Biblio

Export 21404 results:
2000
Bunn, Matthew. The Next Wave: Urgently Needed New Steps to Control Warheads and Fissile Material. Washington, D.C.: Carnegie Endowment for International Peace, 2000.
Martin, Alvin, George Doddington, Douglas Reynolds, and Mark Przybocky. "The NIST Speaker Recognition Evaluation– Overview, Methodology, Systems, Results, Perspectives." Speech Communications 31 (2000): 225-254.
Ojanen, Hanna, Gunilla Herolf, and Rutger Lindahl. Non-Alignment and European Security Policy: Ambiguity at Work. Helsinki and Bonn: Ulkopoliittinen instituutti and Institut für Europäische Politik, 2000.
Latawski, Paul. A Normative Framework for Democratic Control of Armed Forces In One Europe or Several? Working Paper , 2000.
Lieven, Anatol. "The (Not So) Great Game." The National Interest 58 (2000): 69-80.
Gardner, Richard N.. "The One Percent Solution: Shirking the Cost of World Leadership." Foreign Affairs 79 (2000): 2-11.
Joux, Antoine. A One Round Protocol for Tripartite Diffie-Hellman In Algorithmic Number Theory Symposium, Lecture Notes in Computer Science. Vol. 1838., 2000.
Graschew, Georgi, Frank Engel-Murke, D. Steines, Peter M. Schlag, Stefan Rakowsky, and Gunter Bellaire. "OP 2000 – Interaktive Telekommunikation mit hochqualitativem Video, Fernsteuerung und intuitiven Benutzerschnittstellen für Telechirurgie und Simulationen chirurgischer Eingriffe." Telemedizinführer Deutschland, Ausgabe 2000 (2000).
Guohua, Li. "Open Up New Field for Dissemination of Military News." Jiefangjun Bao (2000).
Tomes, Robert. "Operation Allied Force and the Legal Basis for Humanitarian Interventions." Parameters (2000).
Istepanian, Robert S. H., and Arthur A. Petrosian. "Optimal Zonal Wavelet-Based ECG Data Compression for a Mobile Telecardiology System." IEEE Transaction on Information Technology in Biomedicine 4, no. 3 (2000): 200-211.
Gerrard, M.. Organising for E-Business: Getting it right. Gartner Advisory, 2000.
Willis, Larry, Lashon B. Booker, Gary N. Bundy, and Paul G. Foley. Overview of the Advanced Simulation Technology Thrust (ASTT) Program In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Blake, V.. PABX Security, Information Security Technical Report., 2000.
Mollov, Petar. "Participation in the Consortium of Defense Academies and Security Studies Institutes and Advanced Information Technologies." Information & Security: An International Journal 5 (2000): 115-124.
Livingstone, Robert Gerald. "The Party’s Over: Kohl's Disservice to German Democracy." Foreign Affairs 79 (2000): 13-17.
Suroi, Veton. "Past as Prologue?" The International Spectator 35, no. 1 (2000): 27-33.
Lowe, Steven Wallace. Peacekeeping, Peace building, Human security and Self-interest: Why Canada Remains the Foremost Peacekeeper. 3rd Annual Graduate Studies Symposium of the Canadian Defense Associations Institute, 2000.
Personal Data Protection Law, in force since 2000., 2000.
"Peru Tops List of EDC Basket Cases." Ottawa Citizen (2000): A4.
Machowski, Jacek. Piractwo w świetle historii i prawa. Warsaw, 2000.
Bratnicki, Mariusz. Podstawy współczesnego myślenia o zarządzaniu. Wyższa Szkoła Biznesu w Dąbrowie Górniczej, 2000.
Ong, Kelvin. “Policing the Peace: Towards a Workable Paradigm In conference report from the International Peace Academy. New York, 2000.
Wallace, Helen, and William Wallace. Policy Making in the EU. 4th ed. Oxford: Oxford University Press, 2000.
Cizre, Umit. Politics and Military in Turkey into the 21st century In EUI Working Paper., 2000.

Pages