Biblio

Export 21393 results:
1998
The Application of a Customer Funding Regime to the NATO C3 Agency., 1998.
Powers, David M. W.. "Applications and Explanations of Zipf's Law." In New Methods in Language Processing and Computational Natural Language Learning, 151-160. ACL, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach for a Fast Reduction of the Full Ignorance in the Target Identification Process In the First International Conference on Multisource-Multisensor Information Fusion. Vol. 2. Las Vegas, Nevada, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach For a Fast reduction of the Full Ignorance in the Target Identification Process In First International Conference on Information Fusion (Fusion’98). Las Vegas, 1998.
Slamić, Miroslav, Neven Šosterič, Jadranka Jukić, Ante Modrić, and Dražen Penzar. An Architecture for a Combat Simulation In 20th Information Technology Interfaces Conference ITI ‘98 . Pula, 1998.
Kelly, Timothy Patrick. Arguing Safety – A Systematic Approach to Managing Safety Cases. University of York, 1998.
The Armenians of Iran . Cambridge, MA: Harvard Middle Eastern Monographs, 1998.
Singh, Ravinder Pal. Arms Procurement Decision Making Processes. Oxford: Oxford University, 1998.
Guay, Terrence. At Arm’s Length – The European Union and Europe’s Defence Industry. London: MacMillan, 1998.
Petitcolas, Fabien A. P., Ross J. Anderson, and Markus G. Kuhn. "Attacks on Copyright Marking Systems." In Second Workshop on Information Hiding, Lecture Notes in Computer Science, 218-38. Vol. 1525. Portland, Oregon, 1998.
Hassig, Ross. Aztec Warfare: Imperial Expansion and Political Control In Civilization of the American Indian series. Norman: University of Oklahoma Press, 1998.
Basic Principle of the Security and Defense Policy of the Republic of Hungary. Resolution of the National Assembly 94, 1998.
Bennis, Warren. "Becoming a Leader of Leaders." In Rethinking the Future, 148-63. London: Nicholas Brealey Publishing, 1998.
Blair, W., and G. Watson. "Benchmark for radar resource allocation and tracking targets in the presence of ECM." IEEE Trans. on AES 34, no. 4 (1998): 1094-1114.
Bruzelius, Nils, Bent Flyvbjerg, and Werner Rothengatter. "Big decisions, big risks: improving accountability in mega projects." International Review of Administrative Sciences 64, no. 3 (1998): 423-440.
Huberts, Leo W. J. C.. Blinde Vlekken in de Politiepraktijk en de Politiewetenschap – Over Politie, Wetenschap, Macht, Beleid, Integriteit en Communicatie. Arnhem: Gouda Quint, 1998.
Hoveyda, Fereydoun. The Broken Crescent: The “Threat” of Militant Islamic Fundamentalism. Westport, CT: Praeger, 1998.
Simon, Jeffrey. Bulgaria and NATO: 7 Lost Years. Strategic Forum, 1998.
Simon, Jeffrey. "Bulgaria and NATO: 7 Lost Years." Information & Security: An International Journal 1, no. 2 (1998): 93-104.
Bonner, Raymond. "Bulgaria Becomes a Weapons Bazaar." The New York Times (1998).
Mihov, General Miho. "The Bulgarian Armed Forces in the Information Society." Information & Security: An International Journal 1, no. 1 (1998): 15-25.
Bundesverfassung der Schweizerischen Eidgenossenschaft. Bern: Die Bundesbehörden der Schweizerischen Eidgenossenschaft, 1998.
C4ISR Architecture Working Group (AWG): Final Report. Washington D.C.: Department of Defense, 1998.
Ward, Elizabeth. "Call Out the Troops: An Examination of the Legal Basis for Australian Defence Force Involvement in ‘Non-defence’ Matters." Research Paper 1997-98 8 (1998).
A Call to Civil Society. New York: Institute for American Values, 1998.

Pages