Biblio

Found 15292 results
1987
Reid, Clifford. "Reflexive Control in Soviet Military Planning." In Soviet Strategic Deception, edited by Brian Daily and Patrick Parker, 293-311. Lexington, Mass.: Lexington Books, 1987.
Johnson, Thomas H., and Robert S. Kaplan. Relevance Lost: The Rise and Fall of Management Accounting. Boston: Harvard Business School Press, 1987.
Jonker, Roy, and Ton Volgenant. "A Shortest Augmenting Path Algorithm for Dense and Sparse Assignment Problems." Computing 38 (1987): 325-340.
Chaum, David. "Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Großen Bruder der Vergangenheit angehören lassen - Zur Diskussion gestellt." Informatik-Spektrum 10, no. 5 (1987): 262-277.
Elfes, A.. "Sonar-based real-world mapping and navigation." IEEE Journal of Robotics Automat. 3 (1987): 249-265.
Buzan, Barry. Strategic Studies: Military Technology & International Relations. New York: St. Martin’s Press, 1987.
Sartori, Giovanni. The Theory of Democracy Revisited . Chatham, NJ: Chatham House Publishers, 1987.
Lawless, Richard, and Laila Monahan. War and Refugees: The Western Sahara Conflict. London and New York: Pinter Publishers, 1987.
Elshtain, Jean Bethke. Women and War. New York: Basic Books,, 1987.
1986
Sage, Andrew P., and William B. Rouse. "Aiding the Decision-Maker through the Knowledge-Based Sciences." IEEE SMC 16, no. 4 (1986).
Dean, David J.. The Air Force Role in Low-intensity Conflict. Maxwell Air Force Base, AL: Air University Press, 1986.
Dobson, John E., and Brian Randell. Building Reliable Secure Computing Systems out of Unreliable Insecure Components In IEEE Symposium on Security and Privacy . Oakland, California, USA, 1986.
Holden, Arun V.. Chaos Non-Linear Science; Theory and Applications. Manchester, UK: Manchester University Press, 1986.
Shafer, G.. "The Combination of Evidence." International Journal of Intelligent Systems (1986): 155-179.
Shafer, G.. "The Combination of Evidence." International Journal of Intelligent Systems 1 (1986): 155-179.
Canny, John. "A Computational Approach to Edge Detection." IEEE Transactions on Pattern Analysis and Machine Intelligence 8, no. 6 (1986): 679-714.
Convention on Assistance in Case of a Nuclear Accident or Radiological Emergency., 1986.
Convention on Early Notification of a Nuclear Accident., 1986.
Waltz, Edward L., and Dennis M. Buede. "Data Fusion and Decision Support for Command and Control." In IEEE Transactions on Systems, Man, and Cybernetics , 865-879. Vol. 6., 1986.
Hopple, G.W.. "Decision Aiding Dangers: The Law of the Hammer and Other Maxims." IEEE Transactions on Systems, Man and Cybernetics SMC 16, no. 6 (1986): 948-963.
Jenkins, Brian M.. "Defense Against Terrorism." Political Science Quarterly 101, no. 5 (1986): 778.
Avizienis, Algirdas, and Jean-Claude Laprie. "Dependable Computing: From Concepts to Design Diversity." Proceeding of the IEEE 74 (1986).
Roberts, Fred. Discrete Mathematical Models with Applications to Social, Biological and Ecological Problems. Moscow: Science, 1986.
Benaloh, Josh C., and Moti Yung. Distributing the Power of a Government to Enhance the Privacy of Voters In 5th Annual ACM Symposium on Principles of Distributed Computing (PODC) (Calgary, Alberta, Canada). New York, USA: ACM, 1986.
Lesh, S.A.. An Evidential Theory Approach to Judgment-Based Decision Making. Durham, NC: Dept. of Forestry and Environmental Studies, Duke University, 1986.

Pages