Biblio
Export 8062 results:
International Relations: One World, Many Theories." Foreign Policy (1998): 38.
"Internet Besieged: Countering Cyberspace ScofflFaws. ACM Press, Addison Wesley Professional, 1998.
Introduction to the Theory of Error-Correcting Codes. Third ed. New York, NY: Wiley, 1998.
Introductory to the Electronic/Networked Government Program. Research Development and Evaluation Commission of the Executive Yuan, 1998.
Ireland and the Partnership for Peace Initiative: Our Place in the New European Security Architecture. Dublin: Fine Gael, 1998.
Islamic Fundamentalism. Westport, CT: Greenwood Press, 1998.
Legitimacy and the Rise and Fall of Yugoslavia. London: McMillan, 1998.
Les Transformations des Relations entre l’État et les Producteurs d’Armement: le Cas de GIAT-Industries." In État et Firmes d’Armement en Europe, 107-16. Vol. 22. Paris: CIRPES, Collection Cahier d’Études Stratégiques, 1998.
"Liberalism and Multiculturalism: The Politics of Indifference." Political Theory 26, no. 5 (1998): 686-699.
"Little guys still say NO to the net." Business Week (1998): 134.
"The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice." In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. Washington D.C.: Woodrow Wilson Center Press and Johns Hopkins, 1998.
"Maneuvering Ship Model Identification and IMM Tracking Algorithm Design In First International Conference on Multisource-Multisensor Information Fusion’98. Las Vegas, Nevada, 1998.
Methodologies for ontology development In IT&KNOWS - Information Technology and Knowledge Systems, 15th IFIP World Computer Congress. Vienna, Austria, and Budapest, Hungary, 1998.
Methodology for Safety Case Development In Sixth Safety-critical Systems Symposium, Birmingham., 1998.
Methodology for Safety Case Development In Sixth Safety-critical Systems Symposium. Birmingham, UK, 1998.
Military and Society in the Former Soviet Bloc . Boulder: Westview Press, 1998.
Military Reform in Russia: Dilemmas, Obstacles, and Prospects." International Security 22, no. 4 (1998): 83.
"Military Simulation." In Handbook of Simulation: Principles, Methodology, Advances, Applications, and Practice, edited by Jerry Banks. Engineering & Management Press and John Wiley & Sons, Inc, 1998.
"Mobility and Security Management in the GSM System and Some Proposed Future Improvement In IEEE. Vol. 7. 86 7., 1998.
A model of attacks malicious hosts against mobile agents In 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations ., 1998.
Modeling Human and Organizational Behavior: Application to Military Simulations. Washington, D.C.: National Academy Press, 1998.
Modeling Large Forest Fires as Extreme Events." Northwest Science 72 (1998): 66-75.
"Modeling of a GSM-Based Mobile Telemedical System In Conference of the IEEE Engineering in Medical and Biology . Hong Kong, 1998.
Страници
- « първа
- ‹ предишна
- …
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- …
- следваща ›
- последна »