Biblio
Export 21400 results:
Strategy to choose a fusion formalism and contribution to the model of fusion by the DSmT: Application to the classification of remote sensing image (Stratégie de choix d’un formalisme de fusion multi-sources et apports au niveau du modèle de fusion par)." Revue Française de Photogrammétrie et de Télédétection n 207, no. 7 (2014).
"Strengthening the Legal and Policy Framework for International Disaster Response in Poland. Website of the Polish Red Cross, 2014.
Stressors and Coping Strategies of UK firefighters during on-duty incidents." Stress and Health 30, no. 5 (2014): 366-376.
"Stroitelstvo dorogi Ak-Sai-Tamdyk-Kok-Tash prodoljaetsya (Construction of the Road Ak-Sai-Tamdyk-Kok-Tash Continues). Azattyk, 2014.
A Study of Adoption and Acceptance of e-Umrah System in Saudi Arabia: Overcoming Infrastructure Barriers and Limitations In Information School. Vol. Doctor of Philosophy. University of Sheffield, 2014.
A Study of Gender, Masculinities and Reintegration of Former Combatants in Rwanda: Results from the International Men and Gender Equality Survey (IMAGES) In Analytical Report. LOGiCA and Promundo, 2014.
A study on developing market creation strategy by analysing demand traits of air sports. Korea Civil Aviation Association and Korea Transport Institute, 2014.
A Study on Level of Knowledge Regarding Cybercrime Among Elderly Residing in Homes and Old Age HOMES." International Journal for Research in Applied Science and Engineering Technology 2, no. 7 (2014): 30-34.
"Study Research, Design and Methods. 5th ed. Thousand Oaks: Sage Publications, 2014.
The sum total of state companies’ debt is 140 billion UAH – Yatsenyuk. RBC-Ukraine, 2014.
Survival of the Fittest: Why Terrorist Groups Endure." Perspectives on Terrorism 8, no. 2 (2014): 2-23.
"Susceptibility map of triggering landslides due to rainfall forecast as a part of innovative inspire compliant cloud based infrastructure – InGeoCloudS In Geophysical Research Abstracts., 2014.
Suspend and Hibernate. Archlinux.org, 2014.
Sustainable integrity: how reverse auctions can benefit suppliers in emerging markets." Supply Chain Management: An International Journal 19, no. 2 (2014): 126-141.
"Symbolism in Terrorism: Motivation, Communication, and Behavior. Lanham, MD: Rowman & Littlefield, 2014.
Synthetic Biology and Biosecurity: Challenging the ‘Myths’." Frontiers in Public Health 226, no. 115 (2014).
"Syria Accuses Rebels of Planning Gas Attack Near Damascus. Vol. September 15, 2015. Reuters, 2014.
Syrian regime, rebels reach deal to aid besieged Homs." The Washington Post (2014).
"A Systematic Review on E-government Security Aspects." International Journal of Enhanced Research in Management & Computer Applications 3, no. 6 (2014): 60-67.
"System/Network Administrators from the Former Yugoslav Republic of Macedonia Train in Cyber Defence. NATO A-Z, 2014.
Sztuka wywiadu w państwie współczesnym [The Art of Intelligence in the Modern State]. Warszawa: Oficyna Wydawnicza “Rytm”, 2014.
A Tale of Two Russian Narratives." Perspectives on Peace & Security (2014).
"Talking to Terrorists: How to End Armed Conflicts. London: The Bodley Head, 2014.
TAM-VS: A Technology Acceptance Model for Video Surveillance." In Privacy Technologies and Policy, Lecture Notes in Computer Science, 86-100. Vol. 8450. Cham: Springer, 2014.
"