Biblio

Export 8450 results:
1998
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Tarrow, Sidney. Power in Movement: Social Movements and Contentious Politics. New York: Cambridge University Press, 1998.
Cramer, Ronald, and Victor Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Cipher Attack In Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology Crypto’98. Santa Barbara, California, USA, 1998.
Shearer, David. "Private Armies and Military Intervention." Adelphi Paper No. 316 IISS (1998): 76.
S., Ferson, and Donald S.. Probability bounds analysis In International Conference on Probabilistic Safety Assessment and Management (PSAM4). New York: Springer-Verlag, 1998.
S., Parsons. "A proof theoretic approach to qualitative probabilistic reasoning ." Int.J. of Approx. Reas 19 (1998): 265-297.
Proposal for Government Service Network (GSN) of the Electronic/Networked Government Program. Data Communication Group of Chunghwa Telecom Co. Ltd., 1998.
Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." In 30th Annual ACM Symposium on Theory of Computing. Dallas, Texas, USA, 1998.
Burr, William E.. Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Operations In NIST FPKI, Working Draft., 1998.
Hampson, Fen Osler, and Dean F. Oliver. "Pulpit Diplomacy: A Critical Assessment of the Axworthy Doctrine." International Journal 53 (1998): 379-406.
Bryson, N, and AA Mobolurin. A qualitative discriminant approach for generating In IEEE Transactions on Knowledge and Data Engineering. 2nd ed. Vol. 10., 1998.
Reactor Safety Study – An Assessment of Accident Risk in U.S. Commercial Nuclear Power Plants, WASH-1400 (NUREG-75/014)., 1998.
Herbst, Susan. Reading the Public Opinion: How Political Actors View The Democratic Process. Chicago: University of Chicago Press, 1998.
Angell, Ian. "The Real Politik of the Information Age." Information Strategy (1998).
Lovering, John. "Rebuilding the European Defence Industry in a Competitive World: Intergovernmentalism and the Leading Role Played by Companies." In Restructuring the Global Military Sector: The End of Military Fordism, 225-27. Vol. II. London: Pinter, 1998.
Shalamanov, Velizar, and Todor Tagarev. Reengineering Defense Planning in Bulgaria In Research Report. Sofia: Institute for International and Security Studies, 1998.
Shalamanov, Velizar, and Todor Tagarev. Reengineering the Defense Planning in Bulgaria In ISIS Reports. Sofia: Institute for Security and International Studies, 1998.
Peimani, Hooman. Regional Security and the Future of Central Asia. Westport, CT: Praeger, 1998.
Burt, Richard, and Olin Robinson. Reinventing Diplomacy in the Information Age . Washington, DC: Center for Strategic and International Studies, 1998.
Clinton, Bill. Remarks by the President on the National Interest for Enlarging NATO., 1998.
Beznosov, Konstantin. Requirements for Access Control: US Healthcare Domain In 3rd ACM Workshop on Role-Based Access Control. Vol. 43. Fairfax, Virginia, USA, 1998.
Res 1199/1988. UNSC, 1998.
Res 1203/1998. UNSC, 1998.
Resolution 1199. UN Security Council, 1998.
Resolution 1203. UN Security Council, 1998.

Страницы