Biblio

Export 21373 results:
1999
Bojanov, E., and I. Vuchkov. Statistical Methods for Modeling and Optimization of Multi-Factor Objects ., 1999.
Statistical yearbook of Ukraine for 1998 (Статистичний щорічник України за 1998 рік)., 1999.
Krulak, Charles C.. "The Strategic Corporal: Leadership in the Three Block War." Marines Magazine 2, no. 8 (1999).
Walton, John. Strategic Human Resource Development. Harlow: Pearson Education Limited, 1999.
Yu, E.. Strategic modelling for enterprise integration In 14th World Congress of the International Federation of Automatic Control. Beijing, China: IFAC, 1999.
McAndrew, Duncan. "The Structural Analysis of Criminal Networks." In The Social Psychology of Crime: Groups, Teams and Networks. Aldershot, UK: Ashgate Publishing, 1999.
Bunce, Valerie. Subversive Institutions: The Design and the Destruction of Socialism and the State. Cambridge: Cambridge University Press, 1999.
Fischmeister, S., and W. Lugmayr. The supervisor-worker pattern In Pattern Languages of Programs PLoP'99. Kubova Hut, Czech Republic, 1999.
Burk, James. "Support for Peacekeeping in Lebanon and Somalia: Assessing the Casualties Hypothesis." Political Science Quarterly 114, no. 1 (1999).
Arquilla, John, and David Ronfeldt. Swarming and the Future of Conflict. Rand Corporation, National Defense Research Institute, 1999.
Wingfield, Thomas. "Taking Aim at Regime Elites: Assassination, Tyrannicide, and the Clancy Doctrine." Maryland Journal of International Law and Trade 22 (1999).
Schlag, Peter M., Thomas K. Moesta, Stefan Rakowsky, and Georgi Graschew. "Telemedicine – The New Must for Surgery." Archives of Surgery 134 (1999): 1216-1221.
Meyers, Reinhard. Temeljni pojmovi i teorijske perspektive meðunarodnih odnosa . Osijek- Zagreb-Split: Pan-Liber, 1999.
Petty, Mikel, Robert Franceschini, and Amar Mukherjee. "A Terrain Reasoning Algorithm for Defending a Fire Zone." Information & Security: An International Journal 3 (1999): 56-75.
Kofos, Evangelos. "Textbooks: The Pendulum of ‘Loading’ and ‘Disarming’ History: The Southeastern European Test Case." In Disarming History. International Conference on Combating Stereotypes and Prejudice in History Textbooks of Southeast Europe, 23-27. Stockholm: Nykopia Tryck AB, 1999.
Ashton, Kevin. "That ‘Internet of Things’ Thing." RFID Journal (1999).
Sun, Hung-Min, Tzonelih Hwang, and Narn-Yih Lee. "Threshold Proxy Signatures." IEE Proceedings- Computers and Digital Techniques 146, no. 5 (1999): 259-263.
Sun, Hung-Min, and Biing-Jang Chen. Time-Stamp Proxy Signature with Traceable Receivers In 9th National Conference on Information Security. Taiwan, 1999.
Romanyuk, S.. "Totalitarian Sects in Russia." Observer 5 (1999).
Angelova, Donka, and Boryana Vassileva. "Tracking Filters for Radar Systems with Correlated Measurement Noise." Information & Security: An International Journal 2 (1999): 90-101.
Zagorski, Andrei V.. "Traditional Russian Security Interests in the Caucasus and Central Asia. Perceptions and Realities." In Russia, the Caucasus, and Central Asia. The 21st Century Security Environment, edited by Rajan Menon, Yuri E. Fedorov and Ghia Nodia. New York: M. E. Sharpe, East West Institute, 1999.
Dror, Yebezkel. Transparency and Openness of Quality Democracy, in Openness and Transparency in Governance: Challenges and Opportunities In The Second NISPAcee Civil Service Forum. Maastricht, The Netherlands, 1999.
Georgiev, Vladimir. "Turkmeno-afganskaya granitsa mozhet stat` bezkontrol`noi." Nezavisimaya Gazeta (1999).
Lewis, T.. "Ubinet: The ubiquitous Internet will be wireless." IEEE Computer 32 (1999): 10.
Taylor, Ros. "UK: Partisans Wage Virtual War." The Guardian (1999).

Pages