Biblio

Export 21393 results:
2013
Shahraiyni, Hamid Taheri, Mohammad Reza Gafourhi, Bahram Saghafi An, and Saeed Bagheri Shouraki. "Evaluation of a novel fuzzy method and a conceptual model for a long-term daily streamflow simulation." River Systems 20, no. 3-4 (2013).
Prima, Edit, Rudi Lumanto, and Zainal A. Hasibuan. "Evaluation of Government Public Key Infrastructure Implementation based on eGovAMAN Framework." In 4th International Symposium on Chaos Revolution in Science, Technology and Society . Chaosware, 2013.
Al-Janabi, Shaimaa, Henk-Jan van Slooten, Mike Visser, Tjeerd van der Ploeg, Paul J. van Diest, and Mehdi Jiwa. "Evaluation of mitotic activity index in breast cancer using whole slide digital images." PloS one 8, no. 12 (2013).
Lenette, Caroline, Mark Brough, and Leoni Cox. "Everyday Resilience: Narratives of Single Refugee Women with Children." Qualitative Social Work 12, no. 5 (2013): 637-653.
Davis, Jessica. "Evolution of the Global Jihad: Female Suicide Bombers in Iraq." Studies in Conflict & Terrorism 36, no. 4 (2013): 279-91.
Georgiev, S., and Z. Minchev. An Evolutionary Prototyping for Smart Home Inhabitants Wearable Biomonitoring In Conjoint Scientific Seminar ‘Modelling & Control of Information Processes’. Vol. 12. Sofia: Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, 2013.
Niculescu, George V.. The Evolving Challenges in Eurasia In Brief Analysis. Center for East European and Asian Studies, 2013.
Fitzgerald, Joel F.. Examining Police Officer Perceptions of the Effects of College Education on Police Practices in Three Texas Police Departments. Vol. Ph.D. Northcentral University, 2013.
Ex-CIA agent convicted of Italian kidnapping and held in Panama returning to US. Vol. March 22, 2014. FOX News, 2013.
Shuster, Simon. "Exclusive: Dagestani Relative of Tamerlan Tsarnaev Is a Prominent Islamist." Time Magazine (2013).
Ball, James, Julian Borger, and Glenn Greenwald. "Exclusive: how US and Britain unlock privacy on the internet." Guardian (2013): 1, 4-5.
Exclusive interview with Vladimir Putin to Perviy kanal TV and the Associated Press. Vol. 4 August 2013., 2013.
Klaidman, Daniel. Exclusive: The Awlaki/Tsarnaev Connection. The Daily Beast, 2013.
Executive Order - Improving Critical Infrastructure Cybersecurity., 2013.
Executive Order — Improving Critical Infrastructure Cybersecurity. The White House, Office of the Press Secretary, 2013.
Mikolov, Tomas, Quoc V. Le, and Ilya Sutskever. "Exploiting Similarities among Languages for Machine Translation." arXiv: Computation and Language (2013).
Zhao, Fang, and Linzi Kemp. "Exploring individual, social and organisational effects on Web 2.0-based workplace learning: a research agenda for a systematic approach." Research in Learning Technology 21 (2013).
Exposing One of China’s Cyber Espionage Units. Mandiant APT 1, 2013.
The White House. Fact Sheet: BRAIN Initiative., 2013.
Ezrow, Natasha M., and Erica Frantz. Failed States and Institutional Decay: Understanding Instability and Poverty in the Developing World. Bloomsbury Publishing USA, 2013.
Hooghe, An, and Robert A. Neimeyer. "Family Resilience in the Wake of Loss: A Meaning-Oriented Contribution." In Handbook of Family Resilience, 269-284. New York: Springer, 2013.
Dimock, Michael. Few See Adequate Limits on NSA Surveillance Program but More Approve than Disapprove In poll conducted on 17-21 July 2013. Pew Research Center,, 2013.
Luna, David M.. Fighting Networks with Networks In Center for Complex Operations. National Defense University Press, 2013.
Ince, Matt. "Filling the FARC-Shaped Void." RUSI Journal 158, no. 5 (2013): 27.
Finland’s Cybersecurity Strategy Government Resolution., 2013.

Pages