Biblio

Export 21393 results:
2004
Smith, John. The Development of Response Forces in NATO and the EU and the Evolving NATO-EU Relationship. NATO Parliamentary Assembly, Committee Reports, 2004 Annual Session , 2004.
Strohm, Chris. "DHS Scraps Computer Pre-Screening System, Starts Over." Government Executive Online (2004).
Sheehan, Michael. "Diplomacy." In Attacking Terrorism: Elements of a Grand Strategy, 97-114. Washington, D.C.: Georgetown University Press, 2004.
King, Gilbert. Dirty Bomb: Weapons of Mass Disruption. New York: Chamberlain Bros, 2004.
Doyle, T., E. Dugan, B. Humphries, and R. U. Newton. "Discriminating between elderly and young using a fractal dimension analysis of centre of pressure." Int J Med Sci 1, no. 1 (2004): 11-20.
Lowe, David G.. "Distinctive Image Features from Scale-Invariant Keypoints." International Journal of Computer Vision 60, no. 2 (2004): 91-110.
Rasulov, Sergei. "Diversanty Unichtozhayut Dagestanskih Militsionerov (Saboteurs Destroy Dagestani Policemen)." Gazeta (2004).
Warner, Ted. DOD’s Ongoing Efforts to Implement Capabilities-Based Planning In Monterey Strategy Seminar on Capabilities-Based Defense Planning: Building a 21st Century Force . Monterey, CA: Center for Contemporary Conflict and the Cebrowski Institute for Information Innovation and Superiority, 2004.
Monaghan, Andrew. "Does Europe Exist as an Entity for Military Cooperation? Evolving Russian Perspectives, 1991–2004." Connections: The Quarterly Journal 3, no. 2 (2004): 47-62.
Abramowitz, Morton. "Does Iraq Matter?" The National Interest 75 (2004).
Brinkley, Joel. "Dollars for Democracy?: U.S. Aid to Ukraine Challenged." The New York Times (2004).
Katz, Mark. "Don’t Dismiss China’s Daqing Oil Pipeline." Asia Times Online (2004).
Farah, Douglas. Draining Terror’s Financial Swamps. The Middle East Forum, 2004.
Das, Manik Lal, Ashutosh Saxena, and V.P. Gulati. "A Dynamic ID-based Remote User Authentication Scheme." IEEE Transactions on Consumer Electronics 50, no. 2 (2004).
Duczinski, Guy. Effects-Based Operations: A Guide for Practitioners In presented to the 9th International Command and Control Research and Technlogy Symposium. Copenhagen, 2004.
Tzeng, Wen-Guey. "Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters." IEEE Transactions on Computers 53, no. 2 (2004): 232-240.
Lina, Iuon-Chang, Hsia-Hung Oub, and Min-Shiang Hwang. "Efficient access control and key management schemes for mobile agents." Computer Standards & Interfaces 26, no. 5 (2004): 423-433.
Chang, Ya-Fen, and Chin-Chen Chang. "An Efficient and Practical Remote User Authentication Scheme." Information & Security: An International Journal 15, no. 1 (2004): 75-88.
Editorial. "E-Government and Security of Information." Information & Security: An International Journal 15, no. 1 (2004): 5-6.
Monitor, ISIJ. "E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES." Information & Security: An International Journal 15, no. 1 (2004): 117-127.
Monitor, ISIJ. "E-GOVERNMENT AND SECURITY OF INFORMATION INTERNET SOURCES." Information & Security: An International Journal 15, no. 2 (2004): 231-255.
Ngaogate, Wasana. "EKS: Open-source Web-based Distributed Learning Tool." Information & Security: An International Journal 14 (2004): 87-99.
van Lamsweerde, A.. Elaborating Security Requirements by Construction of Intentional Anti-Models In Proceedings of the 26th International Conference on Software Engineering, ICSE 2004., 2004.
Zhao, Yong. The e-Language Learning Project: Conceptualizing a Web-based Language Learning System In A White Paper . East Lansing, MI: College of Education, Michigan State University, 2004.
Director, Office of Force T.. Elements of Defense Transformation. Washington, DC, 2004.

Pages