Biblio

Export 21393 results:
2014
Bourdon, Sean, Benoît Arbour, and Matthew R. MacLeod. "A method for hierarchically prioritizing capabilities with an application to military manned and unmanned aerial vehicles." Journal of Applied Operational Research 6, no. 1 (2014): 39-47.
Paul, Christopher, Colin P. Clarke, and Chad C. Serena. Mexico Is Not Colombia: Alternative Historical Analogies for Responding to the Challenge of Violent Drug-Trafficking Organizations In Supporting Case Studies. RAND Corporation, 2014.
Pawłowski, Michał. Międzynarodowe Standardy Ścigania Handlu Ludźmi i Ochrony Jego Ofiar. Warszawa: Helsińska Fundacja Praw Człowieka, 2014.
Jensen, Jørgen Albræk. "Military Law in Denmark." In European Military Law Systems, 239., 2014.
Setzekorn, Eric. "Military Reform in Taiwan: The Lafayette Scandal, National Defense Law and All-Volunteer Force ." American Journal of Chinese Studies 21, no. 1 (2014): 7-19 .
Szpyra, Ryszard. "Military Security within the Framework of Security Studies: Research Results." Connections: The Quarterly Journal 13, no. 3 (2014): 59-82.
Lescovec, Jure, Anand Rajaraman, and Jeffrey D. Ullman. Mining of Massive Datasets. Second ed. Cambridge: Cambridge University Press, 2014.
Minutes of a plenary session of the Supreme Rada of Ukraine (Parliament of Ukraine). Parliament of Ukraine, 2014.
Toktakunov, Nurbek. Mirror statistics of the Kyrgyz Republic, 2008-2012. Bishkek, 2014.
Bonin, Bernard, Henri Safa, and Axel Laureau. "MIXOPTIM: A Tool for the Evaluation and the Optimization of the Electricity Mix in a Territory." European Physical Journal Plus 129 (2014): 1-15.
Tabuenca, Bernardo, Marco Kalz, Stefaan Ternier, and Marcus Specht. Mobile authoring of open educational resources for authentic learning scenarios. Welten Institute – Research Centre for Learning, Teaching and Technology Open University of the Netherlands, 2014.
Lixandroiu, Radu, and Catain Maican. "A Model for Comparing Free Cloud Platforms." Informatica Economica 18, no. 4 (2014): 40-49.
Bozhilova, Maya. Modeling Interactions in Mobile Distributed Networks . Sofia: Intel Entrance Publishing House, 2014.
Bernardi, Simona, Lacramioara Dranca, and José Merseguer. Modelling and Verification of Survivability Requirements for Critical Systems In Software Engineering and Formal Methods SEFM 2014 Collocated Workshops: HOFM, SAFOME, OpenCert, MoKMaSD, WS-FMDS. Grenoble, France, 2014.
Skillicorn, David, Quan Zheng, and Carlo Morselli. "Modelling Dynamic Social Networks Using Spectral Embedding." Social Network Analysis and Mining 4 (2014): 182.
Novikova, Gayane. "The Models of Sovereignty in the South Caucasus." Connections: The Quarterly Journal 13, no. 2 (2014): 93-104.
Minchev, Z., and S. Feimova. Modern Social Networks Emerging Cyber Threats Identification: A Practical Methodological Framework with Examples In 6th AFCEA Sixth Young Scientists Conference 'Future of ICT', at NATO C4ISR Industry Conference. Bucharest, Romania, 2014.
Acheson, Ray. "Money, Masculinities, and Militarism: Reaching Critical Will’s Work for Disarmament." In Gender and Militarism: Analyzing the Links to Strategize for Peace, 15. The Hague: Women Peacemakers Program (WPP), 2014.
Tavrovsky, Yuriy. Moscow – Beijing: A new strategic axis?. Vol. 6 March 2014. Zavtra, 2014.
Goble, Paul. "Moscow Patriarchate’s Backing of Russian Aggression Undermining Russian Orthodox Church Everywhere." The Interpreter (2014).
Wiggins, Bryan, Sarah Evans, Joseph Luchman, and Jennifer Gibson. "Motivators and Barriers to Recruiting Prior Service Members in the IRR." Military Psychology 26, no. 1 (2014).
Inbar, Efraim, and Eitan Shamir. "‘Mowing the Grass’: Israel’s Strategy for Protracted Intractable Conflict." Journal of Strategic Studies 37, no. 1 (2014).
"Muhammad Feyyaz, Youth Extremism in Pakistan – Magnitude, Channels, Resident Spheres and Response." Defence Against Terrorism Review 6, no. 1 (2014): 63-92.
Wang, Ning, Li Lu, Ge Gao, Fanglin Wang, and Shi Li. "Multibiometrics fusion using Aczél-Alsina triangular norm." KSII Transactions on Internet and Information Systems 8, no. 7 (2014).
Minchev, Z., and E. Kelevedjiev. Multicriteria Assessment Scale of Future Cyber threats Identification In International Conference “Mathematics Days in Sofia”., 2014.

Pages