Biblio

Export 8450 results:
1998
Hammond, J.S., R.L. Keeney, and H. Raiffa. "The Hidden Traps in Decision Making." Harvard Business Review (1998).
Human Development Report. New York: United Nations Development Program, 1998.
Perry, Michael J.. The Idea of Human Rights: Four Inquiries. New York: Oxford University Press, 1998.
IDL Application Programmer’s Interface. Defense Modeling and Simulation Office, 1998.
Semerdjiev, Emil, and Ludmila Mihaylova. IMM Algorithm for Manoevring Ship Tracking In Intern. Conf. on Multisource-Multisensor Inf. Fusion - FUSION'98 . Las Vegas, Nevada, 1998.
Mazor, E., Y. Bar-Shalom, J. Dayan, and A. Averbuch. "IMM Methods in Target Tracking: A Survey ." IEEE Trans. AES 34, no. 1 (1998): 103-123.
Kirubarajan, T., W. Blair, G. Watson, and Y. Bar-Shalom. IMMPDA solution to benchmark problem for radar resource allocation and tracking in the presence of ECM In IEEE Trans. on AES . Vol. 34,4., 1998.
Reichard, Christoph. "The Impact of Performance Management on Transparency and Accountability in the Public Sector." In Ethics and Accountability in a Context of Governance and New Public Management, edited by A. Hondeghem, 123-137. EGPA Amsterdam: EGPA Yearbook, 1998.
Graham, Bradley. "In Cyberwar, A Quandary Over Rules And Strategy." International Herald Tribune (1998).
"The Information Technology Contribution to the Building of a Safe Regional Environment." In AFCEA, edited by Vladimir Zaslavsky and Emmanuel Greindl. Kiev, 1998.
Whitaker, Randall. Information Warfare., 1998.
Denning, D.. Information Warfare and Security. Addison-Wesley Professional, 1998.
Waltz, Edward. Information Warfare. Principles and Operations. Boston: Artech, 1998.
Hoffman, Bruce. Inside Terrorism . London: Victor Gollancz, 1998.
Mörth, Ulrika, and Bengt Sundelius. Interdependens, konflikt och säkerhetspolitik: Sverige och den amerikanska teknikexportkontrollen . Stockholm: Nerenius & Santérus, 1998.
International Atomic Energy Agency (IAEA) In The Radiological Accident in Goiania . Vienna, 1998.
Walt, Stephen M.. "International Relations: One World, Many Theories." Foreign Policy (1998): 38.
Denning, Dorothy E., and Peter J. Denning. Internet Besieged: Countering Cyberspace ScofflFaws. ACM Press, Addison Wesley Professional, 1998.
Pless, Vera. Introduction to the Theory of Error-Correcting Codes. Third ed. New York, NY: Wiley, 1998.
Introductory to the Electronic/Networked Government Program. Research Development and Evaluation Commission of the Executive Yuan, 1998.
Mitchell, Gay. Ireland and the Partnership for Peace Initiative: Our Place in the New European Security Architecture. Dublin: Fine Gael, 1998.
Davidson, Lawrence. Islamic Fundamentalism. Westport, CT: Greenwood Press, 1998.
Joint Statement on Common Security Challenges at the Threshold of the Twenty-First Century., 1998.
Bricault, Dennis. Legal Aspects of Academic Dishonesty: Policies, Perceptions, and Realities., 1998.
Williams, John. Legitimacy and the Rise and Fall of Yugoslavia. London: McMillan, 1998.

Страницы