Export 8062 results:
Reid, D.B.. "An Algorithm for Tracking Multiple Targets." IEEE Transactions on Aerospace and Electronic Systems AES-17 (1981): 122-130.
Smith, J.Q., E.C. Zeeman, and P.J. Harrison. "The Analysis of Some Discontinuous Decision Processes." European Journal of Operational Research 7 (1981): 30-43.
Clavell, J.. The Art of War By Sun Tzu . London, England: Hodder and Stoughton, 1981.
Crenshaw, Martha. "The Causes of Terrorism." Comparative Politics 13, no. 4 (1981): 383-84.
O’Brien, William V.. The Conduct of War and Limited War . New York: Praeger, 1981.
Dougherty, James F., and Robert L. Pfaltzgraff. Contending Theories of International Relations. New York: Harper and Row, 1981.
Volkov, L.I.. Control of Air Complexes Operation ., 1981.
Davida, George I., John B. Kam, and David L. Wells. "A Database Encryption System with Subkeys." ACM Transactions on Database Systems 6, no. 2 (1981): 312-328.
O’Neil, William F.. Educational Ideologies: Contemporary Expressions of Educational Philosophies . Santa Monica, CA: Goodyear Publishing Company, 1981.
Chaum, David L.. "Electronic Mail, Return Address, and Digital Pseudonyms." Communication of the ACM 24 (1981): 84-88.
Rabin, Michael O.. How to Exchange Secrets by Oblivious Transfer. Harvard University: Aiken Computation Laboratory, 1981.
Hydrologic Reference Book of the Rivers in the Republic of Bulgaria. Vol. I. Hydrology and Meteorology, BAS, 1981.
Dubin, G. N., and V. G. Suzdal. "Introduction to Applied Game Theory (in Russian)." In Game Theory. Moscow: Science, 1981.
Johnson, James Turner. Just War Tradition and the Restraint of War: A Moral and Historical Inquiry. Princeton: Princeton University Press, 1981.
Shariati, Ali. Martyrdom: Arise and Bear Witness, trans. Ali Ghassemy. Tehran: Ministry of Islamic Guidance, 1981.
Auten, James H.. The Paramilitary Model of Police and Police Professionalism In Police Studies 4., 1981.
L., Lamport. "Password Authentication with Insecure Communication." Communications of the ACM 24, no. 11 (1981): 770-772.
Kay, S.M., and S. L. Marple. "Spectrum Analysis. A Modern Perspective." IEEE 69, no. 11 (1981): 1380-1419.
Sterling, Claire. The Terror Network: The Secret War of International Terrorism . New York: Henry Holt & Co , 1981.
Chaum, David L.. "Untraceable Electronic Mail, Return Address and Digital Pseudonyms." Communictions of the ACM 24, no. 2 (1981): 84-88.