Biblio
Export 21463 results:
The Case for the Euro. London: Britain in Europe Campaign, Ltd., 2000.
The case of the “greens” (Випадок "зелених")." Zerkalo nedeli (2000): 2.
"Casualty Aversion." Aerospace Power Journal (2000): 1.
"The causes of corruption: a cross-national study." Journal of public economics 76, no. 3 (2000): 399-457.
"Center for Security Studies and Conflict Research." Information & Security: An International Journal 7 (2000): 177-188.
"Chapter 4: Masculinities in Context: On Peace Issues and Patriarchal Orders." In Male Roles, Masculinities and Violence: A Culture of Peace Perspective, 61. Paris: UNESCO, 2000.
"The Chechen Refugees." Berkeley Journal of International Law 18, no. 2 (2000): 241-259.
"Chinese Nationalism and Its International Orientations." Political Science Quarterly 115, no. 1 (2000): 1-33.
"A Chip Plant That is Full of Symbolism." The New York Times (2000).
"Cinderella in Europe. How long Russia has to stay in this role?" Europe (magazine of the European Union published in Moscow) (2000): 9.
"Civil-Military Emergency Planning Council In Bucharest Conference Proceedings. Arlington, VA: Institute for Defense Analysis, 2000.
Clashes in the Assembly." International Organization 54, no. 2 (2000): 185-215.
"A Clean Break: New Strategy for Securing the Realm In Study Group on a New Israeli Strategy Toward . Institute for Advanced Strategic and Political Studies, 2000.
Cluster Analysis for Fuzzy Control Systems In IFAC Conference CSD’2000 . Bratislava, Slovak Republic, 2000.
Coding in the Cellular Communications. Sofia: ProCon, 2000.
Command and Control: Operational Requirements and System Implementation." Information & Security: An International Journal 5 (2000): 23-40.
"Common Strategies In Report by the Secretary-General/High Representative., 2000.
Common Strategy of the European Union on the Mediterranean Region In Presidency Conclusions, European Council, Feira., 2000.
Compliance and Conditionality In ARENA Working Papers., 2000.
Componentware Approaches in Management Information Systems In HFM Workshop . The Hague, 2000.
Compression-compatible Fragile and Semi-Fragile Tamper Detection." In SPIE EI Photonics West 2000., 2000.
"The Computer- Aided Exercise – An Alternative of the Conventional Exercises in the Armed Forces." Information & Security: An International Journal 3 (2000): 119-131.
"Computer assisted Exercises. Sofia: Military Publishing House, 2000.
Computer Assisted Second Language Vocabulary Acquisition." Language Learning and Technology 4, no. 1 (2000): 60-81.
"