Biblio
Export 21463 results:
Using DDM - an Application Perspective In 1997 Spring Simulation Interoperability Workshop (SIW) (1997), 97S-SIW-014 ., 1997.
Value Orientations in Military Academies: A Thirteen Country Study." Armed Forces & Society 24, no. 1 (1997): 24.
"Virginia Man Suspected of Terrorism Known for Anonymity." The Washington Post (1997).
"Vulnerability Reduction for Sustainable Urban Development." Journal of Contingencies & Crisis Management 5, no. 3 (1997): 179-188.
"The Warrior’s Honor. Ethnic War and the Modern Conscience . New York: Henry Holt and Company, 1997.
Warriors as peacekeepers: Features of the Somalia experience and PTSD." Journal of Consulting and Clinical Psychology 65, no. 6 (1997): 1001-1010.
"Weak Ontology and Liberal Political Reflection." Political Theory 25, no. 4 (1997): 502-523, quote on p. 503.
"Wearing the Inside Out: European Police Cooperation between Internal and External Security." European Foreign Affairs Review 2 (1997): 491-508.
"Web Security & Commerce. Cambridge: O’Reilly, 1997.
WebFlow - a visual programming paradigm for Web/Java based coarse grain distributed computing." Concurrency: Practice and Experience (1997).
"Why Alliances Endure or Collapse." Survival 39, no. 1 (1997): 157.
"Why the Police Don’t Care about Computer Crime." Harvard Journal of Law and Technology 10, no. 3 (1997): 465-494.
"Социалная психология., 1997.
About the Application of the Hough Transform for Radar Track Detection." Comptes rendus de l'Academie Bulgare des Sciences 49, no. 9 (1996): 49-52.
"Advanced Distributed Simulation through the Aggregate Level Simulation Protocol In 29th International Conference on System Sciences. Vol. 1. Wailea, Hawaii , 1996.
The Age of Rights. Cambridge: Polity Press, 1996.
Agent-based engineering, the web, and intelligence." IEEE Expert 11 (1996): 24-29.
"Al-Ahkam as-Sultaniyyah In Qur’an sura 47, verse 4. London: Ta-Ha Publishers, 1996.
The American Constitutional Experiment in Religious Human Rights: The Perennial Search for Principles." In Religious Human Rights in Global Perspective. The Hague: Martinus Nijhoff Publishers, 1996.
"American Exceptionalism: A Double-edged Sword. New York, NY: W. W. Norton, 1996.
An Analyst's View of Information Systems Security." In Information Systems Security: Facing the Information Society of the 21st Century. London: Chapman & Hall, 1996.
"Authenticating Passwords over an Insecure Channel." Computers & Security 15, no. 5 (1996): 431-439.
"Automatic Recognition of Aircraft Registration Marks In DLR-Mitteilung 96-02. Köln, 1996.
Avalanche Dynamics in Evolution, Growth, and Depinning Models." Physics Review 53, no. 1 (1996): 414-443.
"