Biblio

Export 21337 results:
2000
Primachenko, A.. "The case of the “greens” (Випадок "зелених")." Zerkalo nedeli (2000): 2.
Hyde, Charles K.. "“Casualty Aversion." Aerospace Power Journal (2000): 1.
D., Treisman. "The causes of corruption: a cross-national study." Journal of public economics 76, no. 3 (2000): 399-457.
Monitor, ISIJ. "Center for Security Studies and Conflict Research." Information & Security: An International Journal 7 (2000): 177-188.
Holter, Øystein Gullvåg. "Chapter 4: Masculinities in Context: On Peace Issues and Patriarchal Orders." In Male Roles, Masculinities and Violence: A Culture of Peace Perspective, 61. Paris: UNESCO, 2000.
Nichols, Johanna. "The Chechen Refugees." Berkeley Journal of International Law 18, no. 2 (2000): 241-259.
Zhao, Suiseheng. "Chinese Nationalism and Its International Orientations." Political Science Quarterly 115, no. 1 (2000): 1-33.
Smith, Craig. "A Chip Plant That is Full of Symbolism." The New York Times (2000).
Seleznev, Guennadyi. "Cinderella in Europe. How long Russia has to stay in this role?" Europe (magazine of the European Union published in Moscow) (2000): 9.
Civilian Control of the Army and Police. Belgrade: Media Center., 2000.
A. Lidy, Martin, Edward F. Smith, Edwin J. Pechous, and Michele M. Cecil. Civil-Military Emergency Planning Council In Bucharest Conference Proceedings. Arlington, VA: Institute for Defense Analysis, 2000.
Voeten, Erik. "Clashes in the Assembly." International Organization 54, no. 2 (2000): 185-215.
A Clean Break: New Strategy for Securing the Realm In Study Group on a New Israeli Strategy Toward . Institute for Advanced Strategic and Political Studies, 2000.
Andreeva, Plamena, N. Tchingov, and R. Michel. Cluster Analysis for Fuzzy Control Systems In IFAC Conference CSD’2000 . Bratislava, Slovak Republic, 2000.
Popov, Metodi. Coding in the Cellular Communications. Sofia: ProCon, 2000.
Diedrichsen, Loren. "Command and Control: Operational Requirements and System Implementation." Information & Security: An International Journal 5 (2000): 23-40.
Common Strategies In Report by the Secretary-General/High Representative., 2000.
Common Strategy of the European Union on the Mediterranean Region In Presidency Conclusions, European Council, Feira., 2000.
Checkel, Jeffrey T.. Compliance and Conditionality In ARENA Working Papers., 2000.
Kaster, Joegen, and Annette Kaster. Componentware Approaches in Management Information Systems In HFM Workshop . The Hague, 2000.
Marvel, Lisa, George Hartwig, and Charles Boncelet. "Compression-compatible Fragile and Semi-Fragile Tamper Detection." In SPIE EI Photonics West 2000., 2000.
Vraikov, Nikolay, and Alexi Naidenov. "The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (2000): 119-131.
Naidenov, Alexi, and Nikolay Vraikov. Computer assisted Exercises. Sofia: Military Publishing House, 2000.
Groot, Peter J. M.. "Computer Assisted Second Language Vocabulary Acquisition." Language Learning and Technology 4, no. 1 (2000): 60-81.
Ewen, D., T Flynn, D Miller, and D Dion. Computer Generated Forces Applications to a Simulation Based Acquisition Smart Product Model for SC-21 In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.

Pages