Biblio

Export 21402 results:
1998
S., Parsons. "A proof theoretic approach to qualitative probabilistic reasoning ." Int.J. of Approx. Reas 19 (1998): 265-297.
Proposal for Government Service Network (GSN) of the Electronic/Networked Government Program. Data Communication Group of Chunghwa Telecom Co. Ltd., 1998.
Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." In 30th Annual ACM Symposium on Theory of Computing. Dallas, Texas, USA, 1998.
Burr, William E.. Public Key Infrastructure (PKI) Technical Specifications: Part A - Technical Concept of Operations In NIST FPKI, Working Draft., 1998.
Hampson, Fen Osler, and Dean F. Oliver. "Pulpit Diplomacy: A Critical Assessment of the Axworthy Doctrine." International Journal 53 (1998): 379-406.
Bryson, N, and AA Mobolurin. A qualitative discriminant approach for generating In IEEE Transactions on Knowledge and Data Engineering. 2nd ed. Vol. 10., 1998.
Reactor Safety Study – An Assessment of Accident Risk in U.S. Commercial Nuclear Power Plants, WASH-1400 (NUREG-75/014)., 1998.
Herbst, Susan. Reading the Public Opinion: How Political Actors View The Democratic Process. Chicago: University of Chicago Press, 1998.
Angell, Ian. "The Real Politik of the Information Age." Information Strategy (1998).
Lovering, John. "Rebuilding the European Defence Industry in a Competitive World: Intergovernmentalism and the Leading Role Played by Companies." In Restructuring the Global Military Sector: The End of Military Fordism, 225-27. Vol. II. London: Pinter, 1998.
Shalamanov, Velizar, and Todor Tagarev. Reengineering Defense Planning in Bulgaria In Research Report. Sofia: Institute for International and Security Studies, 1998.
Shalamanov, Velizar M., and Todor Tagarev. Reengineering the Defense Planning in Bulgaria In Research Report. Sofia: Institute for Security and International Studies, 1998.
Shalamanov, Velizar, and Todor Tagarev. Reengineering the Defense Planning in Bulgaria In ISIS Reports. Sofia: Institute for Security and International Studies, 1998.
Peimani, Hooman. Regional Security and the Future of Central Asia. Westport, CT: Praeger, 1998.
Regulation of the Minister of the Interior and Administration of 14 September 1998 on the scope, detailed conditions and mode of including fire protection units in the NFRS., 1998.
Regulation on the functions, tasks and organization of the work of the Security Council to the Council of Ministers. State Gazette 116 (7 October 1998), last amendment State Gazette 81 (30 September 2014), 1998.
Burt, Richard, and Olin Robinson. Reinventing Diplomacy in the Information Age . Washington, DC: Center for Strategic and International Studies, 1998.
Amir, Nader, Jane Stafford, Melinda S. Freshman, and Edna B. Foa. "Relationship Between Trauma Narratives and Trauma Pathology." Journal of Traumatic Stress 11, no. 2 (1998): 385-392.
Avtgis, Theodore A., Daniel V. West, and Traci L. Anderson. "Relationship Stages: An Inductive Analysis Identifying Cognitive, Affective, and Behavioral Dimensions of Knapp’s Relational Stages Model." Communication Research Reports 15, no. 3 (1998): 280.
Clinton, Bill. Remarks by the President on the National Interest for Enlarging NATO., 1998.
Beznosov, Konstantin. Requirements for Access Control: US Healthcare Domain In 3rd ACM Workshop on Role-Based Access Control. Vol. 43. Fairfax, Virginia, USA, 1998.
Res 1199/1988. UNSC, 1998.
Res 1203/1998. UNSC, 1998.
Resolution 1199. UN Security Council, 1998.
Resolution 1203. UN Security Council, 1998.

Pages