Biblio
Export 21402 results:
The state is not going to be a donor to corrupt thieves (Держава не буде донором для корумпованих злодіїв)." Pravitel’stvennyi kur’er (1999): 3-4.
" "Statement by the Hon. Ron Paul (R-Texas) to Congress." In Congressional Record 1999., 1999.
States, Sovereignty, and Diplomacy in the Information Age." Virtual Diplomacy Series (1999).
" The Strategic Corporal: Leadership in the Three Block War." Marines Magazine 2, no. 8 (1999).
"Strategic Human Resource Development. Harlow: Pearson Education Limited, 1999.
Strategic modelling for enterprise integration In 14th World Congress of the International Federation of Automatic Control. Beijing, China: IFAC, 1999.
The Structural Analysis of Criminal Networks." In The Social Psychology of Crime: Groups, Teams and Networks. Aldershot, UK: Ashgate Publishing, 1999.
"Subversive Institutions: The Design and the Destruction of Socialism and the State. Cambridge: Cambridge University Press, 1999.
The supervisor-worker pattern In Pattern Languages of Programs PLoP'99. Kubova Hut, Czech Republic, 1999.
Support for Peacekeeping in Lebanon and Somalia: Assessing the Casualties Hypothesis." Political Science Quarterly 114, no. 1 (1999).
"Swarming and the Future of Conflict. Rand Corporation, National Defense Research Institute, 1999.
Taking Aim at Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine." Maryland Journal of International Law and Trade 22 (1999).
"Telemedicine – The New Must for Surgery." Archives of Surgery 134 (1999): 1216-1221.
"Temeljni pojmovi i teorijske perspektive meðunarodnih odnosa . Osijek- Zagreb-Split: Pan-Liber, 1999.
A Terrain Reasoning Algorithm for Defending a Fire Zone." Information & Security: An International Journal 3 (1999): 56-75.
"Textbooks: The Pendulum of ‘Loading’ and ‘Disarming’ History: The Southeastern European Test Case." In Disarming History. International Conference on Combating Stereotypes and Prejudice in History Textbooks of Southeast Europe, 23-27. Stockholm: Nykopia Tryck AB, 1999.
"That ‘Internet of Things’ Thing." RFID Journal (1999).
"Threshold Proxy Signatures." IEE Proceedings- Computers and Digital Techniques 146, no. 5 (1999): 259-263.
"Time-Stamp Proxy Signature with Traceable Receivers In 9th National Conference on Information Security. Taiwan, 1999.
Totalitarian Sects in Russia." Observer 5 (1999).
"Tracking Filters for Radar Systems with Correlated Measurement Noise." Information & Security: An International Journal 2 (1999): 90-101.
"Traditional Russian Security Interests in the Caucasus and Central Asia. Perceptions and Realities." In Russia, the Caucasus, and Central Asia. The 21st Century Security Environment, edited by Rajan Menon, Yuri E. Fedorov and Ghia Nodia. New York: M. E. Sharpe, East West Institute, 1999.
"