Biblio

Export 8432 results:
1998
Schmidl, Erwin. "Police Functions in Police Operations." In Policing the New World Disorder: Peace Operations and Public Security, 40. Washington, D.C.: National Defense University Press, 1998.
Oakley, Robert B., Michael Dziedzic, and Eliot M. Goldberg. Policing the New World Disorder: Peace Operations and Public Security. Washington D.C.: National Defense University Press, 1998.
McChesney, Robert. "The Political Economy of Global Media." Media and Development 45, no. 4 (1998).
Schmid, Alex P., and Albert J. Jongman. Political Terrorism: A New Guide to Actors, Concepts, Data Bases, Theories, and Literature. New Brunswick, NJ: Transaction Books, 1998.
Brooks, Risa. Political-Military Relations and the Stability of Arab Regimes In Adelphi Paper. International Institute for Strategic Studies, 1998.
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998): 81-94.
Tarrow, Sidney. Power in Movement: Social Movements and Contentious Politics. New York: Cambridge University Press, 1998.
Cramer, Ronald, and Victor Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Cipher Attack In Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology Crypto’98. Santa Barbara, California, USA, 1998.
Shearer, David. "Private Armies and Military Intervention." Adelphi Paper No. 316 IISS (1998): 76.
S., Ferson, and Donald S.. Probability bounds analysis In International Conference on Probabilistic Safety Assessment and Management (PSAM4). New York: Springer-Verlag, 1998.
S., Parsons. "A proof theoretic approach to qualitative probabilistic reasoning ." Int.J. of Approx. Reas 19 (1998): 265-297.
Proposal for Government Service Network (GSN) of the Electronic/Networked Government Program. Data Communication Group of Chunghwa Telecom Co. Ltd., 1998.
Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." In 30th Annual ACM Symposium on Theory of Computing. Dallas, Texas, USA, 1998.
Burr, William E.. Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Operations In NIST FPKI, Working Draft., 1998.
Hampson, Fen Osler, and Dean F. Oliver. "Pulpit Diplomacy: A Critical Assessment of the Axworthy Doctrine." International Journal 53 (1998): 379-406.
Bryson, N, and AA Mobolurin. A qualitative discriminant approach for generating In IEEE Transactions on Knowledge and Data Engineering. 2nd ed. Vol. 10., 1998.
Reactor Safety Study – An Assessment of Accident Risk in U.S. Commercial Nuclear Power Plants, WASH-1400 (NUREG-75/014)., 1998.
Herbst, Susan. Reading the Public Opinion: How Political Actors View The Democratic Process. Chicago: University of Chicago Press, 1998.
Angell, Ian. "The Real Politik of the Information Age." Information Strategy (1998).
Lovering, John. "Rebuilding the European Defence Industry in a Competitive World: Intergovernmentalism and the Leading Role Played by Companies." In Restructuring the Global Military Sector: The End of Military Fordism, 225-27. Vol. II. London: Pinter, 1998.
Shalamanov, Velizar, and Todor Tagarev. Reengineering Defense Planning in Bulgaria In Research Report. Sofia: Institute for International and Security Studies, 1998.
Shalamanov, Velizar, and Todor Tagarev. Reengineering the Defense Planning in Bulgaria In ISIS Reports. Sofia: Institute for Security and International Studies, 1998.
Peimani, Hooman. Regional Security and the Future of Central Asia. Westport, CT: Praeger, 1998.

Страницы