Biblio

Export 21337 results:
2005
Kaldas, Kai-Helin. The Evolution of Estonian Security Options During the 1990s In Athena Papers. Vol. 4. Garmisch-Partenkirchen: Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2005.
Regelsberger, E., and WOLFGANG WESSELS. The Evolution of the Common Foreign and Security Policy. A case of an Imperfect Ratchet Fusion., 2005.
Yang, Ang, Hussein A. Abbass, and Ruhul Sarker. Evolving agents for network centric warfar In GECCO '05 Proceedings of the 7th annual workshop on Genetic and evolutionary computation. New York, NY, USA ©2005: ACM , 2005.
Awerbuch, Shimon, and Raphael Sauter. Exploiting the Oil-GDP Effect to Support Renewables Development In SPRU Electronic Working Paper. University of Sussex: The Freeman Centre, 2005.
Hoffman, Lance, Timothy Rosenberg, Ronald Dodge, and Daniel Ragsdale. "Exploring a national cybersecurity exercise for universities." IEEE Security and privacy 3, no. 5 (2005): 27-33.
Gardner, Phil, Michael George, Vera Lev, and Sandra McMahon. Extension of the START Treaty? In SAIC Emerging Issues Project., 2005.
Wang, Zhenzi, Zhi-Qiang Liu, and Steve Fore. "Facing the Challenge: Chinese Television in the New Media Era." Media International Australia 114, no. 1 (2005): 135-146.
Hamilton, Daniel, and Tara O’Toole. "Facing up to the Bioterror Threat." International Herald Tribune (2005).
Factbox: North European Gas Pipeline. Ria Novosti, 2005.
Fact-finding report on the Salwa Judum, Dantewara District In Press release. Raipur, 2005.
Kramer, Roderick M.. "A Failure to Communicate: 9/11 and the Tragedy of the Informational Commons." International Public Management Journal 8, no. 3 (2005): 408-9.
Jian, Ningsheng, Wei Hu, Gong Cheng, and Yuzhong Qu. Falcon-AO: Aligning Ontologies with Falcon In K-CAP 2005 Workshop on Integrating Ontologies . Banff, Canada, 2005.
Gerges, Fawaz. The Far Enemy: Why Jihad Went Global. Cambridge: Cambridge University Press, 2005.
Hong, Y.S., and H.W. Goo. "A fault-tolerant scheduling scheme for hybrid tasks in distributed real-time systems." In Third IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS'05). Seattle, WA, USA, 2005.
Fence to Protect Red Sea Resort. BBC News, 2005.
Wu, Ji, Chaoqun Ye, and Shiyao Jin. "FFCAS: A Flexible Agent-Based Simulation Framework for Complex Adaptive Systems." In Artificial Intelligence Applications and Innovations. US: Springer US, 2005.
"Fifth Anniversary of Arms Destruction Trust Fund." NATO News (2005).
Köhler, Lothar. "Fighting Human Trafficking in Bavaria." Connections: The Quarterly Journal 4, no. 4 (2005): 73-79.
Baran, Zeyno. "Fighting the War of Ideas." Foreign Affairs 84, no. 6 (2005).
Final Communiqué. Brussels: North Atlantic Council, NATO, 2005.
Henderson, Martha, Kostas Kalabokidis, Emmanuel Marmaras, Pavlos S. Kanaroglou, and Manussos Marangudakis. "Fire and Society: A Comparative Analysis of Wildfire in Greece and the United States." Human Ecology Review 12, no. 2 (2005): 169-182.
Schroen, Gary C.. First In: An Insider’s Account of How the CIA Spearheaded the War on Terror in Afghanistan. Novato, CA: Presidio Press, 2005.
Shangwu, Sun, and Wu Zhiyi. "First Joint Drill with Russia Launched." China Daily (2005).
McCormick, John. "Five Reasons You’re not Secure." (2005).
Thieken, Annegret H., Meike Miller, Heidi Kreibich, and Bruno Merz. "Flood damage and influencing factors: New insights from the August 2002 flood in Germany." Water Resources Research 41, no. 12 (2005).

Pages