| 1 |
|
00
|
Galliers, R. D.
|
ELSEVIER
|
2000
|
|
|
|
| 2 |
|
A 50 Hz, 14 mT magnetic field is not mutagenic or co-mutagenic in bacterial mutation assays/
|
Nakasono, Satoshi Koana, Takao; Ikehata, Masateru; Saiki, Hiroshi
|
Elsevier
|
2000
|
|
|
|
| 3 |
|
A bargaining model of Farrell inefficiency
|
Haskel, J.
|
ELSEVIER
|
2000
|
|
|
|
| 4 |
|
A Bayesian analysis of multiple-output production frontiers
|
Fernandez, C.
|
ELSEVIER
|
2000
|
|
|
|
| 5 |
|
A Bayesian analysis of the multinomial probit model with fully identified parameters
|
McCulloch, R. E.
|
ELSEVIER
|
2000
|
|
|
|
| 6 |
|
A Bayesian approach to dynamic macroeconomics
|
DeJong, D. N.
|
ELSEVIER
|
2000
|
|
|
|
| 7 |
|
A Biometric Standard for Information Management and Security
|
Matyas Jr., S. M.
|
ELSEVIER
|
2000
|
|
|
|
| 8 |
|
Abnormal returns to rivals of acquisition targets: A test of the `acquisition probability hypothesis' - an empirical analysis
|
Song, M.H.
|
ELSEVIER
|
2000
|
|
|
|
| 9 |
|
Abstracts of Recent Articles and Literature
|
Palmer, C.
|
ELSEVIER
|
2000
|
|
|
|
| 10 |
|
Abstracts of Recent Articles and Literature
|
Palmer, C.
|
ELSEVIER
|
2000
|
|
|
|
| 11 |
|
Abstracts of Recent Articles and Literature
|
Palmer, C.
|
ELSEVIER
|
2000
|
|
|
|
| 12 |
|
A burst-level traffic analysis tool/
|
Evangelatos, A
|
Elsevier
|
2000
|
|
|
|
| 13 |
|
Acceptable and Walrasian allocations
|
Tauman, Y.
|
ELSEVIER
|
2000
|
|
|
|
| 14 |
|
Access to coverage for high-risks in a competitive individual health insurance market: via premium rate restrictions or risk-adjusted premium subsidies?
|
van de Ven, W. P.
|
ELSEVIER
|
2000
|
|
|
|
| 15 |
|
Accounting for the impairment of long-lived assets: Evidence from the petroleum industry
|
Alciatore, M.
|
ELSEVIER
|
2000
|
|
|
|
| 16 |
|
Accounting standards and value relevance of financial statements: An international analysis
|
Hung, M.
|
ELSEVIER
|
2000
|
|
|
|
| 17 |
|
Accumulative pollution, "clean technology," and policy design
|
Toman, M. A.
|
ELSEVIER
|
2000
|
|
|
|
| 18 |
|
Achieving Interoperability in a Multiple-Security-Policies Environment
|
00
|
ELSEVIER
|
2000
|
|
|
|
| 19 |
|
A comment on indentured servitude: in response to Kritikos and Bolle - February 15th, 1998
|
Holt, G.
|
ELSEVIER
|
2000
|
|
|
|
| 20 |
|
A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms
|
Gupta, S.
|
ELSEVIER
|
2000
|
|
|
|