Biblio

Export 8062 results:
1998
Klein, Gary A.. Sources of Power: How People Make Decisions . Cambridge, MA: The MIT Press, 1998, 1998.
Pantel, Patrick, and Dekang Lin. SpamCop: A Spam Classification & Organisation Program In AAAI-98 Workshop on Learning for Text Categorization. Madison, Wisconsin, 1998.
Gabriole, Zeviar-Geese. "The State of the Law on Cyber Jurisdiction and Cybercrime on the Internet." Gonzaga Journal of International Law, no. 1 (1998).
Jupille, Joseph, and James A. Caporaso. "States, Agency and Rules: The European Union in Global Environment Politics." In The European Union in the World Community, 213-229. Boulder, CO: Lynne Rienner, 1998.
The Strategic Defence Review–1998. London: Ministry of Defence, 1998.
Ryan, Julie J. C. H.. "Student Plagiarism in an On-line World." ASEE Prism Magazine (1998).
Mepham, Simon. Synthetic Environments – Delivering Real Benefits to UK Defence In SimTecT. Adelaide, Australia, 1998.
Semerdjiev, Tzvetan, Vesselin Jilkov, and Donka Angelova. Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
Sidor, David J.. "TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow." IEEE Communications Magazine (1998): 54-64.
Holbrooke, Richard. To end a War. New York, NY: Modern Library, Random House, 1998.
Gunaratna, Rohan. "Trends in Maritime Terrorism: The Sri Lankan Case ." Lanka Outlook (1998).
O’Leary, Daniel E.. "Using AI in Knowledge Management: Knowledge Bases and Ontologies." IEEE Intelligent Systems 13, no. 3 (1998): 34-39.
McElroy, Debbie, and Efraim Turban. "Using Smart Cards in Electronic Commerce." International Journal of Information Management 18, no. 1 (1998): 61-72.
Soloway, Elliot, and Cathleen A. Norris. "Using Technology to Address Old Problems in New Ways." Communications of the ACM 41, no. 8 (1998): 11-18.
Karimov, Islam. Uzbekistan on the Threshold of the Twenty-first Century. New York: St. Martin’s Press, 1998.
Ignatieff, Michael. The Warrior’s Honor: Ethnic War and the Modern Conscience. New York: Metropolitan Books, 1998.
Gladman, Brian. Wassenaar Controls, Cyber-Crime and Information Terrorism, Cyber Rights and Cyber Liberties (UK)., 1998.
Ohbuchi, Ryutarou, Hiroshi Masuda, and Masaki Aono. "Watermarking Three-Dimensional Polygonal Models through Geometric and Topological Modifications." IEEE Journal on Selected Areas in Communications 16 (1998): 551-560.
J. Thompson, Patrick. "Web-Based Enterprize Management Architecture." EEE Communications Magazine (1998): 80-86.
Glaser, Charles, and Chaim Kaufmann. "What is the Offense-Defense Balance?" International Security 22 (1998): 44-82.
Treadwell, Mark B.. When Does an Act of Information Warfare Become an Act of War? Ambiguity in Perception In U.S. Army War College Strategy Research Project., 1998.
Dupree, Nancy Hatch. The Women of Afghanistan. Islamabad: Office of the U.N. Coordinator for Afghanistan, 1998.
Goldfarb, Charles F., and Paul Prescod. The XML Handbook . Englewood Cliffs: Prentice-Hall, 1998.
Neisingh, Cees N. J.. "Zusterkorpsen van de Koninklijke Marechaussee." Armex (1998): 22-25.
Тагарев, Петър. "Концепцията за национална сигурност и информационното противоборство." Информация и сигурност: Международен журнал 1, no. 2 (1998): 33-42.

Страници