Biblio

Export 21376 results:
1999
Au, T.A.. A primer of CORBA: A framework for distribution applications in defence In Technical report. Salisbury, Australia: DSTO Electronics and Surveillance Research Lab, 1999.
Shalamanov, Velizar. "Priorities of Bulgarian Defense Policy and Planning." Security Policy 2 (1999): 3-21.
Singleton, Solveig. Privacy and Human Rights: Comparing the United States to Europe In Cato Institute White Paper., 1999.
Conference, Wilton Park. "The Privatisation of Security: Framing a Conflict Prevention and Peacebuilding Policy Agenda." International Alert (1999).
Pitt, Jeremy, and Fabio Bellifemine. A protocol-based semantics for FIPA’97 acl and its implementation in Jade In AI*IA ., 1999.
Provisional Assessment of Civilian Casualties and Destruction in the Territory of the FRY from 24 March to 8 June 1999. Ministry of Foreign Affairs, Yugoslavia, 1999.
La Porta, R.. "The quality of government." Journal of Law, Economics, and organization 15, no. 1 (1999): 222-279.
Shelton, Charlotte. Quantum Leaps: 7 Skills for Workplace Recreation. Boston, MA.: Butterworth-Heinemann, 1999.
Weller, Marc. "The Rambouillet Conference on Kosovo." International Affairs 75, no. 2 (1999): 216.
Caldor, Mary. "Razboaie noi si vechi (New and Old Wars)." Antet (1999): 117-127.
Card, Stuart K., Jock D. Mackinlay, and Ben Shneiderman. Readings in Information Visualization Using Vision to Think . San Francisco, CA: Morgan Kaufmann Publishers Inc., 1999)., 1999.
Jervis, Robert. "Realism, Neo-liberalism and Cooperation: Understanding the Debate." International Security 24, no. 1 (1999): 42-63.
Lipson, Michael. "The Reincarnation of COCOM: Explaining Post-Cold War Export Controls." The Non-Proliferation Review (1999): 33-51.
Smith, Gordon. "Reinventing Diplomacy: A Virtual Necessity." Virtual Diplomacy Series (1999).
Sun, Hung-Min, and B.-T. Hsieh. Remark on Two Nonrepudiable Proxy Signature Schemes In 9th National Conference on Information Security. Taiwan, 1999.
Remarks by the President at the Close of the Washington Summit. USIS Washington File, 1999.
Tan, Kaijun, and Hongwen Zhu. "Remote Password Authentication Scheme Based on Cross-Product." Computer Communications 22, no. 4 (1999): 390-393.
Gross, David. Report from the Fidelity Implementation Study Group In Spring Simulation Interoperability Workshop., 1999.
Carlsson, Ingvar, Han Sung-Joo, and M. Kupolati. Report of the Independent Inquiry into United Nations Actions during the 1994 Rwanda Genocide., 1999.
Report of the Secretary-General pursuant to General Assembly Resolution 53/35. New York: United Nations, Office of United Nations Secretary-General, 1999.
Resolution 1244 (1999). Security Council , 1999.
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies (1999).
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper." Journal of Conflict Studies 19 (1999).
Sapolsky, Harvey, and Eugene Gholz. "Restructuring the U.S. Defense Industry." International Security 24, no. 3 (1999): 5.
Tyshchenko, Iu., and V. Pikhovshek. Return of the Crimean Tartars: a Chronicle of Events (Повернення кримських татар: хроніка подій). Kyiv, 1999.

Pages