Biblio

Export 8450 results:
1995
Jaggers, Keith, and Ted Robert Gurr. "Tracking Democracy’s Third Wave with the Polity III Data." Journal of Peace Research 31, no. 4 (1995).
Shelley, L.. "Transnational Organized Crime: An Imminent Threat to the Nation-State?" Journal of International Affairs 48, no. 2 (1995): 463.
Hwang, Min-Shiang, and Wei-Pang Yang. "A Two-Phase Encryption Scheme for Enhancing Database Security." Journal of Systems and Software 31, no. 12 (1995): 257-265.
Ding, Yun, and Patrick Horster. "Undetectable On-Line Password Guessing Attacks." ACM Operating Systems Review 29, no. 4 (1995): 77-86.
The United Nations Manual on the Prevention and Control of Computer Related Crime. International Review of Criminal Policy, 1995.
Kulik, Mikhail, and Vladimir Orlov. "Uranovaya Krazha: Istoriya Guby Andreeva, (Theft of Uranium: History of Guba Andreeva)." Moskovskiye Novosti (1995).
Brecke, Peter. Using Neural Networks to Find Harbingers of Violent Conflicts In Preprints of the IFAC Conference on Supplemental Ways for Improving International Stability . Vienna, Austria, 1995.
Saperstein, Alvin M.. "War and Chaos." American Scientist 83 (1995): 548-555.
Biden, Joseph R., and John B. Ritch. "The War Powers at a Constitutional Impasse: a Joint Decision Solution." Georgetown Law Journal 77, no. 2 (1995).
Armstrong, R., T. Mitchell, T. Joachims, and D. Freitag. "Webwatcher: A learning apprentice for the world wide web." In Working Notes of the AAAI Spring Symposium: Information Gathering from Heterogeneous, Distributed Environments . Stanford University: AAAI Press, 1995.
Rodman, Peter W.. "Will NATO Survive?" National Review (1995).
""България в НАТО": в очакване на несъстоялия се дебат." Капитал (1995).
Резолюция 1010 Совет безопасности ООН In документ ООН., 1995.
Четвертая всемирная конференция Женщин. Пекин: ООН, 1995.
1994
Daeipour, E., Y. Bar-Shalom, and Rong X. Li. Adaptive beam pointing control of a phased array radar using an IMM estimator In American Control Conference., 1994.
Rong-Li, Xiao, Y. Ying, S. Shen, and M. Rao. "Adaptive Fading Kalman Filter with an Application." Automatica 30, no. 8 (1994): 1333-1338.
Wang, Hai. Adaptive fuzzy Systems and Control . Englewood Cliffs, N.J.: Prentice Hall, 1994.
Leist, Susanne, and Krzysztof Woda. "Analyse der Erfolgsfaktoren mobiler Zahlungssysteme." (1994).
Shalamanov, Velizar. Analysis of the Threats and Synthesis of the Force Structure and Disposition In 15th AFCEA-Europe Symposium . Brussels: AFCEA-Europe, 1994.
Denoeux, T.. "Application of evidence theory to k-NN pattern classification." In Pattern Recognition in Practice IV, edited by E.S. Gelsema and L.N. Kanal, 13-24. Amsterdam: Elsevier, 1994.
Bégin, F., E. Boily, T. Mignacca, and E. Shahbazian. Architecture and Implementation of a Multi-Sensor Data Fusion Demonstration Model within the Real-time Combat System of the Canadian Patrol Frigate In AGARD symposium on Guidance and Control for Future Air-Defence Systems AGARD-CP-555. Copenhagen, 1994.
Bégin, F., E. Boily, T. Mignacca, Elisa Shahbazian, and P. Valin. Architecture and Implementation of a Multi-Sensor Data Fusion Demonstration Model within the Real-time Combat System of the Canadian Patrol Frigate In Guidance and Control for Future Air-Defence Systems. Vol. CP-555. AGARD CP-555. Copenhagen: AGARD, 1994.
Geiger, Louis. Armed forces and respect for international humanitarian law: Major issues In Symposium on Humanitarian Action and Peacekeeping Operations Report. Geneva, 1994.
Boccara, Nino, M. Roger, and O. Roblin. "Automata network predator-prey model with pursuit and evasion." Physical Review (1994): 4531-4541.
Blair, W., G. Watson, and S. Hoffman. Benchmark problem for beam pointing control of phased array radar against maneuvering targets In American Control Conference., 1994.

Страницы