Biblio

Export 21387 results:
2010
Gonçalves, Joanisval Brito. Quem vigia os vigilantes?: O controle da atividade de inteligência no Brasil e o papel do Poder Legislativo., 2010.
Question Raised over Responsibility for NATO Fuel Convoy Attacks In Strategic Discourse., 2010.
Procházková, Dana. Questionnaire for Special Investigation., 2010.
Random number generation using quantum physics. Random number generation using quantum physics., 2010.
Gayer, Laurent. "The Rangers of Pakistan: From Border Defense to Internal ‘Protection." In Organized Crime and States: The Hidden Face of Politics, 15-39. New York: Palgrave Macmillan, 2010.
Nguyen, Quyen, and A. Sood. Realizing S-Reliability for Services via Recovery-driven Intrusion Tolerance Mechanism In International Conference on Dependable Systems and Networks Workshops. Chicago, 2010.
Hermawati, Fajar Astuti, and Roenadi Koesdijarto. "A Real-Time License Plate Detection System for Parking Access." TELKOMNIKA: Indonesian Journal of Electrical Engineering 51 (2010).
Felgenhauer, Pavel. "Rearmament Declared the Main Issue in Russian Military Reform." Eurasia Daily Monitor 7, no. 122 (2010).
Companjen, Françoise. "Recent Political History of the South Caucasus in the Context of Transition." In Exploring the Caucasus in the 21st Century. Essays on Culture, History and Politics in a Dynamic Context, 113. Amsterdam: Pallas Publications, 2010.
Gehlbach, Scott. "Reflections on Putin and the Media." Post-Soviet Affairs 26, no. 1 (2010): 77-87.
Melnykovska, Inna, and Rainer Schweickert. Regional Security as a Driver of Institutional Change in post-Communist Countries? In Empirical Evidence on NATO Accession Incentives, Kieler Analysen zur Sicherheitspolitik Nr. 26., 2010.
Tagarev, Todor. "Regulatory Frameworks." In Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices, 186-207. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2010.
Horgan, John, and Kurt Braddock. "Rehabilitating the Terrorists?: Challenges in Assessing the Effectiveness of Deradicalization Programs." Terrorism and Political Violence 22, no. 2 (2010): 267-91.
Mullins, Sam. "Rehabilitation of Islamist terrorists: Lessons from Criminology." Dynamics of Asymmetric Conflict 3, no. 3 (2010): 162-93.
Remarks by Herman Van Rompuy, President of the European Council In Lisbon Summit, 2010., 2010.
Clinton, Hillary. Remarks on Internet Freedom., 2010.
Clinton, Hillary Rodham. Remarks on the Future of European Security. Paris: L'Ecole Militaire, 2010.
Elewa, Akinwande A.. Remote Sensing and Detection of Oil Spill Dispersions., 2010.
Scheinin, Martin. Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism. UN General Assembly, Human Rights Council, 2010.
Singel, R.. Report: Teens Using Digital Drugs to Get High., 2010.
Tagarev, Todor. Requirements and constraints in the design and selection of critical infrastructure protection scenarios In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2010.
Daly, John C. K.. Rerouting Logistics In Afghanistan. ISN , 2010.
Rescue Act, adopted., 2010.
Riungu, Leah Muthoni, Ossi Taipale, and Kari Smolander. Research Issues for Software Testing in the Cloud In IEEE Second International Conference on Cloud Com¬puting Technology and Science. Indianapolis, Indiana USA, 2010.
Quan, Wei, Xiaohong Huang, Yan Ma, Xiaosu Zhan, and Jun Wu. Research of Presence Service Testbed on Cloud-Computing Environment In 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT). Beijing, China, 2010.

Pages