Biblio

Export 21401 results:
1999
Hwang, Min-Shiang. "Cryptanalysis of a Remote Login Authentication Scheme." Computer Communications 22 (1999): 742-744.
Krulak, Gen. C. C.. "Cultivating Intuitive Decision-making." Marine Corps Gazette (1999).
Gordy, Eric D.. The Culture of Power in Serbia: Nationalism and the Destruction of Alternatives. University Park, PA: Penn State University Press, 1999.
Brewin, Bob. "Cyberattacks Against NATO Traced to China." Federal Computer Week (1999).
Sharp, Walter Gary. Cyberspace and the Use of Force . Falls Church, VA: Aegis Research Corporation, 1999.
le Nobel, Johan J. Ingles-. "Cyberterrorism Hype." Jane’s Intelligence Review (1999).
Vistica, Gregory L.. "Cyberwar and Sabotage." Newsweek (1999).
Lyotard, Jean-Francois. Das postmoderne Wissen. Passagen., 1999.
Hieb, Michael R., and James Blalock. Data Alignment between Army C4I Databases and Army Simulations In Spring Simulation Interoperability Workshop. Orlando, Florida, 1999.
Kurz, A.. Data Warehousing: Enabling Technology. Bonn: MITP-Verlag, 1999.
Mandel, Robert. Deadly Transfers and the Global Playground: Transnational Security Threats in a Disorderly World . London: Praeger Publishers, 1999.
Declaration of the Government of the Russian Federation pertaining to the situation in the Chechen Republic and to regulative measures., 1999.
O’Halpin, Eunan. Defending Ireland: The Irish State and Its Enemies since 1922. Oxford: Oxford University Press, 1999.
Calder, R. B., J. Drummey, and F. Chamberlain. Definition of a Military Intelligent Agent Architecture In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Connell, Robert W.. Der gemachte Mann. Konstruktion und Krise von Männlichkeiten. Opladen: Leske & Budrich, 1999.
Blackman, Samuel S., and Robert Populi. Design and Analysis of Modern Tracking Systems. Norwood, MA: Artech House, 1999.
Ćosić, Krešimir, Todor Kostic, Miroslav Slamić, Mario Volarevic, and Ivica Kopriva. "Design and Implementation of a Hardware-in-the-Loop Simulator for a Semi-Automatic Guided Missile System." Journal Simulation Practice & Theory 7, no. 2 (1999): 107-123.
Courtemanche, Anthony J.. Design Patterns for Computer Generated Forces In Eighth Conference on Computer Generated Forces and Behavioral Representation . Orlando FL, 1999.
Gordon, Judith. "Designing a Distance Education Program for English for Special Purposes (ESP)." TESOL Matters 9, no. 2 (1999).
Mihaylova, Ludmila, Emil Semerdjiev, and X. Rong-Li. Detection and Localization of Faults in System Dynamics by IMM Estimator In 2nd Intern. Conf. on Multisource-Multisensor Information Fusion (Fusion’ 99). Sunnyvale, California, 1999.
Sen, Amartya. Development as Freedom. Oxford: Oxford University Press, 1999.
Gabriel, Jürg Martin. "Die Gegenläufigkeit von Neutralität und Humanitären Interventionen." In Zürich: Center for Security Studies, Swiss Federal Institute of Technology., 1999.
Greven, Michael Th.. Die politische Gesellschaft. Kontingenz und Dezision als Probleme des Regierens und der Demokratie. Opladen: Leske & Budrich, 1999.
Kocher, Paul, Joshua Jaffe, and Bejamin Jun. Differential Power Analysis In Proceedings of Advances in Cryptology: CRYPTO’99., 1999.
Busch, Christoph, Wolfgang Funk, and Stephen Wolthusen. "Digital Watermarking From Concepts to Real-Time Video Applications." IEEE Computer Graphics and Applications 19, no. 1 (1999).

Pages