Biblio

Export 8458 results:
1999
"Statement by the Hon. Ron Paul (R-Texas) to Congress." In Congressional Record 1999., 1999.
Rosenau, James N.. "States, Sovereignty, and Diplomacy in the Information Age." Virtual Diplomacy Series (1999).
Bojanov, E., and I. Vuchkov. Statistical Methods for Modeling and Optimization of Multi-Factor Objects ., 1999.
Krulak, Charles C.. "The Strategic Corporal: Leadership in the Three Block War." Marines Magazine 2, no. 8 (1999).
Yu, E.. Strategic modelling for enterprise integration In 14th World Congress of the International Federation of Automatic Control. Beijing, China: IFAC, 1999.
Bunce, Valerie. Subversive Institutions: The Design and the Destruction of Socialism and the State. Cambridge: Cambridge University Press, 1999.
Fischmeister, S., and W. Lugmayr. The supervisor-worker pattern In Pattern Languages of Programs PLoP'99. Kubova Hut, Czech Republic, 1999.
Burk, James. "Support for Peacekeeping in Lebanon and Somalia: Assessing the Casualties Hypothesis." Political Science Quarterly 114, no. 1 (1999).
Wingfield, Thomas. "Taking Aim at Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine." Maryland Journal of International Law and Trade 22 (1999).
Schlag, Peter M., Thomas K. Moesta, Stefan Rakowsky, and Georgi Graschew. "Telemedicine – The New Must for Surgery." Archives of Surgery 134 (1999): 1216-1221.
Meyers, Reinhard. Temeljni pojmovi i teorijske perspektive meðunarodnih odnosa . Osijek- Zagreb-Split: Pan-Liber, 1999.
Kofos, Evangelos. "Textbooks: The Pendulum of ‘Loading’ and ‘Disarming’ History: The Southeastern European Test Case." In Disarming History. International Conference on Combating Stereotypes and Prejudice in History Textbooks of Southeast Europe, 23-27. Stockholm: Nykopia Tryck AB, 1999.
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. "Threshold Proxy Signatures." IEE Proceedings- Computers and Digital Techniques 146, no. 5 (1999): 259-263.
Sun, Hung-Min, and Biing-Jang Chen. Time-Stamp Proxy Signature with Traceable Receivers In 9th National Conference on Information Security. Taiwan, 1999.
Romanyuk, S.. "Totalitarian Sects in Russia." Observer 5 (1999).
Zagorski, Andrei V.. "Traditional Russian Security Interests in the Caucasus and Central Asia. Perceptions and Realities." In Russia, the Caucasus, and Central Asia. The 21st Century Security Environment, edited by Rajan Menon, Yuri E. Fedorov and Ghia Nodia. New York: M. E. Sharpe, East West Institute, 1999.
Dror, Yebezkel. Transparency and Openness of Quality Democracy, in Openness and Transparency in Governance: Challenges and Opportunities In The Second NISPAcee Civil Service Forum. Maastricht, The Netherlands, 1999.
Georgiev, Vladimir. "Turkmeno-afganskaya granitsa mozhet stat` bezkontrol`noi." Nezavisimaya Gazeta (1999).
Lewis, T.. "Ubinet: The ubiquitous Internet will be wireless." IEEE Computer 32 (1999): 10.
Taylor, Ros. "UK: Partisans Wage Virtual War." The Guardian (1999).
Stern, Jessica. The Ultimate Terrorists. Cambridge, MA: Harvard University Press, 1999.
Stern, Jessica. "The Ultimate Terrorists." Cambridge, MA: Harvard University Press (1999).
Preston, Thomas, and Paul ‘t Hart. "Understanding and Evaluating Bureaucratic Politics: The Nexus Between Political Leaders and Advisory Systems." Political Psychology 20, no. 1 (1999): 49-98.
Booch, Grady, James Rumbaugh, and Ivar Jacobson. The Unified Modeling Language User Guide. Addison Wesley, 1999.
Bland, Douglas L.. "A Unified Theory of Civil-Military Relations." Armed Forces & Society 26, no. 1 (1999).

Страницы