Biblio

Export 8458 results:
1998
Denning, Dorothy E., and Peter J. Denning. Internet Besieged: Countering Cyberspace ScofflFaws. ACM Press, Addison Wesley Professional, 1998.
Pless, Vera. Introduction to the Theory of Error-Correcting Codes. Third ed. New York, NY: Wiley, 1998.
Introductory to the Electronic/Networked Government Program. Research Development and Evaluation Commission of the Executive Yuan, 1998.
Mitchell, Gay. Ireland and the Partnership for Peace Initiative: Our Place in the New European Security Architecture. Dublin: Fine Gael, 1998.
Davidson, Lawrence. Islamic Fundamentalism. Westport, CT: Greenwood Press, 1998.
Joint Statement on Common Security Challenges at the Threshold of the Twenty-First Century., 1998.
Bricault, Dennis. Legal Aspects of Academic Dishonesty: Policies, Perceptions, and Realities., 1998.
Williams, John. Legitimacy and the Rise and Fall of Yugoslavia. London: McMillan, 1998.
Barnier, Frédérique. "Les Transformations des Relations entre l’État et les Producteurs d’Armement: le Cas de GIAT-Industries." In État et Firmes d’Armement en Europe, 107-16. Vol. 22. Paris: CIRPES, Collection Cahier d’Études Stratégiques, 1998.
Kukathas, Chandran. "Liberalism and Multiculturalism: The Politics of Indifference." Political Theory 26, no. 5 (1998): 686-699.
Judge, P.. "Little guys still say NO to the net." Business Week (1998): 134.
Crenshaw, Martha. "The Logic of Terrorism: Terrorist Behavior as a Product of Strategic Choice." In Origins of Terrorism: Psychologies, Ideologies, Theologies, States of Mind. Washington D.C.: Woodrow Wilson Center Press and Johns Hopkins, 1998.
Semerdjiev, Emil, Tzvetan Semerdjiev, and Ludmila Mihaylova. Maneuvering Ship Model Identification and IMM Tracking Algorithm Design In First International Conference on Multisource-Multisensor Information Fusion’98. Las Vegas, Nevada, 1998.
Jones, D., T. Bench-Capon, and P. Visser. Methodologies for ontology development In IT&KNOWS - Information Technology and Knowledge Systems, 15th IFIP World Computer Congress. Vienna, Austria, and Budapest, Hungary, 1998.
Bishop, Peter, and Robin Bloomfield. Methodology for Safety Case Development In Sixth Safety-critical Systems Symposium, Birmingham., 1998.
Bishop, Peter, and Robin Bloomfield. Methodology for Safety Case Development In Sixth Safety-critical Systems Symposium. Birmingham, UK, 1998.
Danopoulos, Constantine, and Daniel Zirker. Military and Society in the Former Soviet Bloc . Boulder: Westview Press, 1998.
Arbatov, Alexei G.. "Military Reform in Russia: Dilemmas, Obstacles, and Prospects." International Security 22, no. 4 (1998): 83.
Kang, Keebom, and Ronald J. Roland. "Military Simulation." In Handbook of Simulation: Principles, Methodology, Advances, Applications, and Practice, edited by Jerry Banks. Engineering & Management Press and John Wiley & Sons, Inc, 1998.
Mehrotra, Asha, and Leonard Golding. Mobility and Security Management in the GSM System and Some Proposed Future Improvement In IEEE. Vol. 7. 86 7., 1998.
Hohl, F.. A model of attacks malicious hosts against mobile agents In 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations ., 1998.
Pew, Richard W., and Anne S. Mavor. Modeling Human and Organizational Behavior: Application to Military Simulations. Washington, D.C.: National Academy Press, 1998.
Alvarado, Ernesto, David V. Sandberg, and Stewart G. Pickford. "Modeling Large Forest Fires as Extreme Events." Northwest Science 72 (1998): 66-75.
Istepanian, Robert S. H.. Modeling of a GSM-Based Mobile Telemedical System In Conference of the IEEE Engineering in Medical and Biology . Hong Kong, 1998.
Knoblock, Craig A., Jose Luis Ambite, Naveen Ashish, and Steven Minton. Modeling web sources for information integration In Fifteenth National Conference on Artificial Intelligence . Madison, Wisconsin, 1998.

Страницы