Biblio

Export 8458 results:
1994
Benaloh, Josh C., and Dwight Tuinstra. Receipt-Free Secret-Ballot Elections (extended abstract) In Twenty-Sixth Annual ACM Symposium on Theory of Computing STOC’94 (Montreal, Quebec, Canada). New York, USA: ACM, 1994.
Nalbandian, John. "Reflections of a ‘Pracademic’ on the Logic of Politics and Administration." Public Administration Review 54, no. 6 (1994): 531-536.
Chang, Chin-Chen, and Wen-Yuan Liao. "A Remote Password Authentication Scheme Based upon ElGamal’s Signature Scheme." Computers & Security 13, no. 2 (1994): 137-144.
S.K.M., Wong, and Lingras P.. "Representation of qualitative user preference by quantitative belief functions." IEEE Transactions on Knowledge and Data Engineering 6, no. 1 (1994): 72-78.
Mintzberg, Henry. The Rise and Fall of Strategic Planning. New York: Prentice Hall, 1994.
Mintzberg, Henry. "The Rise and Fall of Strategic Planning." New York, NY: The Free Press (1994).
Tagarev, Todor, and Velizar Shalamanov. The Role of Education and Training in the Field of C4I In AFCEA-Europe Budapest Seminar. Budapest, 1994.
Rwanda: Death, Defiance, Despair. London: African Rights, 1994.
Sako, Kazue, and Joe Killian. Secure Voting Using Partially Compatible Homomorphisms In Advances in Cryptology--CRYPTO’94, Lecture Notes in Computer Science 839. Berlin: Springer-Verlag, 1994.
Bandura, Albert. "Self-efficacy." In Encyclopedia of Human Behavior, 77-81. Vol. 4. New York, NY: Academic Press, 1994.
Forrest, Stephanie, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri. Self-Nonself Discrimination in a Com¬puter In IEEE Symposium on Research in Security and Privacy. Oakland, CA, 1994.
Coen, Michael. SodaBot: A Software Agent Environment and Construction System. MIT AI Lab, 1994.
Genesereth, M.R., and A.P. Ketchpel. "Software agents." Communication of the ACM 37, no. 7 (1994): 48-53.
Tselkov, Veselin. A software security tools for information protection in PCs – “CS_SECURE_TOOLS In First National Conferences “INFORMATIC’94. Sofia, Bulgaria: SAI, 1994.
S., Parsons. "Some qualitative approaches to applying Dempster-Shafer theory." Information and Decision technologies 19 (1994): 321-337.
M.P., Wellman. Some varieties of qualitative probability In 5th International Conference on Information Processing and the Management of Uncertainty. Paris France, 1994.
Arquilla, John. "The Strategic Implications of Information Dominance." Strategic Review 22 (1994): 22-34.
Robson, Wendy. Strategic Management and Information Systems: An Integrated Approach. Second ed. Essex, UK: Pearson Education Ltd., 1994.
Ph., Smets, and Kennes R.. "The transferable Belief Model." Artificial Intelligence 66, no. 2 (1994): 191-234.
Ilyin, Leonid A.. "Truth and Myth of Chernobyl ." In Fifteen Years after the Chernobyl Accident. Moscow, 1994.
Chawathe, S., H. Garcia-Molina, J. Hammer, K. Ireland, Y. Papakonstantinou, J. Ullman, and J. Widom. The TSIMMIS project: Integration of heterogeneous information sources In 10th IPSJ. Tokyo, Japan, 1994.
Picco, Giandomenico. "The U.N. and the Use of Force." Foreign Affairs 73 (1994).
Best, Geoffrey. War and Law since 1945. Oxford: Clarendon Press, 1994.
R. Holder, Clemente. Washington Report Archives 1994-1999., 1994.
Goshko, John M.. "Yeltsin Claims Russian Sphere of Influence." The Washington Post (1994).

Страницы