Biblio

Export 8432 results:
1999
Huntington, Samuel. "The Lonely Superpower." Foreign Affairs 78, no. 2 (1999).
Dodis, Yevgeniy, and Silvio Micali. "Lower Bounds for Oblivious Transfer Reductions." In Advances in Cryptology: Proceedings of Eurocrypt’99: International Conference on the Theory and Application of Cryptographic Techniques. Prague, Czech Republic, 1999.
Drucker, Peter F.. Management Challenges for the 21st Century . London: Butterworth-Heinemann, 1999.
Managing Diversity in the Armed Forces. Experiences from Nine Countries . Tilburg: Tilburg University Press, 1999.
Agranoff, Robert, and Michael McGuire. "Managing in Network Settings." Policy Studies Review 16, no. 1 (1999): 18-41.
Sohn, Ardyth B., Jan LeBlanc Wicks, Stephen Lacy, and George Sylvie. Media Management: A Casebook Approach. 2nd ed. Mahwah, N.J.: Lawrence Erlbaum Associates, 1999.
Membership Action Plan (MAP) In NATO Press Release., 1999.
Kharchenko, Vyacheslav. Methods of an Estimation of the Multi-version Safety Systems In 17th International System Safety Conference. Orlando, FL, 1999.
Zanini, Michele. "Middle Eastern Terrorism and Netwar." Studies in Conflict and Terrorism 22, no. 3 (1999).
Murray, Williamson. "Military Culture Does Matter." FPRI Wire 7, no. 2 (1999).
Military Doctrine of the Republic of Bulgaria. National Assembly, 1999.
Yermolin, Vladimir. "Military Signs a New Doctrine." Izvestiya (1999).
Gompert, David C., Richard L. Kugler, and Martin C. Libicki. Mind the Gap: Promoting a Transatlantic Revolution in Military Affairs. Washington, D.C.: National Defense University, 1999.
Gelenbe, Erol. Modeling CGF with Learning Stochastic Finite-State Machines In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Jilkov, Vesselin, Donka Angelova, and Tzvetan Semerdjiev. Mode-Set Adaptive IMM for Maneuvring Target Tracking In IEEE Trans. AES 35., 1999.
Madinger, John, and Sydney A. Zalopany. "Money Laundering. A Guide for Criminal Investigators ." Boca Raton, FL: CRC Press (1999).
Metselaar, Max V.. "Is more Necessarily Better? Advantages and Disadvantages of the Explosion of Information Technologies for Political and Military Preparedness." In NL ARMS – Netherlands Annual Review of Military Studies, edited by J.M.J. Bosch, H.A.M. Luiijf and A.R. Mollema, 259-274., 1999.
Ćosić, Krešimir, Todor Kostic, Miroslav Slamić, Mario Volarevic, and Ivica Kopriva. A Multi-Level Hardware-in-the-Loop Simulation In 1999 Summer Computer Simulation Conference. Chicago, Illinois, 1999.
Rao, Nageswara S. V.. "Multiple sensor fusion under unknown distributions." Journal of the Franklin Institute 336, no. 2 (1999): 285-299.
Madjarov, N., and L.S. Mihaylova. A Multiple-Model Adaptive Kalman Filter Algorithm for Continuous Systems In Comptes rendus de l'Academie Bulgare des Sciences. Vol. 51. Sofia, Bulgaria, 1999.
Mutual Legal Assistance Treaty between the United States of America and the Russian Federation., 1999.
Thomsen, D.J., Richard C. O’Brien, and C. Payne. Napoleon: Network Application Policy Environment In 4th ACM Workshop on Role-Based Access Control. Fairfax, Virginia, USA, 1999.
National Military Command Center Concept of Operations In Draft., 1999.
Sokolsky, Richard, and Tanya Charlick-Paley. “NATO and Caspian Security: A Mission Too Far?” In Project Air Force. Santa Monica, CA: RAND Corporation, 1999.
Yesson, Erik. "NATO and Russia in Kosovo." Perspectives 13 (1999): 15.

Страницы