Biblio

Export 21275 results:
2000
Kawaguchi, T., D. Hidaka, and M. Rizon. "Detection of Eyes from Human Faces by Hough Transform and Separability Filter." In Proceedings of the IEEE International Conference on Image Processing, 49-52. Vol. 1 . Vancouver: British Columbia, 2000.
Sirois, Alexandre. "Deux Canadiens sur trois pensent ne pas influencer leurs gouvernements." La Presse (Montréal) (2000): C20.
Fink, D.. "Developing trust for Electronic Commerce." In Internet and Intranet: Security and Management: Risks and Solutions, 44-86. Idea Group Publishing, 2000.
Borden, Andrew. "The Dialectics of Information – A Framework." Information & Security: An International Journal 4 (2000): 33-40.
Editorial. "Dialectics of Information Security." Information & Security: An International Journal 4 (2000): 2-12.
Winrow, Gareth. Dialogue with the Mediterranean: The Role of NATO’s Mediterranean Initiative . New York/London: Routledge, 2000.
Kipphoff, Petra. "Die Berufung der Frau. Warum das Gewehr bei uns Männersache ist." Die Zeit (2000): 39.
Die Bundeswehr – sicher ins 21. Jahrhundert. Eckpfeiler für eine Erneuerung von Grund auf. Bonn: German Ministry of Defense, 2000.
Peitsch, Dietmar, and Christina Polzin. "Die parlamentarische Kontrolle der Nachrichtendienste." Neue Zeitschrift für Verwaltungsrecht 4 (2000): 387-93.
Die parlamentarische Kontrolle der Nachrichtendienste [Parliamentary Control of the Intelligence Services]. Neue Zeitschrift für Verwaltungsrecht, 2000.
Lee-Young, Joanne. "The Digital Prince of China." The Industry Standard (2000).
Hwang, Min-Shiang, Chin-Chen Chang, and Kuo-Feng Hwang. "Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
Chang, Chin-Chen, Min-Shiang Hwang, and Kuo-Feng Hwang. "A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
Brand, M., and V. Kettnaker. "Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
Strigini, Lorenzo, and Bev Littlewood. "A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
Cutts, Mark, Sean Loughna, and Frances Nicholson. "Displacement in the Former Soviet Region." In The State of the World’s Refugees 2000 – Fifty Years of Humanitarian Action, 192-193. Oxford: Oxford University Press, 2000.
Baumgaertel, Hartwig. "Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
Hutchins, Edwin. Distribution Cognition. San Diego: University of California Press, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Doctrine of National Security of the Russian Federation - 2000., 2000.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).
Mendelsohn, J.. Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
Patrone, David M., and Tony Nardo. A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.

Pages