Biblio
Export 21445 results:
Anonymous Secure e-Voting over a Network In Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC’98). Scottsdale, AZ, USA: IEEE Computer Society, 1998.
Answering Senate Questions about NATO Enlargement In The Heritage Foundation Backgrounder., 1998.
Applications and Explanations of Zipf's Law." In New Methods in Language Processing and Computational Natural Language Learning, 151-160. ACL, 1998.
"An Approach for a Fast Reduction of the Full Ignorance in the Target Identification Process In the First International Conference on Multisource-Multisensor Information Fusion. Vol. 2. Las Vegas, Nevada, 1998.
An Approach For a Fast reduction of the Full Ignorance in the Target Identification Process In First International Conference on Information Fusion (Fusion’98). Las Vegas, 1998.
An Architecture for a Combat Simulation In 20th Information Technology Interfaces Conference ITI ‘98 . Pula, 1998.
Arguing Safety – A Systematic Approach to Managing Safety Cases. University of York, 1998.
The Armenians of Iran . Cambridge, MA: Harvard Middle Eastern Monographs, 1998.
Arms Procurement Decision Making Processes. Oxford: Oxford University, 1998.
At Arm’s Length – The European Union and Europe’s Defence Industry. London: MacMillan, 1998.
Attacks on Copyright Marking Systems." In Second Workshop on Information Hiding, Lecture Notes in Computer Science, 218-38. Vol. 1525. Portland, Oregon, 1998.
"Aztec Warfare: Imperial Expansion and Political Control In Civilization of the American Indian series. Norman: University of Oklahoma Press, 1998.
Basic Principle of the Security and Defense Policy of the Republic of Hungary. Resolution of the National Assembly 94, 1998.
Becoming a Leader of Leaders." In Rethinking the Future, 148-63. London: Nicholas Brealey Publishing, 1998.
"Benchmark for radar resource allocation and tracking targets in the presence of ECM." IEEE Trans. on AES 34, no. 4 (1998): 1094-1114.
"Big decisions, big risks: improving accountability in mega projects." International Review of Administrative Sciences 64, no. 3 (1998): 423-440.
"Blinde Vlekken in de Politiepraktijk en de Politiewetenschap – Over Politie, Wetenschap, Macht, Beleid, Integriteit en Communicatie. Arnhem: Gouda Quint, 1998.
The Broken Crescent: The “Threat” of Militant Islamic Fundamentalism. Westport, CT: Praeger, 1998.
Bulgaria and NATO: 7 Lost Years. Strategic Forum, 1998.
Bulgaria and NATO: 7 Lost Years." Information & Security: An International Journal 1, no. 2 (1998): 93-104.
"Bulgaria Becomes a Weapons Bazaar." The New York Times (1998).
"The Bulgarian Armed Forces in the Information Society." Information & Security: An International Journal 1, no. 1 (1998): 15-25.
"Bundesverfassung der Schweizerischen Eidgenossenschaft. Bern: Die Bundesbehörden der Schweizerischen Eidgenossenschaft, 1998.
C4ISR Architecture Working Group (AWG): Final Report. Washington D.C.: Department of Defense, 1998.