Found 16247 results
Zadeh, Lotfi A.. "Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems." Soft Computing 2 (1998): 23-25.
Klein, Gary A.. Sources of Power: How People Make Decisions . Cambridge, MA: The MIT Press, 1998, 1998.
Firth, Noel E., and James H. Noren. Soviet Defense Spending: A History of CIA Estimates, 1950-1990. College Station, TX: Texas A&M University Press, 1998.
Pantel, Patrick, and Dekang Lin. SpamCop: A Spam Classification & Organisation Program In AAAI-98 Workshop on Learning for Text Categorization. Madison, Wisconsin, 1998.
Walker, Robert. Spec Fi: The United States Marine Corps and Special operations. Vol. Master of Science. Monterey, CA, USA: Naval Postgraduate School, 1998.
Gabriole, Zeviar-Geese. "The State of the Law on Cyber Jurisdiction and Cybercrime on the Internet." Gonzaga Journal of International Law, no. 1 (1998).
Jupille, Joseph, and James A. Caporaso. "States, Agency and Rules: The European Union in Global Environment Politics." In The European Union in the World Community, 213-229. Boulder, CO: Lynne Rienner, 1998.
The Strategic Defence Review–1998. London: Ministry of Defence, 1998.
Bailey, Norman A.. The Strategic Plan That Won the Cold War: National Security Decision Directive 75. MacLean, VA: The Potomac Foundation, 1998.
Ryan, Julie J. C. H.. "Student Plagiarism in an On-line World." ASEE Prism Magazine (1998).
Wing, Jeannette M.. A Symbiotic Relationship Between Formal Methods and Security In Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings. IEEE, 1998.
Mepham, Simon. Synthetic Environments – Delivering Real Benefits to UK Defence In SimTecT. Adelaide, Australia, 1998.
Semerdjiev, Tzvetan, Vesselin Jilkov, and Donka Angelova. Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
Kuchma, Leonid. "This can’t go on (Це не може продовжуватись)." Uriadovyi kur’er (1998): 4.
Tagarev, Todor, and I&S Monitor. "Timothy Thomas on the Key Elements of the Russian Approach to IW." Information & Security: An International Journal 1, no. 2 (1998): 75-92.
Sidor, David J.. "TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow." IEEE Communications Magazine (1998): 54-64.
Holbrooke, Richard. To end a War. New York, NY: Modern Library, Random House, 1998.
Bass, Bernard M.. Transformational Leadership: Industrial, Military, and Educational Impact. Mahwah, New Jersey: Erlbaum, 1998.
Gunaratna, Rohan. "Trends in Maritime Terrorism: The Sri Lankan Case ." Lanka Outlook (1998).
Boese, Wade. UN Security Council Approves Arms Embargo on Yugoslavia., 1998.
O’Leary, Daniel E.. "Using AI in Knowledge Management: Knowledge Bases and Ontologies." IEEE Intelligent Systems 13, no. 3 (1998): 34-39.
McElroy, Debbie, and Efraim Turban. "Using Smart Cards in Electronic Commerce." International Journal of Information Management 18, no. 1 (1998): 61-72.
Soloway, Elliot, and Cathleen A. Norris. "Using Technology to Address Old Problems in New Ways." Communications of the ACM 41, no. 8 (1998): 11-18.
Karimov, Islam. Uzbekistan on the Threshold of the Twenty-first Century. New York: St. Martin’s Press, 1998.
Clary, Gil, Mark Snyder, and Arthur A. Stukas. "Volunteer motivations, Findings from a national survey." Nonprofit and Voluntary Sector Quarterly 25, no. 4 (1998): 485-505.