Biblio
Export 8450 results:
Cluster Analysis for Fuzzy Control Systems In IFAC Conference CSD’2000 . Bratislava, Slovak Republic, 2000.
Coding in the Cellular Communications. Sofia: ProCon, 2000.
Compliance and Conditionality In ARENA Working Papers., 2000.
Componentware Approaches in Management Information Systems In HFM Workshop . The Hague, 2000.
The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (2000): 119-131.
"Computer assisted Exercises. Sofia: Military Publishing House, 2000.
Computer Assisted Second Language Vocabulary Acquisition." Language Learning and Technology 4, no. 1 (2000): 60-81.
"Computer Generated Forces Applications to a Simulation Based Acquisition Smart Product Model for SC-21 In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
The Concept of Security Sector Reform In Brief 15: Security Sector Reform . Bonn, Germany: Bonn International Center for Conversion, 2000.
Concurrent Oblivious Transfer In 41st Annual IEEE Symposium on Foundations of Computer Science FOCS 2000 . Redondo Beach, California, USA: IEEE Computer Society Press, 2000.
Conflict Prevention and Conflict Resolution: The Limits to Multilateralism In International Review of the Red Cross., 2000.
Confronting Corruption: The Elements of a National Integrity System." In TI Source Book . Berlin: Transparency International, 2000.
"Confronting Corruption: The Elements of a National Integrity System. Vol. 1. Berlin: Transparency International, 2000.
The Conscription of Asian Sex Slaves: Causes and Effects of U.S. Military Sex Colonialism in Thailand and the Call to Expand U.S. Asylum Law." Asian Law Journal 7 (2000): 103-150.
"Control System for Computers Functionality and Network on Basis of Using Neural Nets." Neural Computers: Development and Application 1 (2000).
"Cooperative Security: Framework for a Better Future? In World Defense Systems 2000. Royal United Services Institution, 2000.
Costs of Oil Dependence: A 2000 Update. Oak Ridge, TN: Oak Ridge National Laboratory, 2000.
Coup d’oeil: The Commander’s Intuition in Clausewitzian Terms." Air & Space Power Journal (2000).
"Crisis of Confidence: NATO’s Balkan Adventure Brought Europe to the Threshold of a New Cold War." In European Union, Russia and the Baltic Situation. Moscow: Interdiktat, 2000.
"Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 992-993.
"A Culture of Corruption? Coping with Government in Post-Communist Europe. Budapest: Central European University Press, 2000.
Cyber Attacks Against Supply Chain Management Systems: A Short Note." International Journal of Physical Distribution & Logistics Management 30, no. 7-8 (2000): 710-16.
"Cyber Laws Pass – but Confusion Reigns." Bangkok Post (2000).
"Cyber-warfare rages across Taiwan Strait." Jane’s Intelligence Review (2000).
" Страницы
- « первая
- ‹ предыдущая
- …
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- …
- следующая ›
- последняя »