Biblio
Export 21395 results:
Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 1985.
Virtual Time." ACM Transactions on Programming Languages and Systems 7, no. 3 (1985): 404-425.
"Wörterbuch der Psychologie . Leipzig: Veb Bibliographisches Institut, 1985.
The 2 sigma problem: The search for methods of group instruction as effective as one-to-one tutoring." Educational Researcher 4 (1984): 4-16.
"A Brief Outline of International Humanitarian Law." International Review of the Red Cross (1984).
"The Constitution of Society. Berkeley: University of California Press, 1984.
Continuous belief functions for evidential reasoning. AAAI, 1984.
Corporations of Corruption. A Systematic Study of Organized Crime. Springfield, IL: Charles C. Thomas, 1984.
Culture Theory: Essays on Mind, Self, and Emotion. Cambridge, UK: Cambridge University Press, 1984.
Denki Tsushin Jigyouho [Telecommunication Business Act] In Law., 1984.
Elliptic curves over finite fi elds and the computation of the square roots modulo p." Mathematics of Computation 44, no. 177 (1984): 483-494.
"Entropy." American Journal of Physics 52 (1984): 492-496.
"Europe’s American Pacifier." Foreign Policy 54 (1984): 64-82.
"Experiential learning: Experience as the source of learning and development. Englewood Cliffs, NJ: Prentice-Hall, 1984.
Friction in War." In Book One of On War, edited by Michael Howard and Peter Paret. Princeton, N.J.: Princeton University Press, 1984.
"Handbook of Air Pollution Technology . New York, NY: John Wiley, 1984.
How to Change an Army." Military Review LXIV, no. 11 (1984): 33-49.
"Image and Reality. The Making of the German Officer, 1921-1933. Westport, CT: Greenwood Press, 1984.
The Imperative of Responsibility. Chicago: University of Chicago Press, 1984.
Interpersonal Communication and Human Relationships. Boston, MA: Allyn and Bacon, 1984.
Learning from the Field: A Guide from Experience. Beverly Hills, CA: Sage Publications, 1984.
Normal Accidents: Living with High-Risk Technologies. New York: Basic Books, 1984.
Notes on a Psychodynamic Theory of Terrorist Behavior." Terrorism: An International Journal 7, no. 2 (1984): 248.
"Plädoyer für die Vorneverteidigung. Deutsches Strategieforum, 1984.