Biblio

Export 21401 results:
1998
"Joint Declaration Issued at the British-French Summit." Saint Malo, France, 1998.
Joint Statement on Common Security Challenges at the Threshold of the Twenty-First Century., 1998.
Lacharite, Gretchen. "Kasi Gets Death in CIA Killings." Washington Times (1998).
Bricault, Dennis. Legal Aspects of Academic Dishonesty: Policies, Perceptions, and Realities., 1998.
Williams, John. Legitimacy and the Rise and Fall of Yugoslavia. London: McMillan, 1998.
Barnier, Frédérique. "Les Transformations des Relations entre l’État et les Producteurs d’Armement: le Cas de GIAT-Industries." In État et Firmes d’Armement en Europe, 107-16. Vol. 22. Paris: CIRPES, Collection Cahier d’Études Stratégiques, 1998.
Wentz, Larry. Lessons From Bosnia: The IFOR Experience. Washington, D.C.: Department of Defense Command and Control Research Program, 1998.
Eckes, Thomas, and Iris Six-Materna. "Leugnung von Diskriminierung: Eine Skala zur Erfassung des modernen Sexismus." Zeitschrift für Sozialpsychologie 29, no. 3 (1998): 224-238.
Kukathas, Chandran. "Liberalism and Multiculturalism: The Politics of Indifference." Political Theory 26, no. 5 (1998): 686-699.
Todorov, Andrey, Velizar Shalamanov, and Todor Tagarev. "Library Update." Information & Security: An International Journal 1, no. 2 (1998): 109-113.
Judge, P.. "Little guys still say NO to the net." Business Week (1998): 134.
Crenshaw, Martha. "The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice." In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. Washington D.C.: Woodrow Wilson Center Press and Johns Hopkins, 1998.
Semerdjiev, Emil, Tzvetan Semerdjiev, and Ludmila Mihaylova. Maneuvering Ship Model Identification and IMM Tracking Algorithm Design In First International Conference on Multisource-Multisensor Information Fusion’98. Las Vegas, Nevada, 1998.
Jones, D., T. Bench-Capon, and P. Visser. Methodologies for ontology development In IT&KNOWS - Information Technology and Knowledge Systems, 15th IFIP World Computer Congress. Vienna, Austria, and Budapest, Hungary, 1998.
Bishop, Peter, and Robin Bloomfield. Methodology for Safety Case Development In Sixth Safety-critical Systems Symposium, Birmingham., 1998.
Bishop, Peter, and Robin Bloomfield. Methodology for Safety Case Development In Sixth Safety-critical Systems Symposium. Birmingham, UK, 1998.
Danopoulos, Constantine, and Daniel Zirker. Military and Society in the Former Soviet Bloc . Boulder: Westview Press, 1998.
Arbatov, Alexei G.. "Military Reform in Russia: Dilemmas, Obstacles, and Prospects." International Security 22, no. 4 (1998): 83.
Kang, Keebom, and Ronald J. Roland. "Military Simulation." In Handbook of Simulation: Principles, Methodology, Advances, Applications, and Practice, edited by Jerry Banks. Engineering & Management Press and John Wiley & Sons, Inc, 1998.
Mehrotra, Asha, and Leonard Golding. Mobility and Security Management in the GSM System and Some Proposed Future Improvement In IEEE. Vol. 7. 86 7., 1998.
Hohl, F.. A model of attacks malicious hosts against mobile agents In 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations ., 1998.
Pew, Richard W., and Anne S. Mavor. Modeling Human and Organizational Behavior: Application to Military Simulations. Washington, D.C.: National Academy Press, 1998.
Alvarado, Ernesto, David V. Sandberg, and Stewart G. Pickford. "Modeling Large Forest Fires as Extreme Events." Northwest Science 72 (1998): 66-75.
Istepanian, Robert S. H.. Modeling of a GSM-Based Mobile Telemedical System In Conference of the IEEE Engineering in Medical and Biology . Hong Kong, 1998.
Knoblock, Craig A., Jose Luis Ambite, Naveen Ashish, and Steven Minton. Modeling web sources for information integration In Fifteenth National Conference on Artificial Intelligence . Madison, Wisconsin, 1998.

Pages