Biblio

Export 21400 results:
1998
Koblitz, Neal. Algebraic aspects of cryptography . Springer, 1998.
Jilkov, V.P., L.S. Mihaylova, and X. Rong-Li. An Alternative IMM Filter for Benchmark Tracking Problem In 1st Intern. Conf. on Multisource-Multisensor Inform. Fusion-FUSION' 98 . Vol. 2. Las Vegas, Nevada, 1998.
Ćosić, Krešimir, Imre Balogh, and Sasa Bistrovic. Analysis of DYNTACS and ModSAF LOS Algorithms In 20th International Conference on Information Technology Interfaces ITI '98 . Pula, Croatia, 1998.
"Analysis of the functional and real-time requirements of a Multi-Sensor Data Fusion (MSDF) / Situation and Threat Assessment (STA) / Resource Management (RM) system." In Sensor Fusion: Architectures, Algorithms, and Applications II, SPIE Aerosense‘98, 198-209. Orlando, 1998.
Ozkaya, B., and Cengiz C. Arcasoy. "Analytical Solution of discrete colored noise ECA Tracking filter." IEEE AES-34 1 (1998): 93-102.
Mu, Yi, and Vijay Varadharajan. Anonymous Secure e-Voting over a Network In Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC’98). Scottsdale, AZ, USA: IEEE Computer Society, 1998.
Answering Senate Questions about NATO Enlargement In The Heritage Foundation Backgrounder., 1998.
The Application of a Customer Funding Regime to the NATO C3 Agency., 1998.
Powers, David M. W.. "Applications and Explanations of Zipf's Law." In New Methods in Language Processing and Computational Natural Language Learning, 151-160. ACL, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach for a Fast Reduction of the Full Ignorance in the Target Identification Process In the First International Conference on Multisource-Multisensor Information Fusion. Vol. 2. Las Vegas, Nevada, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach For a Fast reduction of the Full Ignorance in the Target Identification Process In First International Conference on Information Fusion (Fusion’98). Las Vegas, 1998.
Slamić, Miroslav, Neven Šosterič, Jadranka Jukić, Ante Modrić, and Dražen Penzar. An Architecture for a Combat Simulation In 20th Information Technology Interfaces Conference ITI ‘98 . Pula, 1998.
Kelly, Timothy Patrick. Arguing Safety – A Systematic Approach to Managing Safety Cases. University of York, 1998.
The Armenians of Iran . Cambridge, MA: Harvard Middle Eastern Monographs, 1998.
Singh, Ravinder Pal. Arms Procurement Decision Making Processes. Oxford: Oxford University, 1998.
Guay, Terrence. At Arm’s Length – The European Union and Europe’s Defence Industry. London: MacMillan, 1998.
Petitcolas, Fabien A. P., Ross J. Anderson, and Markus G. Kuhn. "Attacks on Copyright Marking Systems." In Second Workshop on Information Hiding, Lecture Notes in Computer Science, 218-38. Vol. 1525. Portland, Oregon, 1998.
Hassig, Ross. Aztec Warfare: Imperial Expansion and Political Control In Civilization of the American Indian series. Norman: University of Oklahoma Press, 1998.
Basic Principle of the Security and Defense Policy of the Republic of Hungary. Resolution of the National Assembly 94, 1998.
Bennis, Warren. "Becoming a Leader of Leaders." In Rethinking the Future, 148-63. London: Nicholas Brealey Publishing, 1998.
Blair, W., and G. Watson. "Benchmark for radar resource allocation and tracking targets in the presence of ECM." IEEE Trans. on AES 34, no. 4 (1998): 1094-1114.
Bruzelius, Nils, Bent Flyvbjerg, and Werner Rothengatter. "Big decisions, big risks: improving accountability in mega projects." International Review of Administrative Sciences 64, no. 3 (1998): 423-440.
Huberts, Leo W. J. C.. Blinde Vlekken in de Politiepraktijk en de Politiewetenschap – Over Politie, Wetenschap, Macht, Beleid, Integriteit en Communicatie. Arnhem: Gouda Quint, 1998.
Hoveyda, Fereydoun. The Broken Crescent: The “Threat” of Militant Islamic Fundamentalism. Westport, CT: Praeger, 1998.
Simon, Jeffrey. "Bulgaria and NATO: 7 Lost Years." Information & Security: An International Journal 1, no. 2 (1998): 93-104.

Pages