Biblio
Export 21441 results:
Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
This can’t go on (Це не може продовжуватись)." Uriadovyi kur’er (1998): 4.
"Timothy Thomas on the Key Elements of the Russian Approach to IW." Information & Security: An International Journal 1, no. 2 (1998): 75-92.
"TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow." IEEE Communications Magazine (1998): 54-64.
"To end a War. New York, NY: Modern Library, Random House, 1998.
Transformational Leadership: Industrial, Military, and Educational Impact. Mahwah, New Jersey: Erlbaum, 1998.
Trends in Maritime Terrorism: The Sri Lankan Case ." Lanka Outlook (1998).
" Using AI in Knowledge Management: Knowledge Bases and Ontologies." IEEE Intelligent Systems 13, no. 3 (1998): 34-39.
"Using Smart Cards in Electronic Commerce." International Journal of Information Management 18, no. 1 (1998): 61-72.
"Using Technology to Address Old Problems in New Ways." Communications of the ACM 41, no. 8 (1998): 11-18.
"Uzbekistan on the Threshold of the Twenty-first Century. New York: St. Martin’s Press, 1998.
Volunteer motivations, Findings from a national survey." Nonprofit and Voluntary Sector Quarterly 25, no. 4 (1998): 485-505.
"The war for control of information." Information & Security: An International Journal 1, no. 2 (1998): 105-108.
"The Warrior’s Honor: Ethnic War and the Modern Conscience. New York: Metropolitan Books, 1998.
Wassenaar Controls, Cyber-Crime and Information Terrorism, Cyber Rights and Cyber Liberties (UK)., 1998.
Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications." IEEE Journal on Selected Areas in Communications 16 (1998): 551-560.
"Web-Based Enterprize Management Architecture." EEE Communications Magazine (1998): 80-86.
"What Is A Disaster? Perspectives on the Question." Routledge: London and New York (1998): 228.
"What is the Offense-Defense Balance?" International Security 22 (1998): 44-82.
"What’s the Proper Role for the CIO?" Management Review 77, no. 3 (1998): 53-54.
"When Does an Act of Information Warfare Become an Act of War? Ambiguity in Perception In U.S. Army War College Strategy Research Project., 1998.
The Women of Afghanistan. Islamabad: Office of the U.N. Coordinator for Afghanistan, 1998.
The XML Handbook . Englewood Cliffs: Prentice-Hall, 1998.
Zusterkorpsen van de Koninklijke Marechaussee." Armex (1998): 22-25.
"