Biblio

Export 21401 results:
2006
Barry, M.J.. China Will Not Be a Superpower In Course New Horizons Paper. Toronto: Canadian Forces Command and Staff College, 2006.
San Lee, Jung-, and Chin-Chen Chang. "Choosing t-out-of-n Secrets by Oblivious Transfer." Information & Security: An International Journal 18 (2006): 67-84.
Dudenhoeffer, Donald D.. CIMS: A Framework for Infrastructure Interdependencies and Analysis In 2006 Winter Simulation Conference., 2006.
Capella, Jaime. "The CIO’s First 100 Days." Optimize 5, no. 3 (2006): 46-51.
Civil Protection Law, into force 1 January 2007., 2006.
Civil Society and the Security Sector: Concepts and Practices in New Democracies. Münster: LIT, 2006.
Division, Zaytun. Civil-Military Operations Handbook In ROK Peace and Reconstruction Division. MND-NE Iraq, 2006.
Born, H, M Caparini, K Haltiner, and J Kuhlmann. Civil-Military Relations in Europe: Learning from Crisis and Institutional Change. Routledge, 2006.
Collins, Kathleen. Clan Politics and Regime Transition in Central Asia. New York: Cambridge University Press, 2006.
M., Daniel. "Classical Combination Rules Generalized to DSm Hyper-power Sets and their Comparison with the Hybrid DSm Rule." In Advances and Applications of DSmT for Information Fusion. Vol. 2. American Research Press, 2006.
Laanaya, H., A. Martin, D. Aboutajdine, and A. Khenchaf. Classification des s´ediments marins par fusion de classifieurs binaires SVM., 2006.
Rauch, Jonathan. "Coalition of the Waiting." The Atlantic Monthly (2006).
"Cold Spell Cuts Russian Gas to Europe." Financial Times (2006).
Waugh, W.L., and G. Streib. "Collaboration and Leadership for Effective Emergency Management." Public Administration Review 66, no. 66(s1) (2006): 131-140.
Perl, Raphael. "Combating Extremist Ideologies: Measuring Effectiveness-Considerations for Public Diplomacy." Connections: The Quarterly Journal 5, no. 4 (2006): 64-72.
Rausch, Colette. Combating Serious Crimes in Postconflict Societies: A Handbook for Policymakers and Practitioners. Washington, D.C.: United States Institute of Peace Press, 2006.
Hao, Feng, Ross Anderson, and John Daugman. "Combining Crypto with Biometrics Effectively." IEEE Transactions on Computers 55, no. 9 (2006): 1081-88.
Corman, Steven R., and Jill Schiffelbein. Communication and Media Strategy in the Jihadi War of Ideas. Consortium for Strategic Communication, Arizona State University, 2006.
Community guidelines for State aid in the agriculture and forestry sector 2007 to 2013. Official Journal of the European Union, 2006.
Dezert, J., A.Tchamova, F. Smarandache, and P. Konstantinova. "A Comparison Analysis of Fusion Rules for Target Type Tracking." In Advances and Applications of DSmT for Information Fusion. Vol. 2. American Research Press, 2006.
Daniel, Milan. "A Comparison of the Generalized minC Combination and the Hybrid DSm Combination Rules." In Advances and Applications of DSmT for Information Fusion (Collected works). Vol. II. American Research Press, Rehoboth, 2006.
Hoffman, Frank G.. "Complex Irregular Warfare: The Next Revolution in Military Affair." Orbis 50, no. 3 (2006): 395-411.
Smith, Edward A.. Complexity, Networking, and Effects-Based Approaches to Operations . Washington, D.C.: Center for Advanced Concepts and Technology, 2006.
Beaudoin, Luc, Michael Froh, Marc Gregoire, and Julie Lefebvre. "Computer Network Defence Situational Awareness: Information Requirements." In Military Communications Conference., 2006.
Kaminskyi, Andrii. "Conceptual Approaches to Measuring Financial Risks." Finansy Ukrainy 5 (2006): 78-85.

Pages