Biblio

Export 8450 results:
2000
Andreeva, Plamena, N. Tchingov, and R. Michel. Cluster Analysis for Fuzzy Control Systems In IFAC Conference CSD’2000 . Bratislava, Slovak Republic, 2000.
Popov, Metodi. Coding in the Cellular Communications. Sofia: ProCon, 2000.
Checkel, Jeffrey T.. Compliance and Conditionality In ARENA Working Papers., 2000.
Kaster, Joegen, and Annette Kaster. Componentware Approaches in Management Information Systems In HFM Workshop . The Hague, 2000.
Vraikov, Nikolay, and Alexi Naidenov. "The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (2000): 119-131.
Naidenov, Alexi, and Nikolay Vraikov. Computer assisted Exercises. Sofia: Military Publishing House, 2000.
Groot, Peter J. M.. "Computer Assisted Second Language Vocabulary Acquisition." Language Learning and Technology 4, no. 1 (2000): 60-81.
Ewen, D., T Flynn, D Miller, and D Dion. Computer Generated Forces Applications to a Simulation Based Acquisition Smart Product Model for SC-21 In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Brzoska, Michael. The Concept of Security Sector Reform In Brief 15: Security Sector Reform . Bonn, Germany: Bonn International Center for Conversion, 2000.
Garay, Juan A., and Philip D. MacKenzie. Concurrent Oblivious Transfer In 41st Annual IEEE Symposium on Foundations of Computer Science FOCS 2000 . Redondo Beach, California, USA: IEEE Computer Society Press, 2000.
Tanner, Fred. Conflict Prevention and Conflict Resolution: The Limits to Multilateralism In International Review of the Red Cross., 2000.
Pope, Jeremy. "Confronting Corruption: The Elements of a National Integrity System." In TI Source Book . Berlin: Transparency International, 2000.
Pope, Jeremy. Confronting Corruption: The Elements of a National Integrity System. Vol. 1. Berlin: Transparency International, 2000.
Rho-Ng, Elizabeth. "The Conscription of Asian Sex Slaves: Causes and Effects of U.S. Military Sex Colonialism in Thailand and the Call to Expand U.S. Asylum Law." Asian Law Journal 7 (2000): 103-150.
Korneev, V.V., and S.V. Sajin. "Control System for Computers Functionality and Network on Basis of Using Neural Nets." Neural Computers: Development and Application 1 (2000).
Cohen, Richard. Cooperative Security: Framework for a Better Future? In World Defense Systems 2000. Royal United Services Institution, 2000.
Greene, David L., and Nataliya I. Tishchishyna. Costs of Oil Dependence: A 2000 Update. Oak Ridge, TN: Oak Ridge National Laboratory, 2000.
Caraccilo, Dominic J., and John L. Pothin. "Coup d’oeil: The Commander’s Intuition in Clausewitzian Terms." Air & Space Power Journal (2000).
Maksimichev, I.. "Crisis of Confidence: NATO’s Balkan Adventure Brought Europe to the Threshold of a New Cold War." In European Union, Russia and the Baltic Situation. Moscow: Interdiktat, 2000.
Chan, Chi-Kwong, and L.M. Cheng. "Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 992-993.
Miller, William L., Åse B. Grødeland, and Tatyana Y. Koshechkina. A Culture of Corruption? Coping with Government in Post-Communist Europe. Budapest: Central European University Press, 2000.
Warren, Matthew, and William Hutchinson. "Cyber Attacks Against Supply Chain Management Systems: A Short Note." International Journal of Physical Distribution & Logistics Management 30, no. 7-8 (2000): 710-16.
Boonruang, Sasiwimon, and Karnjana Karnjanatawe. "Cyber Laws Pass – but Confusion Reigns." Bangkok Post (2000).
Bristow, Damon. "Cyber-warfare rages across Taiwan Strait." Jane’s Intelligence Review (2000).
Galvin, John. Cyberwars Bring real-world Conflict to the Web., 2000.

Страницы