Biblio

Export 21377 results:
2008
Blosser, Gary, and Justin Zhan. Privacy-Preserving Collaborative E-Voting In International Conference on Intelligence and Security Informatics ISI 2008: Intelligence and Security Informatics. Berlin, Heidelberg: Springer, 2008.
Elsea, Jennifer K., Mosche Schwartz, and Kennon H. Nakamura. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues In Congressional Research Service Report. Washington, D.C.: Congressional Research Service, 2008.
Shalamanov, Velizar. Production model of the armed forces In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2008.
Stojković, Dejan. "Programiranje funkcionisanja i razvoja sistema odbrane (Programming the defence system's functioning and development)." Vojno delo vol. 60, no. 2 (2008): 93-107.
Proposal for a Council Decision of 27 October 2008 on a Critical Infrastructure Warning Information Network (CIWIN). COM(2008) 676 final, 2008.
Kramer, Mark. Prospects for Islamic Radicalism and Violent Extremism in the North Caucasus and Central Asia In PONARS Eurasia Memo., 2008.
Protecting Individual Privacy in the Struggle against Terrorists: A Framework for Program Assessment. Washington, DC: National Academies Press, National Research Council, 2008.
Dang, Tran Khanh, and Nguyen Thanh Son. "Providing Query Assurance for Outsourced Tree-Indexed Data." In Modeling, Simulation and Optimization of Complex Processes. Berlin, Heidelberg: Springer, 2008.
Eronen, Oskari. PRT Models in Afghanistan. Approaches to Civil-Military Integration. Kuopio: Crisis Management Center Finland, 2008.
Harmon, Christopher. "Public Diplomacy’s Next Challenge." Connections 7, no. 1 (2008): 141-153.
Harmon, Christopher C.. "Public Diplomacy’s Next Challenge." Connections: The Quarterly Journal 7, no. 1 (2008): 141-153.
Scott, Dominic, and Mark Pyman. "Public Perceptions of Corruption in the Military in Europe and the Rest of the World." European Security 17, no. 4 (2008): 495-515.
Mearsheimer, John J.. "Pull Those Boots off the Ground." Newsweek (2008).
Lang, Jr, Anthony F.. "Punishment and peace: Critical reflections on countering terrorism." Millennium: Journal of International Studies 36, no. 3 (2008).
Putin ne zajavljal o tom, chto Ukraina ne javljaetsia gosudarstwom [Putin Did Not Claim that Ukraine Is not a State]. Segodnya.ua, 2008.
Finn, Peter. "Putin Threatens Ukraine On NATO." Washington Post (2008).
Wang, Bo, and Matt Mutka. "QoS-aware Fair Rate Allocation in Wireless Mesh Networks." Computer Communications 31, no. 7 (2008).
da Silva, Ana Paula Cout, Gerardo Rubino, Rosa M. M. Leão, Edmundo de Souza e Silva, and Martín Varela. "Quality Assessment of Interactive Voice Applications." Computer Networks: The International Journal of Computer and Telecommunications Networking 52, no. 6 (2008): 1179-92.
Vatsa, Mayank. Quality induced secure multiclassifier fingerprint verification using extended feature set. Vol. Doctoral Dissertation. Morgantown, WV, USA: West Virginia University, 2008.
Raza, Muhammad, Farookh Khadeer Hussain, and Elizabeth Chang. "Quality Measures for Digital Business Ecosystems Formation." In International Conference on IT Revolutions., 2008.
Jolicoeur, Pierre. "Qui reconnaît l’indépendance du Kosovo doit en assumer les conséquences." Points de Mire 9, no. 4 (2008).
Berizzi, F.. A Range Profiling Technique for Synthetic Wideband Radar In IET-RSN., 2008.
Marsh, David. Raport ewaluacyjny. Edukacja dwujęzyczna w Polsce. Praktyka w wybranych szkołach. Warsaw: CODN, 2008.
Lyne, Roderic. Reading Russia, Rewiring the West. opendemocracy.net, 2008.
Lowenthal, Mark. "The Real Intelligence Failure? Spineless Spies." Washington Post (2008).

Pages