Biblio

Export 8432 results:
1996
Slim, Hugo. "The Continuing Metamorphosis of the Humanitarian Practitioner: Some New Colours for an Endangered Chameleon." Disasters 192, no. 2 (1996).
Jennings, Nicholas R.. Coordination Techniques for Distributed Artificial Intelligence . O'Hare, 1996.
Nikolaidis, Nikos, and Ioannis Pitas. Copyright Protection of Images using Robust Digital Signatures In IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP-96). Vol. 4. Atlanta, Georgia, 1996.
Council of Ministers communiqué. Tunis, 1996.
Council Regulation (EC) No 1257/96 of 20 June 1996 concerning humanitarian aid. Official Journal of the European Communities L163, 1996.
Tselkov, Veselin, Dragomir Pargov, and Rusin Petrov. Criteria of Computer System Security Assessment and Evaluation In nformation Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia: AFCEA-Sofia, 1996.
Schneier, Bruce. Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. New York, NY: John Wiley & Sons, 1996.
Council, National Research. "Cryptography’s Role in Securing the Information Society ." National Academy Press (1996).
Mandelbaum, Michael. The Dawn of Peace in Europe. New York: The Twentieth Century Fund Press, 1996.
Anderson, R. H., and A. C. Hearn. The Day After in Cyberspace II. Santa Monica, CA: RAND Corporation, 1996.
Ivefors, Gunilla. Defeat the enemy before battle - a warfare revolution in the 21-st century., 1996.
Dombrowsky, Wolf R., and Christian Brauner. Defizite der Katastrophenvorsorge in Industriegesellschaften am Beispiel Deutschlands. Untersuchungen und Empfehlungen zu methodischen und inhaltlichen Grundsatzfragen In Deutsche IDNDR Reihe. Bonn: INDR, 1996.
Joo, Rudolf. Democratic Control of Armed Forces. Paris: Institute for Security Studies of WEU, February, 1996.
Freeman, Chas W.. The Diplomat’s Dictionary . Washington, D.C.: National Defense University Press, 1996.
Sycara, K., K. Decker, A. Pannu, M. Williamson, and D. Zeng. "Distributed intelligent agents." IEEE Expert-Intelligent Systems and Their Applications 11, no. 6 (1996): 36-45.
"Do Institutions Make a Difference? Non-Institutionalism, Neo-Institutionalism, and the Logic of Common Decision-Making in the European Union." Governance 9 (1996): 217-240.
Miller, Duncan C.. "The DOD High Level Architecture and The Next Generation of DIS." In 14th DIS Workshop ., 1996.
Barbieri, Katherine. "Economic Interdependence: A Path to Peace or a Source of Interstate Conflict?" Journal of Peace Research 33, no. 1 (1996): 34.
Warner, John T., and Beth J. Asch. "The Economics of Military Manpower." In Handbook of Defense Economics, 347-398. Amsterdam: , 1996.
Matsui, Kineo, Junji Ohnishi, and Yasuhiro Nakamura. "Embedding a Signature to Pictures under Wavelet Transform." IEICE Transactions J79-D-II 6 (1996): 1017-1024.
Hsu, C.. Enterprise Integration and Modeling - the Metadatabase Approach. Boston, Mass., USA: Kluwer Academic Publisher, 1996.
Waever, Ole. "European Security Identities." Journal of Common Market Studies 34, no. 1 (1996): 103-32.
Caporaso, James A.. "The European Union and Forms of State: Westphalian, Regulatory or Post-modern?" Journal of Common Market Studies 34, no. 1 (1996): 29-52.
Tchamova, Albena. Evidence Reasoning Logic and Fuzzy Set Theory: Combined Method for Resolving Dempster's Rule Indefiniteness in a Case of Conflicting Evidence In 4th European Congress on Intelligent Techniques and Soft Computing. Vol. 1. Aachen, Germany, 1996.
Anderson, Robert H., and Anthony Hearn. An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: “The Day After ... in Cyberspace II. Santa Monica: RAND, 1996.

Страницы