Biblio
Export 21400 results:
Post-Capitalist Society . New York: Harperbusiness, 1994.
A Primer on Decision Making. How Decisions Happen. New York: The Free Press, 1994.
Psychologie sociale des relations à autrui . Paris: Nathan, 1994.
Qualitative Research Methods for Evaluating Computer Information Systems." In Evaluating Health Care Information Systems: Methods and Applications, 45-68. Thousand Oaks, CA: Sage, 1994.
"The Real Worlds of Canadian Politics: Cases in Process and Policy. 3rd ed. Peterborough: Broadview, 1994.
Receipt-Free Secret-Ballot Elections In Twenty-Sixth Annual ACM Symposium on Theory of Computing STOC’94. Vol. 544-553. New York, 1994.
Receipt-Free Secret-Ballot Elections (extended abstract) In Twenty-Sixth Annual ACM Symposium on Theory of Computing STOC’94 (Montreal, Quebec, Canada). New York, USA: ACM, 1994.
Reflections of a ‘Pracademic’ on the Logic of Politics and Administration." Public Administration Review 54, no. 6 (1994): 531-536.
"A Remote Password Authentication Scheme Based upon ElGamal’s Signature Scheme." Computers & Security 13, no. 2 (1994): 137-144.
"Representation of qualitative user preference by quantitative belief functions." IEEE Transactions on Knowledge and Data Engineering 6, no. 1 (1994): 72-78.
"The Rise and Fall of Strategic Planning." New York, NY: The Free Press (1994).
"The Rise and Fall of Strategic Planning. New York: Prentice Hall, 1994.
The Role of Education and Training in the Field of C4I In AFCEA-Europe Budapest Seminar. Budapest, 1994.
Rwanda: Death, Defiance, Despair. London: African Rights, 1994.
Secure Voting Using Partially Compatible Homomorphisms In Advances in Cryptology--CRYPTO’94, Lecture Notes in Computer Science 839. Berlin: Springer-Verlag, 1994.
Self-efficacy." In Encyclopedia of Human Behavior, 77-81. Vol. 4. New York, NY: Academic Press, 1994.
"Self-Nonself Discrimination in a Com¬puter In IEEE Symposium on Research in Security and Privacy. Oakland, CA, 1994.
SodaBot: A Software Agent Environment and Construction System. MIT AI Lab, 1994.
Software agents." Communication of the ACM 37, no. 7 (1994): 48-53.
"A software security tools for information protection in PCs – “CS_SECURE_TOOLS In First National Conferences “INFORMATIC’94. Sofia, Bulgaria: SAI, 1994.
Some qualitative approaches to applying Dempster-Shafer theory." Information and Decision technologies 19 (1994): 321-337.
"Some varieties of qualitative probability In 5th International Conference on Information Processing and the Management of Uncertainty. Paris France, 1994.
On State Security Institutions. Likumi.lv, 1994.
The Strategic Implications of Information Dominance." Strategic Review 22 (1994): 22-34.
"