Biblio
Export 21463 results:
Security and Stability in Uzbekistan: Challenges, Threats and Solutions. Partnership for Peace Information Systems Conict Studies Research Center, 1998.
The Self – Reproducing Inflationary Universe." Scientific American Presents 9, no. 1 (1998).
"Self-Organised Criticality . Cambridge, UK: Cambridge University Press, 1998.
Sensors For Peace: Applications, Systems And Legal Requirements For Monitoring In Peace Operations." New York: United Nations Publication (1998).
"An SGML-Based Office Document Exchange and Management In SGML/XML Europe’98 . Paris, France, 1998.
Simulation Modeling in Military Affairs: Status and Perspectives." Information & Security: An International Journal 1, no. 1 (1998): 91-102.
"Small States Inside and Outside the European Union: Interests and Policies. Boston, MA: Kluwer Academic Publishers, 1998.
A Smartcard-Based Framework for Secure Document Exchange In IEEE 32nd Annual 1998 International Carnahan Conference on Security Technology. Washington D.C., USA, 1998.
The Soldier and the State. Sofia: Military Publishing House, 1998.
Some reflections on soft computing, granular computing and their roles in the conception, design and utilization of information/intelligent systems." Soft Computing 2 (1998): 23-25.
"Sources of Power: How People Make Decisions . Cambridge, MA: The MIT Press, 1998, 1998.
Soviet Defense Spending: A History of CIA Estimates, 1950-1990. College Station, TX: Texas A&M University Press, 1998.
SpamCop: A Spam Classification & Organisation Program In AAAI-98 Workshop on Learning for Text Categorization. Madison, Wisconsin, 1998.
Spec Fi: The United States Marine Corps and Special operations. Vol. Master of Science. Monterey, CA, USA: Naval Postgraduate School, 1998.
The State of the Law on Cyber Jurisdiction and Cybercrime on the Internet." Gonzaga Journal of International Law, no. 1 (1998).
"States, Agency and Rules: The European Union in Global Environment Politics." In The European Union in the World Community, 213-229. Boulder, CO: Lynne Rienner, 1998.
"The Strategic Defence Review–1998. London: Ministry of Defence, 1998.
The Strategic Plan That Won the Cold War: National Security Decision Directive 75. MacLean, VA: The Potomac Foundation, 1998.
Student Plagiarism in an On-line World." ASEE Prism Magazine (1998).
"A Symbiotic Relationship Between Formal Methods and Security In Computer Security, Dependability and Assurance: From Needs to Solutions, Proceedings. IEEE, 1998.
Synthetic Environments – Delivering Real Benefits to UK Defence In SimTecT. Adelaide, Australia, 1998.
Systems, Views and Models of UML." In The Unified Modeling Language, Technical Aspects and Applications, 3-8. Heidelberg: Physica Verlag, 1998.
"Target Tracking Using Monte Carlo Simulation In IMACS Seminar on Monte Carlo Methods. Universite Libre de Bruxelle: Mathematics and Computers in Simulation , 1998.
This can’t go on (Це не може продовжуватись)." Uriadovyi kur’er (1998): 4.
"Timothy Thomas on the Key Elements of the Russian Approach to IW." Information & Security: An International Journal 1, no. 2 (1998): 75-92.
"