Biblio

Export 21372 results:
2002
Turner, Stansfield. "Five Steps to Better Spying." International Herald Tribune (2002).
Lee, Cheng-Chi, Min-Shiang Hwang, and Wei-Peng Yang. "A Flexible Remote User Authentication Scheme with Smart Cards." ACM Operating System Review 36, no. 3 (2002): 46-52.
Komjáthy, Maj. László. Flooding on the Tisza River 1830–2001. Budapest: BM Katasz-trófavédelmi Oktatási Központ, 2002.
Ivanov, I.S.. "The Foreign Policy Concept of the Russian Federation." In The New Russian Diplomacy. Washington, D.C.: The Nixon Center and Brookings Institution Press, 2002.
Schellhorn, Gerhard, Andreas Thums, and Wolfgang Reif. Formal Fault Tree Semantics In Sixth World Conference on Integrated Design & Process Technology. Pasadena, CA, 2002.
Older, Susan, and Shiu-Kai Chin. "Formal Methods of Assuring Security of Protocols." The Computer Journal 45, no. 1 (2002): 46-54.
Dezert, Jean. "Foundations for a new theory of plausible and paradoxical reasoning." Information & Security: An International Journal 9 (2002): 13-57.
Moulin, P., and M. K. Mihcak. "A Framework for Evaluating the Data Hiding Capacity of Image Sources." IEEE Trans Image Process 11, no. 9 (2002).
Kagan, Robert. "France’s Dream World." The Washington Post (2002): B07.
Peat, F.D.. From Certainty to Uncertainty: The Story of Science and Ideas in the Twentieth Century. Washington, D.C: Joseph Henry Press, 2002.
Alexander, D.. "From Civil Defence to Civil Protection – and Back Again." Disaster Prevention and Management 11, no. 3 (2002): 209-213.
Hansen, Annika S.. From Congo to Kosovo: Civilian Police in Peace Operations In Adelphi Paper, International Institute for Security Studies. Oxford: Oxford University Press, 2002.
Vlachos-Dengler, Katia. From National Champions to European Heavyweights: The Development of European Defense Industrial Capabilities Across Market Segments. Santa Monica, CA: RAND Corporation, 2002.
Rutten, Martje. From Nice to Laeken. European Defence: Core Documents In Chaillot Paper. Paris: Institute for Security Studies, 2002.
Gaimster, Julia, and David A. Gray. From Transmitted Knowledge to Constructed Knowledge – e-Learning as Independent Inquiry In European Conference on Educational Research. Lisbon: EERA, 2002.
Ikonomopoulos, Spyros, Dimitris Gritzalis, Spyros Kokolakis, Kostas Vassiliou, and Costas Lambrinoudakis. Functional Requirements for a Secure Electronic Voting System In IFIP TC11 17th International Conference on Information Security . Cairo, 2002.
Committee, House of Commons. The Future of NATO In Seventh Report of Session 2001-2002 (London: The Stationery Office Limited)., 2002.
Kirov, Georgi. Fuzzy Approach for FDDI Network Performance Improvement” (paper presented at the First International IEEE Symposium on Intelligent Systems, Student Session. Varna, Bulgaria, 2002.
Tchamova, Albena, and Tzvetan Semerdjiev. "Fuzzy Logic Approach to Estimating Tendencies in Target Behavior." Information & Security: An International Journal 9 (2002): 58-69.
Simoska, Emilija. "FYR Macedonia." In Clio in the Balkans: The Politics of History Education, 495-97. Thessaloniki: CDRSEE, 2002.
Vignanskiy, Mikhail. "Gamardzhoba, NATO! Gruziya vstupaet v Alyans otdelno ot sobstvennoy armii." Vremya Novostey (2002).
Jivkov, Vesselin, and Xiao Rong LI. "On the Generalized Input Estimation." Information & Security: An International Journal 9 (2002): 107-113.
Smola, K.W., and C.D. Sutton. "Generational Differences: Revisiting Generational Work Values for the New Millennium." Journal of Organizational Behavior 23 (2002).
Stegmaier, Simon, Marcelo Magallón, and Thomas Ertl. A Generic Solution for Hardware-Accelerated Remote Visualization In EG/IEEE TCVG Symposium on VisualizationVisSym’02. Barcelona, Spain,ACM, New York, 2002), 2002.
Semerdjiev, Tzvetan. "The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization." Information & Security: An International Journal 9 (2002): 70-90.

Pages