Results 1 - 10
of
3,083
The Hero with a Thousand Faces
, 1972
"... Botiingen Foundation, andpttt.!.,.: b % / ,.,;:,c,m B<,.ik.*, second ..."
Abstract
-
Cited by 353 (0 self)
- Add to MetaCart
Botiingen Foundation, andpttt.!.,.: b % / ,.,;:,c,m B<,.ik.*, second
The dragon and the elephant: Agricultural and rural reforms
- in China and India, MTID Discussion Paper 87, IFPRI, Washington DC
, 2005
"... China and India are the two most extraordinary economic success stories of the developing world. Both nations ' economies have grown dramatically over the past few decades, elevating them from two of the world's poorest countries into projected economic superpowers. As a result, the number ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
, the numbers of Chinese and Indians living in poverty have rapidly fallen and per capita incomes in China and India have quadrupled and doubled, respectively. This book investigates the reasons for these staggering accomplishments and the lessons that can be applied both to other developing nations
The Oxford Companion to Philosophy
"... Disclaimer: This book contains characters with diacritics. When the characters can be represented using the ISO 8859-1 character set ..."
Abstract
-
Cited by 139 (1 self)
- Add to MetaCart
Disclaimer: This book contains characters with diacritics. When the characters can be represented using the ISO 8859-1 character set
and intangible assets in facilitating business finance Published by The Intellectual Property Office
, 2013
"... role of intellectual property and intangible assets in facilitating business finance ..."
Abstract
- Add to MetaCart
role of intellectual property and intangible assets in facilitating business finance
RESEARCH PAPERS FROM THE WIPO-WTO COLLOQUIUM FOR TEACHERS OF
, 2010
"... The World Intellectual Property Organization (WIPO) and ..."
A Taxonomy Of Computer Attacks With Applications To Wireless Networks
, 2001
"... The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed with th ..."
Abstract
-
Cited by 45 (0 self)
- Add to MetaCart
The majority of attacks made upon modern computers have been successful due to the exploitation of the same errors and weaknesses that have plagued computer systems for the last thirty years. Because the industry has not learned from these mistakes, new protocols and systems are not designed
Results 1 - 10
of
3,083