| 21 |
|
A tale of two theories: Sympathy or competition?
|
Torres, I. M.
|
Elsevier Science B.V., Amsterdam.
|
2007
|
|
|
|
| 22 |
|
A tale of two yield curves: Modeling the joint term structure of dollar and euro interest rates
|
Egorov, A. V.; Li, H.; Ng, D.
|
Elsevier Science B.V., Amsterdam.
|
2011
|
|
|
|
| 23 |
|
A tale of values-driven and profit-seeking social investors
|
Derwall, J.; Koedijk, K.; Ter Horst, J.
|
Elsevier Science B.V., Amsterdam.
|
2011
|
|
|
|
| 24 |
|
A tangled Web of libel lies?
|
Pounder, D. C.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 25 |
|
A target's perspective on the effects of ATPs in takeovers after recognizing its choice in the process
|
Goktan, M. S.; Kieschnick, R.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 26 |
|
A taxonomic review of methods and tools applied in technology assessment
|
Tran, T. A.; Daim, T.
|
Elsevier Science B.V., Amsterdam.
|
2008
|
|
|
|
| 27 |
|
A taxonomic view of illegal transfer of technologies: A case study
|
Reisman, A.
|
Elsevier Science B.V., Amsterdam.
|
2006
|
|
|
|
| 28 |
|
A taxonomy and comparison of computer security incidents from the commercial and government sectors
|
Kjaerland, M.
|
Elsevier Science B.V., Amsterdam.
|
2006
|
|
|
|
| 29 |
|
A taxonomy for data envelopment analysis
|
Gattoufi, S.; Oral, M.; Reisman, A.
|
Elsevier Science B.V., Amsterdam.
|
2004
|
|
|
|
| 30 |
|
A taxonomy for information security technologies
|
Venter, H. S.; Eloff, J. H.
|
Elsevier Science B.V., Amsterdam.
|
2003
|
|
|
|
| 31 |
|
A taxonomy of differences between consumers for market segmentation
|
Bock, T.; Uncles, M.
|
Elsevier Science B.V., Amsterdam.
|
2002
|
|
|
|
| 32 |
|
A taxonomy of hosts visiting friends and relatives
|
Young, C. A.; Corsun, D. L.; Baloglu, S.
|
Elsevier Science B.V., Amsterdam.
|
2007
|
|
|
|
| 33 |
|
A taxonomy of information technology-enhanced pricing strategies
|
Dixit, A.; Whipple, T. W.; Zinkhan, G. M.; Gailey, E.
|
Elsevier Science B.V., Amsterdam.
|
2008
|
|
|
|
| 34 |
|
A taxonomy of manufacturing strategies in China
|
Zhao, X.; Sum, C. C.; Qi, Y.; Zhang, H.; Lee, T. S.
|
Elsevier Science B.V., Amsterdam.
|
2006
|
|
|
|
| 35 |
|
A taxonomy of network and computer attacks
|
Hansman, S.; Hunt, R.
|
Elsevier Science B.V., Amsterdam.
|
2005
|
|
|
|
| 36 |
|
A taxonomy of players and activities across the ERP project life cycle
|
Somers, T. M.; Nelson, K. G.
|
Elsevier Science B.V., Amsterdam.
|
2004
|
|
|
|
| 37 |
|
A taxonomy of self-modifying code for obfuscation
|
Mavrogiannopoulos, N.; Kisserli, N.; Preneel, B.
|
Elsevier Science B.V., Amsterdam.
|
2011
|
|
|
|
| 38 |
|
A tax savings model for the emerging global manufacturing network
|
Feng, C. M.; Wu, P. J.
|
Elsevier Science B.V., Amsterdam.
|
2009
|
|
|
|
| 39 |
|
A team level investigation of the relationship between Leader-Member Exchange (LMX) differentiation, and commitment and performance
|
Le Blanc, P. M.; Gonzalez-Roma, V.
|
Elsevier Science B.V., Amsterdam.
|
2012
|
|
|
|
| 40 |
|
A `technically level playing-field' profit efficiency analysis of enforced competition between publicly funded institutions
|
Glass, J. C.; McCallion, G.; McKillop, D. G.; Stringer, K.
|
Elsevier Science B.V., Amsterdam.
|
2006
|
|
|
|