Biblio

Export 8454 results:
1997
Weber, Max. The Theory of Social and Economic Organization., 1997.
Zhang, Kan. "Threshold Proxy Signature Schemes." In Information Security Workshop. Japan, 1997.
Smolkin, Rachel. "TOPAZ Nuclear Program Called Failure; GAO Report Claims Mismanagement in Tech-Transfer Effort." Rocky Mountain News (1997).
Joachims, Thorsten, Tom Mitchell, and Dayne Freitag. A tour guide for the world wide web In IJCAI97 ., 1997.
Zadeh, Lotfi A.. "Towards a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic." Fuzzy Sets and Systems (1997): 111-127.
Lloyd-Roberts, David. "Training the armed forces to respect international humanitarian law: The perspective of the ICRC Delegate to the Armed and Security Forces of South Asia." International Review of the Red Cross 319 (1997).
Cohen, Danny, and Andreas Kemkes. Using DDM - an Application Perspective In 1997 Spring Simulation Interoperability Workshop (SIW) (1997), 97S-SIW-014 ., 1997.
Hall, Charles W., and Robert O’Harrow, Jr. "Virginia Man Suspected of Terrorism Known for Anonymity." The Washington Post (1997).
Boullé, Philippe, Luc Vrolijks, and Elina Palm. "Vulnerability Reduction for Sustainable Urban Development." Journal of Contingencies & Crisis Management 5, no. 3 (1997): 179-188.
Ignatieff, Michael. The Warrior’s Honor. Ethnic War and the Modern Conscience . New York: Henry Holt and Company, 1997.
Boer, Monica Den. "“Wearing the Inside Out: European Police Cooperation between Internal and External Security." European Foreign Affairs Review 2 (1997): 491-508.
Garfinkel, Simson, and Gene Spafford. Web Security & Commerce. Cambridge: O’Reilly, 1997.
Bhatia, D., G. Fox, W. Furmanski, G. Premchandran, M. Camuseva, and V. Burzevski. "WebFlow - a visual programming paradigm for Web/Java based coarse grain distributed computing." Concurrency: Practice and Experience (1997).
Walt, Stephen M.. "Why Alliances Endure or Collapse." Survival 39, no. 1 (1997): 157.
Goodman, Marc D.. "Why the Police Don’t Care about Computer Crime." Harvard Journal of Law and Technology 10, no. 3 (1997): 465-494.
Назарбаев, Нурсултан A.. Евразийский союз: идеи, практика, перспективы, 1994–1997. Москвa: Фонд содействия развитию соц. и полит. наук, 1997.
Конституции Республики Польша., 1997.
1996
Semerdjiev, Emil. "About the Application of the Hough Transform for Radar Track Detection." Comptes rendus de l'Academie Bulgare des Sciences 49, no. 9 (1996): 49-52.
Weathery, Richard M., Bradford S. Canova, Ernest H. Page, Anita A. Zabek, and Annete L. Wilson. Advanced Distributed Simulation through the Aggregate Level Simulation Protocol In 29th International Conference on System Sciences. Vol. 1. Wailea, Hawaii , 1996.
Petrie, Charles. "Agent-based engineering, the web, and intelligence." IEEE Expert 11 (1996): 24-29.
Jr., John Witte, and Christian M. Green. "The American Constitutional Experiment in Religious Human Rights: The Perennial Search for Principles." In Religious Human Rights in Global Perspective. The Hague: Martinus Nijhoff Publishers, 1996.
Lipset, Seymour Martin. American Exceptionalism: A Double-edged Sword. New York, NY: W. W. Norton, 1996.
Wu, Tzong-Chen, and Hung-Sung Sung. "Authenticating Passwords over an Insecure Channel." Computers & Security 15, no. 5 (1996): 431-439.
Doehler, H.-U., P. Hecker, and E. Groll. Automatic Recognition of Aircraft Registration Marks In DLR-Mitteilung 96-02. Köln, 1996.
Paczuski, Maya, Sergei Maslov, and Per Bak. "Avalanche Dynamics in Evolution, Growth, and Depinning Models." Physics Review 53, no. 1 (1996): 414-443.

Страницы