Biblio

Export 21401 results:
2007
Kilcullen, David. "Don’t Confuse the ‘Surge’ with the Strategy." Small Wars Journal (2007).
Draft Law on the Protection of the Freedom of the Press In Bundestag print., 2007.
Daniel, Milan. The DSm Approach as a Special Case of the Dempster-Shafer Theory In Symbolic and Quantitative Approaches to Reasoning with Uncertainty. ECSQARU 2007. Lecture Notes in Computer Science. Vol. 4724. Berlin Heidelberg: Springer-Verlag, 2007.
C., Karlof, Shankar U., Tygar J.D., and Wagner D.. Dynamic Pharming Attacks and the Locked Same Origin Policies For Web Browsers In Proc. of ACM Conference on Computer and Communications Security., 2007.
Ruttor, Andreas, Wolfgang Kinzel, and Ido Kanter. "Dynamics of Neural Cryptography." Statistical, Nonlinear, and Soft Matter Physics, Physical review E 75, no. 056104 (2007).
Leskovec, Jure, Lada A. Adamic, and Bernardo A. Huberman. "The Dynamics of Viral Marketing." ACM Transactions on the Web (TWEB) 1, no. 1 (2007): 5.
Collier, Paul. "Economic Causes of Civil Conflict and Their Implications for Policy." In Leashing the Dogs of War. Washington, D.C.: USIP Press, 2007.
Paramanov, Vladimir, and Alexey Strokov. Economic Involvement of Russia and China in Central Asia. Swindon: Conflict Studies Research Centre, Defense Academy of UK, 2007.
Anderson, Ross, and Tyler Moore. "The Economics of Information Security." Science 314, no. 5799 (2007): 610-613.
Roda, M.. "Edukacja bilingwalna w Polsce na tle innych krajów Unii Europejskiej." In Nauczanie języków obcych. Polska a Europa, 51-58. Warsaw: Academica SWPS, 2007.
Donnet, LTC. "EEAW: Embryonic Component of Future European Air Combat?" Tribune (2007).
Torpy, Glenn. "Effective Air Command and Control." RUSI Defence Systems (2007): 54-56.
C., Ludl, McAllister S., Kirda E., and Kruegel C.. On the Effectiveness of Techniques to Detect Phishing Sites. Springer-Verlag, 2007.
Avanzi, Roberto, and Nicolas Theriault. "Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic." Lecture Notes in Computer Science, Arithmetic of Finite Fields (WAIFI 2007) 4547 (2007).
Kim, Jin Ki, Raj Sharman, Raghav H. Rao, and S. Upadhyaya. "Efficiency of Critical Incident Management Systems: Instrument Development and Validation." Decision Support Systems 44 (2007): 235-250.
Morselli, Carlo, Cynthia Giguère, and Katia Petit. "The efficiency/security trade-off in criminal networks." Social Networks 29, no. 1 (2007): 143-153.
Awerbuch, Simon, and Yang Spencer. "Efficient Electricity Generating Portfolios for Europe: Maximising Energy Security and Climate Change Mitigation." EIB Papers 12, no. 2 (2007): 8-37.
Saleh, Noura A., Hoda N. Boghdady, Samir I. Shaheen, and Ahmed M. Darwish. "An Efficient Lossless Data Hiding Technique for Palette-Based Images with Capacity Optimization." In 14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services. Maribor, Slovenia , 2007.
Egypt’s Sinai Question. Cairo/Brussels: International Crisis Group, 2007.
On Electronic Communications In Parliament of the Republic of Moldova., 2007.
Winbourne, Jeffrey, and Velizar Shalamanov. "Emergency Management Pillar of the Civil Security: Practical Approach." Security Issues (2007).
Emergency Preparedness of Estonia, Report of the National Audit Office to the Riigikogu. Tallinn, 2007.
Miller, Greg. "Emergency Rule in Pakistan; Pakistan’s Nuclear Arsenal a U.S. Worry." Los Angeles Times (2007): A10.
W. Curtis, John, and Dante Cichetti. "Emotion and Resilience: A Multilevel Investigation of Hemispheric Electroencephalogram Asymmetry and Emotion Regulation in Maltreated and Nonmaltreated Children." Development and Psychopathology 19, no. 3 (2007): 811-840, quote on p. 811.
Kagan, Robert. "End of Dreams, Return of History." Policy Review 143 (2007): 5.

Pages