Biblio

Export 21373 results:
1994
Kaufman, Richard. Privatization in North-Atlantic Cooperation Council Countries – Colloquium 1994. Brussels, 1994.
Moscovici, Serge. Psychologie sociale des relations à autrui . Paris: Nathan, 1994.
Kaplan, Bonnie, and Joseph Alex Maxwell. "Qualitative Research Methods for Evaluating Computer Information Systems." In Evaluating Health Care Information Systems: Methods and Applications, 45-68. Thousand Oaks, CA: Sage, 1994.
Campbell, Robert M., and Leslie A. Pal. The Real Worlds of Canadian Politics: Cases in Process and Policy. 3rd ed. Peterborough: Broadview, 1994.
Benaloh, Josh D., and Dwight Tuinstra. Receipt-Free Secret-Ballot Elections In Twenty-Sixth Annual ACM Symposium on Theory of Computing STOC’94. Vol. 544-553. New York, 1994.
Benaloh, Josh C., and Dwight Tuinstra. Receipt-Free Secret-Ballot Elections (extended abstract) In Twenty-Sixth Annual ACM Symposium on Theory of Computing STOC’94 (Montreal, Quebec, Canada). New York, USA: ACM, 1994.
Nalbandian, John. "Reflections of a ‘Pracademic’ on the Logic of Politics and Administration." Public Administration Review 54, no. 6 (1994): 531-536.
Chang, Chin-Chen, and Wen-Yuan Liao. "A Remote Password Authentication Scheme Based upon ElGamal’s Signature Scheme." Computers & Security 13, no. 2 (1994): 137-144.
S.K.M., Wong, and Lingras P.. "Representation of qualitative user preference by quantitative belief functions." IEEE Transactions on Knowledge and Data Engineering 6, no. 1 (1994): 72-78.
Mintzberg, Henry. "The Rise and Fall of Strategic Planning." New York, NY: The Free Press (1994).
Mintzberg, Henry. The Rise and Fall of Strategic Planning. New York: Prentice Hall, 1994.
Tagarev, Todor, and Velizar Shalamanov. The Role of Education and Training in the Field of C4I In AFCEA-Europe Budapest Seminar. Budapest, 1994.
Rwanda: Death, Defiance, Despair. London: African Rights, 1994.
Sako, Kazue, and Joe Killian. Secure Voting Using Partially Compatible Homomorphisms In Advances in Cryptology--CRYPTO’94, Lecture Notes in Computer Science 839. Berlin: Springer-Verlag, 1994.
Bandura, Albert. "Self-efficacy." In Encyclopedia of Human Behavior, 77-81. Vol. 4. New York, NY: Academic Press, 1994.
Forrest, Stephanie, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri. Self-Nonself Discrimination in a Com¬puter In IEEE Symposium on Research in Security and Privacy. Oakland, CA, 1994.
Coen, Michael. SodaBot: A Software Agent Environment and Construction System. MIT AI Lab, 1994.
Genesereth, M.R., and A.P. Ketchpel. "Software agents." Communication of the ACM 37, no. 7 (1994): 48-53.
Tselkov, Veselin. A software security tools for information protection in PCs – “CS_SECURE_TOOLS In First National Conferences “INFORMATIC’94. Sofia, Bulgaria: SAI, 1994.
S., Parsons. "Some qualitative approaches to applying Dempster-Shafer theory." Information and Decision technologies 19 (1994): 321-337.
M.P., Wellman. Some varieties of qualitative probability In 5th International Conference on Information Processing and the Management of Uncertainty. Paris France, 1994.
On State Security Institutions. Likumi.lv, 1994.
Arquilla, John. "The Strategic Implications of Information Dominance." Strategic Review 22 (1994): 22-34.
Robson, Wendy. Strategic Management and Information Systems: An Integrated Approach. Second ed. Essex, UK: Pearson Education Ltd., 1994.
Naim, M., and D. Towill. System Dynamics and Learning Curves In International System Dynamics Conference., 1994.

Pages