Biblio
Export 21404 results:
Sovereigns Beyond the State: On Legality and Authority in Urban India." In Sovereign Bodies: Citizens, Migrants, and States in the Postcolonial World, 169-91. Princeton, New Jersey: Princeton University Press, 2005.
"Sovereignty and Territorial Borders in a Global Age." International Studies Review 7, no. 1 (2005): 1-20.
"The Soviet Legacy: Transforming Bulgaria’s Armed Forces for Homeland Security Missions." Connections: The Quarterly Journal 4, no. 3 (2005): 83-95.
"Spatio-Temporal Data Visualization and Analysis for Multi-Target Tracking In Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management. Том 198 от Elisa Shahbazian,Galina Rogova, Pierre Valin ed., 2005.
Spatio-Temporal Data Visualization and Analysis for Multi-Target Tracking." In NATO SCIENCE SERIES SUB SERIES III COMPUTER AND SYSTEMS SCIENCES 198 ., 2005.
"Special Session on Watermarking Security." In Security, Steganography, and Watermarking of Multimedia Contents VII, of Proceedings of SPIE-IS&T Electronic Imaging, 685-768. Vol. 5681. San Jose, CA: SPIE, 2005.
"Specialization in Defence Forces." Defence and Peace Economics 16 (2005): 191-204.
"Specification and Design of Advanced Authentication Authorization Services." Computer Standards and Interfaces 27 (2005): 467-78.
" STOPWATCH 2, Bridging the Mediterranean In Special Interactive Video Forum series ., 2005.
The Straits of Malacca: The Rise of China, America’s Intentions and the Dilemma of the Littoral States. Maritime Institute of Malaysia online articles, 2005.
Strange Attractors and Human Interaction: Leading Complex Organizations through the Use of Metaphors." Complicity: An International Journal of Complexity and Education 2, no. 1 (2005): 55-69.
"Strategic Communication: A Mandate for the United States." Joint Force Quarterly, no. 39 (2005).
"Strategic Power Infrastructure Defense In IEEE ., 2005.
Strengthening Black Sea Security . Sofia, 2005.
Stretched Thin: Army Forces for Sustained Operations. Santa Monica, CA: Rand Corporation, 2005.
Strong passwords. Microsoft Technet Library, 2005.
Studies on Proxy Signatures with/without Proactive Property In Department of Computer Science, College of Computer Science . Vol. Doctor of Philosophy in Computer Science. HsinChu, Taiwan, Republic of China: National Chiao Tung University, 2005.
A Survey of Data Provenance in e-Science." ACM SIGMOD 34, no. 3 (2005): 31-36.
"A Survey of Lebanese Shi’i attitudes towards Hezbollah." Small Wars and Insurgencies 16, no. 3 (2005): 317-333.
"The Sustainability Effect: Rethinking Corporate Reputation in the 21st Century. New York: Palgrave Macmillan, 2005.
Synergetycheskoe metodы upravlenyja slozhnыmy systemamy: teoryja systemnogo synteza. Moscow: Edytoral URSS, 2005.
Syria and Lebanon: A Brotherhood Transformed In Middle East Research and Information Project., 2005.
The System Made Me Do It: Corruption in Post-Communist Societies. Armonk, NY: M. E. Sharpe, 2005.