Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
2014
Ratner, Michael, and Carol Glover. U.S. Energy: Overview and Key Statistics(link is external) In Congressional Research Service., 2014.
U.S. Government Gain-of-Function Deliberative Process and Research Funding Pause on Selected Gain-of-Function Research Involving Influenza, MERS, and SARS Viruses(link is external)., 2014.
US Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern(link is external)., 2014.
Lawson, S.. "The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affairs 27, no. 2 (2014): 226-245.
Lawson, Sean. "The US military's social media civil war: technology as antagonism in discourses of information-age conflict." Cambridge Review of International Affair 27, no. 2 (2014).
Schmidt, Eric. "US Strategy to Fight Terrorism Increasingly Uses Proxies." New York Times (2014).
Garnaut, John. "US Unsettled by China’s Three Warfares Strategy: Pentagon Report." The Sydney Morning Herald (2014).
Almendra, Vinicius, and Denis Enachescu. "Using Self-Organizing Maps for Binary Classification With Highly Imbalanced Datasets." International Journal of Numerical Analysis and Modeling, Series B 5, no. 3 (2014): 238-254.
Kislov, Daniil. Uzbekistan: Karimov’s Power Unshatterable(link is external). Ferghana Information Agency, 2014.
Malashenko, Alexey. Uzbekistan: No Transition yet Visible. Moscow: The Carnegie Moscow Center, 2014.
Azizov, D.. Uzbekistan Presents Army Development Strategy(link is external). Trend, 2014.
Sakurai, Yoshiki. "The Value Improvement in Education Service by Grasping the Value Acceptance State with ICT Utilized Education Environment." In Human Interface and the Management of Information. Information and Knowledge in Applications and Services. HIMI 2014. Lecture Notes in Computer Science. Vol. 8522. Cham: Springer, 2014.
Sommestad, Teodor, Jonas Hallberg, Kristoffer Lundholm, and Johan Bengtsson. "Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies." Information Management and Computer Security 22, no. 1 (2014): 42-75.
Violence Against Women: Intimate Partner and Sexual Violence Against Women(link is external). World Health Organization, 2014.
Schmid, Alex P.. Violent and Non-Violent Extremism: Two Sides of the Same Coin?(link is external). The Hague: International Centre for Counter-Terrorism, 2014.
Vision 2020: Bulgaria in NATO and the European Defence . Sofia: Ministry of Defence, 2014.
Zhou, Dingfu. Vision-based moving pedestrian recognition from imprecise and uncertain data. Université de Technologie de Compiègne, 2014.
Camacho, José. "Visualizing Big Data with Compressed Score Plots: Approach and Research Challenges." Chemometrics and Intelligent Laboratory Systems 135 (2014): 110-125.
Lyamets, Sergey. Vladimir Dubrovksy: the Top-Down Power Structure Must Be Destroyed(link is external). Ekonomichna Pravda [Economic Truth], 2014.
Vladimir Putin answers journalists’ questions on the situation in Ukraine(link is external). Vol. 4 March 2014. Official website of the President of Russia, 2014.
Ivanova, Dina. Vossoyedineniye s Rossiey: krymchane chotyat vosstanovit’ istoricheskuyu spravedlivost [Reunion with Russia: Crimeans Want to Restore Hystorical Justice](link is external). Vesti.ru, 2014.
’Vyzytka Jarosha,’ yly pjat punktov TV-propagandyi(link is external). BBC Russisan Service, 2014.
Sabak, Juliusz. W Rosji Powstają Prywatne Armie(link is external). Defence24, 2014.
Weitsman, Patricia A.. Waging War, Alliances, Coalitions and Institutions of Interstate Violence. Stanford: Stanford University Press, 2014.
Wales Declaration on the Transatlantic Bond In Press Release. NATO, 2014.

Pages