Biblio
Export 8458 results:
Regional Security and the Future of Central Asia. Westport, CT: Praeger, 1998.
Reinventing Diplomacy in the Information Age . Washington, DC: Center for Strategic and International Studies, 1998.
Requirements for Access Control: US Healthcare Domain In 3rd ACM Workshop on Role-Based Access Control. Vol. 43. Fairfax, Virginia, USA, 1998.
Res 1199/1988. UNSC, 1998.
Res 1203/1998. UNSC, 1998.
Resolution 1199. UN Security Council, 1998.
Resolution 1203. UN Security Council, 1998.
Resolution of Ratification of the Protocols to the North Atlantic Treaty of 1949 on the accession of Poland, Hungary, and the Czech Republic In Cong. Rec., 1998.
Reversing the Gun Sights: Transnational Civil Society Targets Land Mines." International Organization 52, no. 3 (1998): 613-644.
"A review of uncertainty handling formalisms." Applications of Uncertainty Formalisms (1998): 8-37.
"A roadmap of agent research and development." Autonomous Agents and Multi-Agent Systems 1, no. 1 (1998): 7-38.
"Rossiya – Chechnya: Tsep oshibok i prestuplenii. Moscow: Zvenya, 1998.
Sailor Kills Himself After Standoff in Sub." The Moscow Times (1998).
"Sea Lines of Communication (SLOC) Security and Access In IGCC Policy Paper. Institute on Global Conflict and Cooperation, University of California, 1998.
Security and Stability in Uzbekistan: Challenges, Threats and Solutions. Partnership for Peace Information Systems Conict Studies Research Center, 1998.
The Self – Reproducing Inflationary Universe." Scientific American Presents 9, no. 1 (1998).
"Self-Organised Criticality . Cambridge, UK: Cambridge University Press, 1998.
Sensors For Peace: Applications, Systems And Legal Requirements For Monitoring In Peace Operations." New York: United Nations Publication (1998).
"An SGML-Based Office Document Exchange and Management In SGML/XML Europe’98 . Paris, France, 1998.
Small States Inside and Outside the European Union: Interests and Policies. Boston, MA: Kluwer Academic Publishers, 1998.
A Smartcard-Based Framework for Secure Document Exchange In IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology. Washington D.C., USA, 1998.
The Soldier and the State. Sofia: Military Publishing House, 1998.
Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems." Soft Computing 2 (1998): 23-25.
"Sources of Power: How People Make Decisions . Cambridge, MA: The MIT Press, 1998, 1998.
Страницы
- « первая
- ‹ предыдущая
- …
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- …
- следующая ›
- последняя »