<ctx:context-object xsi:schemaLocation="info:ofi/fmt:xml:xsd:ctx http://www.openurl.info/registry/docs/info:ofi/fmt:xml:xsd:ctx" timestamp="2021-08-27T17:36:16Z" xmlns:ctx="info:ofi/fmt:xml:xsd:ctx" xmlns:xsi="http://www.w3.org/2001/XML"><ctx:referent><ctx:identifier>info:oai:pure.iiasa.ac.at:4708</ctx:identifier><ctx:metadata-by-val><ctx:format>info:ofi/fmt:xml:xsd:book</ctx:format><ctx:metadata><dis:journal xsi:schemaLocation="info:ofi/fmt:xml:xsd:book http://www.openurl.info/registry/docs/info:ofi/fmt:xml:xsd:book" xmlns:dis="info:ofi/fmt:xml:xsd:book"><dis:authors><dis:author><dis:aulast>Avenhaus</dis:aulast><dis:aufirst>R.</dis:aufirst><dis:au>Avenhaus, R.</dis:au></dis:author><dis:author><dis:aulast>Canty</dis:aulast><dis:aufirst>M.</dis:aufirst><dis:au>Canty, M.</dis:au></dis:author></dis:authors><dis:date>1996</dis:date><dis:title>Verification, politics and the sensible distribution of inspection resources</dis:title><dis:btitle>Models for Security Policy in the Post-Cold War Era</dis:btitle><dis:genre>bookitem</dis:genre></dis:journal></ctx:metadata></ctx:metadata-by-val></ctx:referent></ctx:context-object>