Biblio

Export 21403 results:
1999
Sohn, Ardyth B., Jan LeBlanc Wicks, Stephen Lacy, and George Sylvie. Media Management: A Casebook Approach. 2nd ed. Mahwah, N.J.: Lawrence Erlbaum Associates, 1999.
Membership Action Plan (MAP) In NATO Press Release., 1999.
Kharchenko, Vyacheslav. Methods of an Estimation of the Multi-version Safety Systems In 17th International System Safety Conference. Orlando, FL, 1999.
Zanini, Michele. "Middle Eastern Terrorism and Netwar." Studies in Conflict and Terrorism 22, no. 3 (1999).
Murray, Williamson. "Military Culture Does Matter." FPRI Wire 7, no. 2 (1999).
Military Doctrine of the Republic of Bulgaria. National Assembly, 1999.
Yermolin, Vladimir. "Military Signs a New Doctrine." Izvestiya (1999).
Smith, Roger D.. "Military Simulation: Techniques & Technology." Information & Security: An International Journal 3 (1999): 170-184.
Gompert, David C., Richard L. Kugler, and Martin C. Libicki. Mind the Gap: Promoting a Transatlantic Revolution in Military Affairs. Washington, D.C.: National Defense University, 1999.
Editorial. "Modeling and Simulation in Defense and Security: NATO Context." Information & Security: An International Journal 3 (1999): 2-11.
Gelenbe, Erol. Modeling CGF with Learning Stochastic Finite-State Machines In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin: Springer-Verlag, 1999.
Jilkov, Vesselin, Donka Angelova, and Tzvetan Semerdjiev. Mode-Set Adaptive IMM for Maneuvring Target Tracking In IEEE Trans. AES 35., 1999.
Karakaneva, Juliana. "The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation." Information & Security: An International Journal 3 (1999): 132-139.
Madinger, John, and Sydney A. Zalopany. "Money Laundering. A Guide for Criminal Investigators ." Boca Raton, FL: CRC Press (1999).
Monitor, ISIJ. "Monitor Reference." Information & Security: An International Journal 3 (1999): 196-213.
Monitor, ISIJ. "Monitor Research Centers." Information & Security: An International Journal 3 (1999): 214-220.
Metselaar, Max V.. "Is more Necessarily Better? Advantages and Disadvantages of the Explosion of Information Technologies for Political and Military Preparedness." In NL ARMS – Netherlands Annual Review of Military Studies, edited by J.M.J. Bosch, H.A.M. Luiijf and A.R. Mollema, 259-274., 1999.
Blanz, Volker, and Thomas Vetter. A morphable model for the synthesis of 3D faces In 26th annual conference on Computer graphics and interactive techniques (SIGGRAPH ’99). USA: ACM Press/Addison-Wesley Publishing Co., 1999.
Ćosić, Krešimir, Todor Kostic, Miroslav Slamić, Mario Volarevic, and Ivica Kopriva. A Multi-Level Hardware-in-the-Loop Simulation In 1999 Summer Computer Simulation Conference. Chicago, Illinois, 1999.
Semerdjiev, Emil, Kiril Alexiev, Emanuil Djerassi, and Pavlina Konstantinova. "Multiple Hypothesis Tracking Using Hough Transform Track Detector." Information & Security: An International Journal 2 (1999): 113-121.
Rao, Nageswara S. V.. "Multiple sensor fusion under unknown distributions." Journal of the Franklin Institute 336, no. 2 (1999): 285-299.
Madjarov, N., and L.S. Mihaylova. A Multiple-Model Adaptive Kalman Filter Algorithm for Continuous Systems In Comptes rendus de l'Academie Bulgare des Sciences. Vol. 51. Sofia, Bulgaria, 1999.
Mutual Legal Assistance Treaty between the United States of America and the Russian Federation., 1999.
Thomsen, D.J., Richard C. O’Brien, and C. Payne. Napoleon: Network Application Policy Environment In 4th ACM Workshop on Role-Based Access Control. Fairfax, Virginia, USA, 1999.

Pages