Biblio
Export 21400 results:
Algebraic aspects of cryptography . Springer, 1998.
An Alternative IMM Filter for Benchmark Tracking Problem In 1st Intern. Conf. on Multisource-Multisensor Inform. Fusion-FUSION' 98 . Vol. 2. Las Vegas, Nevada, 1998.
Analysis of DYNTACS and ModSAF LOS Algorithms In 20th International Conference on Information Technology Interfaces ITI '98 . Pula, Croatia, 1998.
"Analysis of the functional and real-time requirements of a Multi-Sensor Data Fusion (MSDF) / Situation and Threat Assessment (STA) / Resource Management (RM) system." In Sensor Fusion: Architectures, Algorithms, and Applications II, SPIE Aerosense‘98, 198-209. Orlando, 1998.
Analytical Solution of discrete colored noise ECA Tracking filter." IEEE AES-34 1 (1998): 93-102.
"Anonymous Secure e-Voting over a Network In Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC’98). Scottsdale, AZ, USA: IEEE Computer Society, 1998.
Answering Senate Questions about NATO Enlargement In The Heritage Foundation Backgrounder., 1998.
Applications and Explanations of Zipf's Law." In New Methods in Language Processing and Computational Natural Language Learning, 151-160. ACL, 1998.
"An Approach for a Fast Reduction of the Full Ignorance in the Target Identification Process In the First International Conference on Multisource-Multisensor Information Fusion. Vol. 2. Las Vegas, Nevada, 1998.
An Approach For a Fast reduction of the Full Ignorance in the Target Identification Process In First International Conference on Information Fusion (Fusion’98). Las Vegas, 1998.
An Architecture for a Combat Simulation In 20th Information Technology Interfaces Conference ITI ‘98 . Pula, 1998.
Arguing Safety – A Systematic Approach to Managing Safety Cases. University of York, 1998.
The Armenians of Iran . Cambridge, MA: Harvard Middle Eastern Monographs, 1998.
Arms Procurement Decision Making Processes. Oxford: Oxford University, 1998.
At Arm’s Length – The European Union and Europe’s Defence Industry. London: MacMillan, 1998.
Attacks on Copyright Marking Systems." In Second Workshop on Information Hiding, Lecture Notes in Computer Science, 218-38. Vol. 1525. Portland, Oregon, 1998.
"Aztec Warfare: Imperial Expansion and Political Control In Civilization of the American Indian series. Norman: University of Oklahoma Press, 1998.
Basic Principle of the Security and Defense Policy of the Republic of Hungary. Resolution of the National Assembly 94, 1998.
Becoming a Leader of Leaders." In Rethinking the Future, 148-63. London: Nicholas Brealey Publishing, 1998.
"Benchmark for radar resource allocation and tracking targets in the presence of ECM." IEEE Trans. on AES 34, no. 4 (1998): 1094-1114.
"Big decisions, big risks: improving accountability in mega projects." International Review of Administrative Sciences 64, no. 3 (1998): 423-440.
"Blinde Vlekken in de Politiepraktijk en de Politiewetenschap – Over Politie, Wetenschap, Macht, Beleid, Integriteit en Communicatie. Arnhem: Gouda Quint, 1998.
The Broken Crescent: The “Threat” of Militant Islamic Fundamentalism. Westport, CT: Praeger, 1998.
Bulgaria and NATO: 7 Lost Years." Information & Security: An International Journal 1, no. 2 (1998): 93-104.
"