Biblio

Export 21373 results:
1998
Rong-Li, X., and C. He. Optimal initialization of linear recursive filters In 37th IEEE Conference on Decision and Control. Tampa, FL, 1998.
Stremlau, John. People in Peril: Human Rights, Humanitarian Action and Preventing Deadly Conflict. Washington, D.C.: Carnegie Commission on Preventing Deadly Conflict, 1998.
Low, Stephen H., and Nicholas F. Maxemchuk. "Performance Comparison of Two Text Marking Methods." IEEE Journal on Selected Areas in Communications 16 (1998): 561-572.
Permanent Council Decision #218. OSCE, 1998.
"PKK and Terrorism: Drug Trafficking and Terrorist Organizations." In Assembly of Turkish-American Associations. Turkey, 1998.
Schmidl, Erwin. "Police Functions in Police Operations." In Policing the New World Disorder: Peace Operations and Public Security, 40. Washington, D.C.: National Defense University Press, 1998.
Oakley, Robert B., Michael Dziedzic, and Eliot M. Goldberg. Policing the New World Disorder: Peace Operations and Public Security. Washington D.C.: National Defense University Press, 1998.
McChesney, Robert. "The Political Economy of Global Media." Media and Development 45, no. 4 (1998).
Schmid, Alex P., and Albert J. Jongman. Political Terrorism: A New Guide to Actors, Concepts, Data Bases, Theories, and Literature. New Brunswick, NJ: Transaction Books, 1998.
Brooks, Risa. Political-Military Relations and the Stability of Arab Regimes In Adelphi Paper. International Institute for Strategic Studies, 1998.
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998).
Keohane, Robert O., and Joseph S. Nye. "Power and Interdependence in the Information Age." Foreign Affairs 77, no. 5 (1998): 81-94.
Tarrow, Sidney. Power in Movement: Social Movements and Contentious Politics. New York: Cambridge University Press, 1998.
Cramer, Ronald, and Victor Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Cipher Attack In Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology Crypto’98. Santa Barbara, California, USA, 1998.
Presidential Decision Directive NSC-63., 1998.
Shearer, David. "Private Armies and Military Intervention." Adelphi Paper No. 316 IISS (1998): 76.
S., Ferson, and Donald S.. Probability bounds analysis In International Conference on Probabilistic Safety Assessment and Management (PSAM4). New York: Springer-Verlag, 1998.
Monitor, ISIJ. "Problems on the Way to the Information Society: French Laws“on Dossiers”." Information & Security: An International Journal 1, no. 1 (1998): 118-134.
Shalamanov, Velizar. "Process-oriented Model of Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 59-66.
Ilega, D. I.. "Proliferation of Religious Organizations and How it Adds to the Nigerian Society." In The Nigerian environment and socio-economic development, 265-278. Port Harcourt, Rivers State [Nigeria]: SIJ Publishers, 1998.
S., Parsons. "A proof theoretic approach to qualitative probabilistic reasoning ." Int.J. of Approx. Reas 19 (1998): 265-297.
Proposal for Government Service Network (GSN) of the Electronic/Networked Government Program. Data Communication Group of Chunghwa Telecom Co. Ltd., 1998.
Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." In 30th Annual ACM Symposium on Theory of Computing. Dallas, Texas, USA, 1998.
Burr, William E.. Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Operations In NIST FPKI, Working Draft., 1998.

Pages