Biblio

Export 8454 results:
1996
Council of Ministers communiqué. Tunis, 1996.
Council Regulation (EC) No 1257/96 of 20 June 1996 concerning humanitarian aid. Official Journal of the European Communities L163, 1996.
Tselkov, Veselin, Dragomir Pargov, and Rusin Petrov. Criteria of Computer System Security Assessment and Evaluation In nformation Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia: AFCEA-Sofia, 1996.
Schneier, Bruce. Cryptography: Protocols, Algorithms, and Source Code in C. 2nd ed. New York, NY: John Wiley & Sons, 1996.
Council, National Research. "Cryptography’s Role in Securing the Information Society ." National Academy Press (1996).
Mandelbaum, Michael. The Dawn of Peace in Europe. New York: The Twentieth Century Fund Press, 1996.
Anderson, R. H., and A. C. Hearn. The Day After in Cyberspace II. Santa Monica, CA: RAND Corporation, 1996.
Ivefors, Gunilla. Defeat the enemy before battle - a warfare revolution in the 21-st century., 1996.
Dombrowsky, Wolf R., and Christian Brauner. Defizite der Katastrophenvorsorge in Industriegesellschaften am Beispiel Deutschlands. Untersuchungen und Empfehlungen zu methodischen und inhaltlichen Grundsatzfragen In Deutsche IDNDR Reihe. Bonn: INDR, 1996.
Joo, Rudolf. Democratic Control of Armed Forces. Paris: Institute for Security Studies of WEU, February, 1996.
Freeman, Chas W.. The Diplomat’s Dictionary . Washington, D.C.: National Defense University Press, 1996.
Sycara, K., K. Decker, A. Pannu, M. Williamson, and D. Zeng. "Distributed intelligent agents." IEEE Expert-Intelligent Systems and Their Applications 11, no. 6 (1996): 36-45.
"Do Institutions Make a Difference? Non-Institutionalism, Neo-Institutionalism, and the Logic of Common Decision-Making in the European Union." Governance 9 (1996): 217-240.
Miller, Duncan C.. "The DOD High Level Architecture and The Next Generation of DIS." In 14th DIS Workshop ., 1996.
Barbieri, Katherine. "Economic Interdependence: A Path to Peace or a Source of Interstate Conflict?" Journal of Peace Research 33, no. 1 (1996): 34.
Warner, John T., and Beth J. Asch. "The Economics of Military Manpower." In Handbook of Defense Economics, 347-398. Amsterdam: , 1996.
Matsui, Kineo, Junji Ohnishi, and Yasuhiro Nakamura. "Embedding a Signature to Pictures under Wavelet Transform." IEICE Transactions J79-D-II 6 (1996): 1017-1024.
Hsu, C.. Enterprise Integration and Modeling - the Metadatabase Approach. Boston, Mass., USA: Kluwer Academic Publisher, 1996.
Waever, Ole. "European Security Identities." Journal of Common Market Studies 34, no. 1 (1996): 103-32.
Caporaso, James A.. "The European Union and Forms of State: Westphalian, Regulatory or Post-modern?" Journal of Common Market Studies 34, no. 1 (1996): 29-52.
Tchamova, Albena. Evidence Reasoning Logic and Fuzzy Set Theory: Combined Method for Resolving Dempster's Rule Indefiniteness in a Case of Conflicting Evidence In 4th European Congress on Intelligent Techniques and Soft Computing. Vol. 1. Aachen, Germany, 1996.
Anderson, Robert H., and Anthony Hearn. An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: “The Day After ... in Cyberspace II. Santa Monica: RAND, 1996.
Lassila, O., S. Smith, and M. Becker. An exploratory prototype for reactive management of aeromedical evacuation plans. Pittsburgh: The Robotics Institute, Carnegie Mellon University, 1996.
Fürstenau, N.. "Fiber-Optic Sensors for Smart Taxiways." In DLR-Mitteilung 96-02., 1996.
Schmidt, J.F., and G. Klein. "Fighting in the Fog: Dealing with Battlefield Uncertainty." Marine Corps Gazette 80, no. 10 (1996).

Страницы