Biblio

Export 21392 results:
1997
Zadeh, Lotfi A.. "Towards a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic." Fuzzy Sets and Systems (1997): 111-127.
Lloyd-Roberts, David. "Training the armed forces to respect international humanitarian law: The perspective of the ICRC Delegate to the Armed and Security Forces of South Asia." International Review of the Red Cross 319 (1997).
Heintz, Bet¬tina, Eva Nadai, and Regula Fischer. Ungleich unter Gleichen. Studien zur geschlechtsspezifischen Segregation des Arbeitsmarktes. Frankfurt am Main: Campus, 1997.
Cohen, Danny, and Andreas Kemkes. Using DDM - an Application Perspective In 1997 Spring Simulation Interoperability Workshop (SIW) (1997), 97S-SIW-014 ., 1997.
Soeters, Joseph L.. "Value Orientations in Military Academies: A Thirteen Country Study." Armed Forces & Society 24, no. 1 (1997): 24.
Hall, Charles W., and Robert O’Harrow, Jr. "Virginia Man Suspected of Terrorism Known for Anonymity." The Washington Post (1997).
Boullé, Philippe, Luc Vrolijks, and Elina Palm. "Vulnerability Reduction for Sustainable Urban Development." Journal of Contingencies & Crisis Management 5, no. 3 (1997): 179-188.
Ignatieff, Michael. The Warrior’s Honor. Ethnic War and the Modern Conscience . New York: Henry Holt and Company, 1997.
Litz, Brett, Lynda King, Daniel King, Susan Orsillo, and Matthew Friedman. "Warriors as peacekeepers: Features of the Somalia experience and PTSD." Journal of Consulting and Clinical Psychology 65, no. 6 (1997): 1001-1010.
White, Stephen K.. "Weak Ontology and Liberal Political Reflection." Political Theory 25, no. 4 (1997): 502-523, quote on p. 503.
Boer, Monica Den. "“Wearing the Inside Out: European Police Cooperation between Internal and External Security." European Foreign Affairs Review 2 (1997): 491-508.
Garfinkel, Simson, and Gene Spafford. Web Security & Commerce. Cambridge: O’Reilly, 1997.
Bhatia, D., G. Fox, W. Furmanski, G. Premchandran, M. Camuseva, and V. Burzevski. "WebFlow - a visual programming paradigm for Web/Java based coarse grain distributed computing." Concurrency: Practice and Experience (1997).
Walt, Stephen M.. "Why Alliances Endure or Collapse." Survival 39, no. 1 (1997): 157.
Goodman, Marc D.. "Why the Police Don’t Care about Computer Crime." Harvard Journal of Law and Technology 10, no. 3 (1997): 465-494.
D., Majers. Социалная психология., 1997.
1996
Semerdjiev, Emil. "About the Application of the Hough Transform for Radar Track Detection." Comptes rendus de l'Academie Bulgare des Sciences 49, no. 9 (1996): 49-52.
Act XXXI of 1996 on fire control and technical rescue and fire., 1996.
Weathery, Richard M., Bradford S. Canova, Ernest H. Page, Anita A. Zabek, and Annete L. Wilson. Advanced Distributed Simulation through the Aggregate Level Simulation Protocol In 29th International Conference on System Sciences. Vol. 1. Wailea, Hawaii , 1996.
Bobbio, Norberto. The Age of Rights. Cambridge: Polity Press, 1996.
Petrie, Charles. "Agent-based engineering, the web, and intelligence." IEEE Expert 11 (1996): 24-29.
al-Mawardi, Abu al- Hasan. Al-Ahkam as-Sultaniyyah In Qur’an sura 47, verse 4. London: Ta-Ha Publishers, 1996.
Jr., John Witte, and Christian M. Green. "The American Constitutional Experiment in Religious Human Rights: The Perennial Search for Principles." In Religious Human Rights in Global Perspective. The Hague: Martinus Nijhoff Publishers, 1996.
Lipset, Seymour Martin. American Exceptionalism: A Double-edged Sword. New York, NY: W. W. Norton, 1996.
Kiountouzis, Evangelos A., and Spyros A. Kokolakis. "An Analyst's View of Information Systems Security." In Information Systems Security: Facing the Information Society of the 21st Century. London: Chapman & Hall, 1996.

Pages