search), find (Expand Search), ins (Expand Search)
ping » ling (Expand Search), ming (Expand Search), peng (Expand Search), sping (Expand Search)
pina » bina (Expand Search), aina (Expand Search), nina (Expand Search), spina (Expand Search)
pin » spin (Expand Search)
-
141
Importance of guanxi in doing business in China
Published 2008“…Investigate the importance of guanxi in China and identify important elements that contribute to good guanxi development such as flexibility, creativity, mutual trust, mianzi, renqing, mutual interest and benefits.…”
Get full text
Thesis -
142
Competition in trade between China and Asean.
Published 2008“…This report discussed about the competition in trade between China and Asean.…”
Get full text
Research Report -
143
Introduction : interdisciplinary perspectives on English in China
Published 2015“…Introduction: Interdisciplinary perspectives on English in China…”
Get full text
Get full text
Journal Article -
144
Decoding China's cyber warfare strategies
Published 2016“…While conventional, low-intensity, asymmetric, or non-linear conflict scenarios are plausible for East Asia’s strategic flashpoints, the next major conflict involving China will likely start in cyberspace.…”
Get full text
Get full text
Commentary -
145
China's soft power: stuck in transition
Published 2016“…Whilst China is excited about its rising soft power, the West is anxious over the impact of China’s soft power on the international order. …”
Get full text
Get full text
Commentary -
146
The US and China: Dangers of Premature Extrapolation
Published 2016“…Many commentators assume that China will become the next world superpower. This may be a premature assessment. …”
Get full text
Get full text
Commentary -
147
Growing Uighur Militancy: Challenges for China
Published 2016“…With the emergence of a new generation of Uighur militants drawn to conflict in the Middle East, there has been a shift in the threat landscape of China. Chinese investments and citizens in conflict-ridden countries such as Afghanistan, Pakistan, and Iraq may become a potential target for the current transnational network of Uighur militants.…”
Get full text
Get full text
Commentary -
148
The information revolution and its impact on China
Published 2008Get full text
Get full text
Conference Paper -
149
-
150
-
151
Unilever China : keeping the magic alive.
Published 2008“…The objective of this project is to probe further into the China market and study the mechanisms of its business environment. …”
Get full text
Final Year Project (FYP) -
152
-
153
China's peaceful rise : till when?
Published 2015“…Has China risen? Amidst never-ending talks and discussion about a rising China, what are the indicators of a risen China?…”
Get full text
Get full text
Commentary -
154
-
155
Motivation of the re-emergence of territorial disputes in the South China Sea : from an US and China regional strategies' perspective.
Published 2013“…Despite the fact that 20th century has witnessed frequent and intense conflicts in the South China Sea, the first decade of 21st century enjoyed peace there. …”
Get full text
Thesis -
156
-
157
Effects of accelerated carbonation on fine incineration bottom ash: CO2 uptake, strength improvement, densification, and heavy metal immobilization
Published 2024“…Due to the higher heavy metal contents, fine IBA can be removed from total IBA and treated separately to promote the use of IBA. …”
Get full text
Journal Article -
158
-
159
Multi-Cloud Strategy for Cloud Architects : Learn how to adopt and manage public clouds by leveraging BaseOps, FinOps, and DevSecOps /
Published 2023“…This edition delves into the latest concepts of BaseOps, FinOps, and DevSecOps, including the use of the DevSecOps Maturity Model. …”
Get full text
Get full text
software, multimedia -
160