Biblio

Export 8450 results:
1998
Resolution of Ratification of the Protocols to the North Atlantic Treaty of 1949 on the accession of Poland, Hungary, and the Czech Republic In Cong. Rec., 1998.
Price, Richard. "Reversing the Gun Sights: Transnational Civil Society Targets Land Mines." International Organization 52, no. 3 (1998): 613-644.
Parsons, S., and A. Hunter. "A review of uncertainty handling formalisms." Applications of Uncertainty Formalisms (1998): 8-37.
Jennings, N., M. Wooldridge, and K. Sycara. "A roadmap of agent research and development." Autonomous Agents and Multi-Agent Systems 1, no. 1 (1998): 7-38.
Kasatkina, Tatyana I.. Rossiya – Chechnya: Tsep oshibok i prestuplenii. Moscow: Zvenya, 1998.
Saradzhyan, Simon. "Sailor Kills Himself After Standoff in Sub." The Moscow Times (1998).
Weeks, Stanley B.. Sea Lines of Communication (SLOC) Security and Access In IGCC Policy Paper. Institute on Global Conflict and Cooperation, University of California, 1998.
Tursunov, Bakhrom. “Security and Stability in Uzbekistan: Challenges, Threats and Solutions. Partnership for Peace Information Systems Conict Studies Research Center, 1998.
Linde, Andrei. "The Self – Reproducing Inflationary Universe." Scientific American Presents 9, no. 1 (1998).
Jensen, Henrik J.. Self-Organised Criticality . Cambridge, UK: Cambridge University Press, 1998.
Altmann, Jurgen, Horst Fisher, and Henny van der Graaf. "Sensors For Peace: Applications, Systems And Legal Requirements For Monitoring In Peace Operations." New York: United Nations Publication (1998).
Ju, Shy-Ming. An SGML-Based Office Document Exchange and Management In SGML/XML Europe’98 . Paris, France, 1998.
Götschel, Laurent. Small States Inside and Outside the European Union: Interests and Policies. Boston, MA: Kluwer Academic Publishers, 1998.
Yang, Chung-Huang, Shy-Ming Ju, and T.R.N. Rao. A Smartcard-Based Framework for Secure Document Exchange In IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology. Washington D.C., USA, 1998.
Huntington, Samuel. The Soldier and the State. Sofia: Military Publishing House, 1998.
Zadeh, Lotfi A.. "Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems." Soft Computing 2 (1998): 23-25.
Klein, Gary A.. Sources of Power: How People Make Decisions . Cambridge, MA: The MIT Press, 1998, 1998.
Pantel, Patrick, and Dekang Lin. SpamCop: A Spam Classification & Organisation Program In AAAI-98 Workshop on Learning for Text Categorization. Madison, Wisconsin, 1998.
Gabriole, Zeviar-Geese. "The State of the Law on Cyber Jurisdiction and Cybercrime on the Internet." Gonzaga Journal of International Law, no. 1 (1998).
Jupille, Joseph, and James A. Caporaso. "States, Agency and Rules: The European Union in Global Environment Politics." In The European Union in the World Community, 213-229. Boulder, CO: Lynne Rienner, 1998.
The Strategic Defence Review–1998. London: Ministry of Defence, 1998.
Ryan, Julie J. C. H.. "Student Plagiarism in an On-line World." ASEE Prism Magazine (1998).
Mepham, Simon. Synthetic Environments – Delivering Real Benefits to UK Defence In SimTecT. Adelaide, Australia, 1998.
Semerdjiev, Tzvetan, Vesselin Jilkov, and Donka Angelova. Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
Sidor, David J.. "TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow." IEEE Communications Magazine (1998): 54-64.

Страницы