Biblio

Export 21340 results:
1998
Buzan, Barry, Ole Wæver, and Jaap de Wilde. Security. A New Framework of Analysis. Boulder: Lynne Rienner, 1998.
Tursunov, Bakhrom. “Security and Stability in Uzbekistan: Challenges, Threats and Solutions. Partnership for Peace Information Systems Conict Studies Research Center, 1998.
Linde, Andrei. "The Self – Reproducing Inflationary Universe." Scientific American Presents 9, no. 1 (1998).
Jensen, Henrik J.. Self-Organised Criticality . Cambridge, UK: Cambridge University Press, 1998.
Altmann, Jurgen, Horst Fisher, and Henny van der Graaf. "Sensors For Peace: Applications, Systems And Legal Requirements For Monitoring In Peace Operations." New York: United Nations Publication (1998).
Ju, Shy-Ming. An SGML-Based Office Document Exchange and Management In SGML/XML Europe’98 . Paris, France, 1998.
Penev, Valentine. "Simulation Modeling in Military Affairs: Status and Perspectives." Information & Security: An International Journal 1, no. 1 (1998): 91-102.
Götschel, Laurent. Small States Inside and Outside the European Union: Interests and Policies. Boston, MA: Kluwer Academic Publishers, 1998.
Yang, Chung-Huang, Shy-Ming Ju, and T.R.N. Rao. A Smartcard-Based Framework for Secure Document Exchange In IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology. Washington D.C., USA, 1998.
Huntington, Samuel. The Soldier and the State. Sofia: Military Publishing House, 1998.
Zadeh, Lotfi A.. "Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems." Soft Computing 2 (1998): 23-25.
Klein, Gary A.. Sources of Power: How People Make Decisions . Cambridge, MA: The MIT Press, 1998, 1998.
Firth, Noel E., and James H. Noren. Soviet Defense Spending: A History of CIA Estimates, 1950-1990. College Station, TX: Texas A&M University Press, 1998.
Pantel, Patrick, and Dekang Lin. SpamCop: A Spam Classification & Organisation Program In AAAI-98 Workshop on Learning for Text Categorization. Madison, Wisconsin, 1998.
Walker, Robert. Spec Fi: The United States Marine Corps and Special operations. Vol. Master of Science. Monterey, CA, USA: Naval Postgraduate School, 1998.
Gabriole, Zeviar-Geese. "The State of the Law on Cyber Jurisdiction and Cybercrime on the Internet." Gonzaga Journal of International Law, no. 1 (1998).
Jupille, Joseph, and James A. Caporaso. "States, Agency and Rules: The European Union in Global Environment Politics." In The European Union in the World Community, 213-229. Boulder, CO: Lynne Rienner, 1998.
The Strategic Defence Review–1998. London: Ministry of Defence, 1998.
Bailey, Norman A.. The Strategic Plan That Won the Cold War: National Security Decision Directive 75. MacLean, VA: The Potomac Foundation, 1998.
Ryan, Julie J. C. H.. "Student Plagiarism in an On-line World." ASEE Prism Magazine (1998).
Wing, Jeannette M.. A Symbiotic Relationship Between Formal Methods and Security In Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings. IEEE, 1998.
Mepham, Simon. Synthetic Environments – Delivering Real Benefits to UK Defence In SimTecT. Adelaide, Australia, 1998.
Breu, R., R. Grosu, F. Huber, B. Rumpe, and W. Schwerin. "Systems, Views and Models of UML." In The Unified Modeling Language, Technical Aspects and Applications, 3-8. Heidelberg: Physica Verlag, 1998.
Semerdjiev, Tzvetan, Vesselin Jilkov, and Donka Angelova. Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
Kuchma, Leonid. "This can’t go on (Це не може продовжуватись)." Uriadovyi kur’er (1998): 4.

Pages