Biblio
Export 21434 results:
Textual Signs Reading for Indoor Semantic Map Construction." International Journal of Computer Applications (0975 – 8887) 53, no. 10 (2012).
"Thematic scenario portfolio (Work Packages 3-7) with reference scenarios for “Security Research 2035” . FOCUS Deliverable 8.1, 2012.
Theory of Crisis Management. Ostrava: SPBI, 2012.
Third ECIS Disaster Risk Reduction Community of Practice Workshop In Ulcinj Capacity Assessment Report. ECIS, 2012.
Threat and Risk: What Is the Difference and Why Does It Matter?" Intelligence and National Security 27, no. 2 (2012): 172-186.
"Three paths for Russia in Asia." Russia in global politics (2012).
""Tihipko poobitsiav vyrishyty viyskovi problem." Ekonomichna Pravda (2012).
Tiny Azerbaijan Unleashes Pop-Power Against Iran’s Mullahs." Washington Post (2012).
"Toward the Great Ocean, or the New Globalization of Russia In Analytical report. Valdai Discussion Club, 2012.
Towards a Cybernetic Theory and Reference Model of Self-designing Complex Collaborative Networks." In Collaborative Net-works in the Internet of Services, 485-493. Heidelberg: Springer, 2012.
"Towards a genuine Economic and Monetary Union - Report by President of the European Council. Brussels, 2012.
Towards a ‘post-American’ alliance? NATO burden-sharing after Libya." International Affairs 88, no. 2 (2012): 313-327.
"Towards a Rigorous Modeling Formalism for Systems of Systems In 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops., 2012.
Towards IEEE 802.22 Based SCADA System for Future Distributed System In 2012 International Conference on Informatics, Electronics & Vision (ICIEV). Dhaka, Bangladesh, 2012.
Towards Stronger EU Military and Defence Capabilities?" Journal on European Perspective of the Western Balkans 4, no. 4 (2012): 129.
"Transatlantic Relations in the 21 Century: Europe, America and the Rise of the Rest. New York: Routledge, 2012.
Trends in Telecommunication Reform 2012: Smart Regulation for a Broadband World. Geneva: International Telecommunication Union, 2012.
TRESOR Runs Encryption Securely Outside RAM. Department of Computer Science University of Erlangen, Laboratory for Dependable Distributed Systems University of Mannheim, 2012.
TRESOR-HUNT: Attacking CPU-Bound Encryptio. Northeastern University, 2012.
Trialog in the Asia-Pacific Region. Vol. 17 December 2012. Russian Council on Foreign Affairs, 2012.
The Tributary System as International Society in Theory and Practice." Chinese Journal of International Politics 5, no. 1 (2012): 3-36.
"True Friends? How Russia and China Perceive One Another. Мoscow: Center for European Reforms, Moscow Carnegie Center, 2012.
Truth, Lies and Afghanistan – How military leaders have let us down." Armed Forces Journal (2012).
"Turkey and the EU: What Next? In “On Turkey” series. The German Marshall Fund of the United States, 2012.