Biblio

Export 21313 results:
1992
Olcott, Martha Brill. "Central Asia’s Catapult to Independence." Foreign Affairs 71, no. 3 (1992): 108-30.
Szayna, Thomas, and James Steinberg. Civil-Military Relations and National Security Thinking in Czechoslovakia: A Conference Report. Santa Monica, CA: RAND Corporation, 1992.
Sigler, Robert T., and David J. King. "Colonial Policing and Control of Movements for Independence." Policing and Society 3 (1992): 13-22.
Chang, Chin-Chen, and C. S. Liah. "Comment on Remote Password Authentication with Smart Cards." IEE Proceedings-E 139, no. 4 (1992): 372.
Bennett, Charles H., and J. Wiesner. "Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states." Phys. Rev. Lett. 69 (1992): 2881-2884.
Constitution of the Czech Republic., 1992.
Uya, Okon Edet. Contemporary Nigeria: Essays in Society, Politics and Economy. Buenos Aires: EDIPUBLI, 1992.
Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction., 1992.
The Czech Charter of Fundamental Rights and Basic Freedoms., 1992.
Fukuyama, Francis. Das Ende der Geschichte. Wo stehen wir? . Munich: Kindler, 1992.
Eddowes, Muriel, and R. Stansfield. Decision Making Techniques (ACCA). London: Sweet & Maxwell, 1992.
Crenshaw, Martha. "Decisions to Use Terrorism: Psychological Constraints on Instrumental Reasoning." International Social Movements Research 4 (1992).
Decree on Minimum Personal and Collective Protection Resources and Equipment in the Event of Natural and Other Disasters and War. Official Gazette of the Republic of Slovenia No 32/92, 1992.
Esteva, Gustavo. Development In The Development Dictionary – A guide to knowledge as power. London: Zed Books, 1992.
Klawonn, F., and Ph. Smets. "The dynamic of belief in the transferable belief model and specialization-generalization matrices." Uncertainty in Artificial Intelligence 92 (1992): 130-137.
Bellovin, Steven M., and Michael Merrit. Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks In 1992 IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, California: IEEE Computer Society Press, 1992.
Fukuyama, Francis. The End of History and the Last Man., 1992.
Fukuyama, Francis. The End of History and the Last Man. New York: Free Press, 1992.
Shalamanov, Velizar. Environment and Methodology for Development of Intelligent Systems for Complex Situation Assessment and Prediction In Proceedings of AFCEA-Europe Prague Seminar. Prague, Czech Republic, 1992.
Waldmann, Peter. Ethnic and Sociorevolutionary Terrorism: A Comparison of Structures., 1992.
Fratianni, Michele, and Jurgen von Hagen. The European Monetary System and European Monetary Union . Boulder, CO: Westview Press, 1992.
Adleman, Leonard. Evaluating Decision Support and Expert Systems. John Wiley & Sons, 1992.
Dubois, D., and H Prade. "Evidence, Knowledge and Belief Functions." International Journal of Approximate Reasoning 6 (1992): 295-319.
Watson, A.. The Evolution of International Society: A Comparative Historical Analysis. London: Routledge, 1992.
Stephens, Charlotte, William Ledbetter, Amitava Mitra, and Nelson F. Ford. "Executive or Functional Manager? The Nature of the CIO’s Job." MIS Quarterly 16, no. 4 (1992): 449-467.

Pages