Biblio

Export 21372 results:
2004
Acquisti, Alessandro. Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots. Carnegie Mellon University, School of Computer Science, 2004.
Bryden, Alan, and Heiner Hänggi. Reform and Reconstruction of the Security Sector. Münster: Lit Verlag, 2004.
Reform and Reconstruction of the Security Sector. Munster: LIT Verlag, 2004.
Zulean, Marian. "Reforming the Security Sectors in South Eastern Europe: Lessons Learned and their Relevance for a Wider Black Sea Area Policy." Connections: The Quarterly Journal 3, no. 4 (2004): 93-101.
Bohr, Annette. "Regionalism in Central Asia: New Geopolitics, Old Regional Order." International Affairs 80, no. 3 (2004): 485.
Allison, Roy. "Regionalism, Regional Structures and Security Management in Central Asia." International Affairs 80, no. 3 (2004): 464.
Buzan, Barry, and Ole Wæver. Regions and Powers: The Structure of International Security. Cambridge: Cambridge University Press, 2004.
Regulation # 13 of 29 January 2004 on the conditions and procedures for technical maintenance of dams and relevant facilities. State Gazette 17 (28 March State Gazette 17 (28 March 2004), 2004.
Bar, Shmuel. "The Religious Sources of Islamic Terrorism." Policy Review 125 (2004).
Mueller, John. The Remnants of War. Ithaca, NY: Cornell University Press, 2004.
Report of the Defense Science Board Task Force on Strategic Communication. Washington, D.C.: U.S. Department of Defense, Office of the Under Secretary for Acquisition, Technology, and Logistics, 2004.
Report on the Activity of Romanian Intelligence Service in 2004 ., 2004.
Stuart, Allan, and Barbie Zelizer. Reporting War: Journalism in Wartime. New York: Routlege, 2004.
Jehl, Douglas, and David Johnston. "Reports That Led to Terror Alert Were Years Old, Officials Say." New York Times (2004).
le Ulriksen, Stå. "Requirements for Future European Military Strategies and Force Structures." International Peacekeeping 11, no. 3 (2004): 457.
Research for a Secure Europe: Report of the Group of Personalities in the Field of Security Research. Luxembourg: European Communities, 2004.
Research Integrity and Misconduct. Department of Defense, 2004.
Weixin, Jin, Xiao Tianyuan, Hu Xiaofeng, and Ma Yaping. "Research on Multi-layer Multi-view Multi-body Modeling Method (多层多视多体建模方法研究)." Computer Simulation 7 (2004).
Bouma, Gary, and Rod Ling. The Research Process Fifth Edition . Oxford University Press, 2004.
Voeten, Erik. "Resisting the Lonely Superpower: Responses of States in the United Nations to U.S. Dominance." The Journal of Politics 66:3 66, no. 3 (2004): 729-754.
Council, UN Security. Resolution 1540 (2004)., 2004.
Klyne, Graham, and Jeremy J. Carroll. "Resource Description Framework (RDF): Concepts and Abstract Syntax.", 2004.
Volkov, Vadim. "The Resources and Tactics of Terrorism: A View from Russia." In Business and Security: Public–Private Sector Relationships in a New Security Environment, 111-18. Stockholm/Oxford: SIPRI/Oxford University Press, 2004.
Tonra, B., and T. Christiansen. Rethinking European Union Foreign Policy. Manchester: Edward Elgar, 2004.
R., Yager R.. "On the retranslation process in Zadeh’s paradigm of computing with words." IEEE Trans. on Systems,Man, and Cybernetics - Part B: Cybernetics 34, no. 2 (2004): 1184-1195.

Pages