Share documents with other members and the general public.
Members can add to the repository via the dashboard.
Close Menu
Share documents with other members and the general public.
Members can add to the repository via the dashboard.
Title | Author | Published | Rev | |
---|---|---|---|---|
Why do simple combat models favour the attacker? | Dr Paul Syms | 14/09/2007 | 1.0 | |
When to use Virtual Hold Technology in Call Centre Operations | Dave Worthington & Chris Kirkbride, Lancaster University | 24/09/2012 | 1.0 | |
What's so special about the Third Sector | Ruth Kaufman | 20/10/2014 | 1.0 | |
What-if? analysis for lifecycle asset management planning | Dr Crispin Allard | 15/10/2004 | 1.0 | |
What UK managers think about knowledge management | Prof John Edwards | 19/08/2002 | 1.0 | |
What organisations who've received Pro Bono O.R. have to say | Felicity McLeister | 19/02/2014 | 1.0 | |
What is strategy? What role can OR people play in strategy? | Dick Martin | 06/12/2001 | 1.0 | |
What is Linear Programming? | Louise Maynard-Atem | 23/01/2014 | 1.0 | |
What is Big Data? | Louise Maynard-Atem | 23/12/2013 | 1.0 | |
What are meta-heuristic algorithms? | Louise Maynard-Atem | 23/04/2014 | 1.0 |