Export 8062 results:
Tickler, Peter. The Modern Mercenary, Dog of War, or Soldier of Honour? . Wellingborough: Patrick Stephens, 1987.
Tickler, Peter. The Modern Mercenary, Dog of War, or Soldier of Honour?. Wellingborough: Patrick Stephens, 1987.
Nye, Joseph S.. "Nuclear Learning and U.S.-Soviet Security Regimes." International Organization 41, no. 3 (1987): 372-40.
Miller, William W.. Party Politics, Class Interest, and Reform of the Police 1829–56 In Police Studies., 1987.
Strange, Susan. "The Persistent Myth of Lost Hegemony." International Organizations 41, no. 4 (1987): 555.
Pye, Lucian. "Political Communication." In The Blackwell Encyclopedia of Political Institutions. Oxford: Wiley-Blackwell, 1987.
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence Revisited." International Organization 41, no. 4 (1987): 743.
Boyes, Jon L., and Stephen J. Andriole. "Principles of Command and Control." AFCEA International Press (1987).
Reid, Clifford. "Reflexive Control in Soviet Military Planning." In Soviet Strategic Deception, edited by Brian Daily and Patrick Parker, 293-311. Lexington, Mass.: Lexington Books, 1987.
Johnson, Thomas H., and Robert S. Kaplan. Relevance Lost: The Rise and Fall of Management Accounting. Boston: Harvard Business School Press, 1987.
Jonker, Roy, and Ton Volgenant. "A Shortest Augmenting Path Algorithm for Dense and Sparse Assignment Problems." Computing 38 (1987): 325-340.
Chaum, David. "Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Großen Bruder der Vergangenheit angehören lassen - Zur Diskussion gestellt." Informatik-Spektrum 10, no. 5 (1987): 262-277.
Elfes, A.. "Sonar-based real-world mapping and navigation." IEEE Journal of Robotics Automat. 3 (1987): 249-265.
Sartori, Giovanni. The Theory of Democracy Revisited . Chatham, NJ: Chatham House Publishers, 1987.
Sage, Andrew P., and William B. Rouse. "Aiding the Decision-Maker through the Knowledge-Based Sciences." IEEE SMC 16, no. 4 (1986).
Dobson, John E., and Brian Randell. Building Reliable Secure Computing Systems out of Unreliable Insecure Components In IEEE Symposium on Security and Privacy . Oakland, California, USA, 1986.
Holden, Arun V.. Chaos Non-Linear Science; Theory and Applications. Manchester, UK: Manchester University Press, 1986.
Shafer, G.. "The Combination of Evidence." International Journal of Intelligent Systems (1986): 155-179.
Shafer, G.. "The Combination of Evidence." International Journal of Intelligent Systems 1 (1986): 155-179.
Canny, John. "A Computational Approach to Edge Detection." IEEE Transactions on Pattern Analysis and Machine Intelligence 8, no. 6 (1986): 679-714.
Waltz, Edward L., and Dennis M. Buede. "Data Fusion and Decision Support for Command and Control." In IEEE Transactions on Systems, Man, and Cybernetics , 865-879. Vol. 6., 1986.
Hopple, G.W.. "Decision Aiding Dangers: The Law of the Hammer and Other Maxims." IEEE Transactions on Systems, Man and Cybernetics SMC 16, no. 6 (1986): 948-963.
Jenkins, Brian M.. "Defense Against Terrorism." Political Science Quarterly 101, no. 5 (1986): 778.
Avizienis, Algirdas, and Jean-Claude Laprie. "Dependable Computing: From Concepts to Design Diversity." Proceeding of the IEEE 74 (1986).
Benaloh, Josh C., and Moti Yung. Distributing the Power of a Government to Enhance the Privacy of Voters In 5th Annual ACM Symposium on Principles of Distributed Computing (PODC) (Calgary, Alberta, Canada). New York, USA: ACM, 1986.