Biblio

Export 21423 results:
Filters: Www.state.gov is secretary and Rm is 2011 and 11 is 176999.htm  [Clear All Filters]
2000
Andreeva, Plamena, N. Tchingov, and R. Michel. Cluster Analysis for Fuzzy Control Systems(link is external) In IFAC Conference CSD’2000 . Bratislava, Slovak Republic, 2000.
Popov, Metodi. Coding in the Cellular Communications. Sofia: ProCon, 2000.
Diedrichsen, Loren. "Command and Control: Operational Requirements and System Implementation." Information & Security: An International Journal 5 (2000): 23-40.
Common Strategies In Report by the Secretary-General/High Representative., 2000.
Common Strategy of the European Union on the Mediterranean Region In Presidency Conclusions, European Council, Feira., 2000.
Checkel, Jeffrey T.. Compliance and Conditionality(link is external) In ARENA Working Papers., 2000.
Kaster, Joegen, and Annette Kaster. Componentware Approaches in Management Information Systems In HFM Workshop . The Hague, 2000.
Marvel, Lisa, George Hartwig, and Charles Boncelet. "Compression-compatible Fragile and Semi-Fragile Tamper Detection(link is external)." In SPIE EI Photonics West 2000., 2000.
Vraikov, Nikolay, and Alexi Naidenov. "The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces(link is external)." Information & Security: An International Journal 3 (2000): 119-131.
Naidenov, Alexi, and Nikolay Vraikov. Computer assisted Exercises(link is external). Sofia: Military Publishing House, 2000.
Groot, Peter J. M.. "Computer Assisted Second Language Vocabulary Acquisition(link is external)." Language Learning and Technology 4, no. 1 (2000): 60-81.
Ewen, D., T Flynn, D Miller, and D Dion. Computer Generated Forces Applications to a Simulation Based Acquisition Smart Product Model for SC-21 In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Mel’nik, N.. "The concept of corruption (Поняття корупції)." In Korruptsiia i bor’ba s nei (Corruption and the battle with it), 218-19. Moscow, 2000.
Brzoska, Michael. The Concept of Security Sector Reform(link is external) In Brief 15: Security Sector Reform . Bonn, Germany: Bonn International Center for Conversion, 2000.
Garay, Juan A., and Philip D. MacKenzie. Concurrent Oblivious Transfer(link is external) In 41st Annual IEEE Symposium on Foundations of Computer Science FOCS 2000 . Redondo Beach, California, USA: IEEE Computer Society Press, 2000.
Tanner, Fred. Conflict Prevention and Conflict Resolution: The Limits to Multilateralism(link is external) In International Review of the Red Cross., 2000.
Pope, Jeremy. Confronting Corruption: The Elements of a National Integrity System(link is external). Vol. 1. Berlin: Transparency International, 2000.
Pope, Jeremy. "Confronting Corruption: The Elements of a National Integrity System." In TI Source Book . Berlin: Transparency International, 2000.
Rho-Ng, Elizabeth. "The Conscription of Asian Sex Slaves: Causes and Effects of U.S. Military Sex Colonialism in Thailand and the Call to Expand U.S. Asylum Law(link is external)." Asian Law Journal 7 (2000): 103-150.
Luthar, Suniya, Dante Cicchetti, and Bronwyn Becker. "The Construct of Resilience: A Critical Evaluation and Guidelines for Future Work." Child Development 71, no. 3 (2000): 543-562.
Morris, Stephen. "Contagion." The Review of Economic Studies 67, no. 1 (2000): 57-78.
Nickolov, Eugene. "Contemporary Trends in the Development of Information Security and Computer Virology." Information & Security: An International Journal 4 (2000): 60-72.
Korneev, V.V., and S.V. Sajin. "Control System for Computers Functionality and Network on Basis of Using Neural Nets(link is external)." Neural Computers: Development and Application 1 (2000).
Cohen, Richard. Cooperative Security: Framework for a Better Future? In World Defense Systems 2000. Royal United Services Institution, 2000.
Chwistecka-Dudek, Halina, and Włodzimierz Sroka. "Core competencies – koncepcja strategiczna." Przegląd Organizacji 16, no. 3 (2000): 15-20.

Pages