Biblio

Export 21402 results:
1999
Povolotskaia, L., and Leonid Kuchma. "The state is not going to be a donor to corrupt thieves (Держава не буде донором для корумпованих злодіїв)." Pravitel’stvennyi kur’er (1999): 3-4.
State, Madeleine K. Albrigh. Statement before the Senate Appropriations Committee on Foreign Relations., 1999.
"Statement by the Hon. Ron Paul (R-Texas) to Congress." In Congressional Record 1999., 1999.
Rosenau, James N.. "States, Sovereignty, and Diplomacy in the Information Age." Virtual Diplomacy Series (1999).
Bojanov, E., and I. Vuchkov. Statistical Methods for Modeling and Optimization of Multi-Factor Objects ., 1999.
Statistical yearbook of Ukraine for 1998 (Статистичний щорічник України за 1998 рік)., 1999.
Krulak, Charles C.. "The Strategic Corporal: Leadership in the Three Block War." Marines Magazine 2, no. 8 (1999).
Walton, John. Strategic Human Resource Development. Harlow: Pearson Education Limited, 1999.
Yu, E.. Strategic modelling for enterprise integration In 14th World Congress of the International Federation of Automatic Control. Beijing, China: IFAC, 1999.
McAndrew, Duncan. "The Structural Analysis of Criminal Networks." In The Social Psychology of Crime: Groups, Teams and Networks. Aldershot, UK: Ashgate Publishing, 1999.
Bunce, Valerie. Subversive Institutions: The Design and the Destruction of Socialism and the State. Cambridge: Cambridge University Press, 1999.
Fischmeister, S., and W. Lugmayr. The supervisor-worker pattern In Pattern Languages of Programs PLoP'99. Kubova Hut, Czech Republic, 1999.
Burk, James. "Support for Peacekeeping in Lebanon and Somalia: Assessing the Casualties Hypothesis." Political Science Quarterly 114, no. 1 (1999).
Arquilla, John, and David Ronfeldt. Swarming and the Future of Conflict. Rand Corporation, National Defense Research Institute, 1999.
Wingfield, Thomas. "Taking Aim at Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine." Maryland Journal of International Law and Trade 22 (1999).
Schlag, Peter M., Thomas K. Moesta, Stefan Rakowsky, and Georgi Graschew. "Telemedicine – The New Must for Surgery." Archives of Surgery 134 (1999): 1216-1221.
Meyers, Reinhard. Temeljni pojmovi i teorijske perspektive meðunarodnih odnosa . Osijek- Zagreb-Split: Pan-Liber, 1999.
Petty, Mikel, Robert Franceschini, and Amar Mukherjee. "A Terrain Reasoning Algorithm for Defending a Fire Zone." Information & Security: An International Journal 3 (1999): 56-75.
Kofos, Evangelos. "Textbooks: The Pendulum of ‘Loading’ and ‘Disarming’ History: The Southeastern European Test Case." In Disarming History. International Conference on Combating Stereotypes and Prejudice in History Textbooks of Southeast Europe, 23-27. Stockholm: Nykopia Tryck AB, 1999.
Ashton, Kevin. "That ‘Internet of Things’ Thing." RFID Journal (1999).
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. "Threshold Proxy Signatures." IEE Proceedings- Computers and Digital Techniques 146, no. 5 (1999): 259-263.
Sun, Hung-Min, and Biing-Jang Chen. Time-Stamp Proxy Signature with Traceable Receivers In 9th National Conference on Information Security. Taiwan, 1999.
Romanyuk, S.. "Totalitarian Sects in Russia." Observer 5 (1999).
Angelova, Donka, and Boryana Vassileva. "Tracking Filters for Radar Systems with Correlated Measurement Noise." Information & Security: An International Journal 2 (1999): 90-101.
Zagorski, Andrei V.. "Traditional Russian Security Interests in the Caucasus and Central Asia. Perceptions and Realities." In Russia, the Caucasus, and Central Asia. The 21st Century Security Environment, edited by Rajan Menon, Yuri E. Fedorov and Ghia Nodia. New York: M. E. Sharpe, East West Institute, 1999.

Pages