Biblio

Export 21400 results:
1999
Zanini, Michele. "Middle Eastern Terrorism and Netwar." Studies in Conflict and Terrorism 22, no. 3 (1999).
Murray, Williamson. "Military Culture Does Matter." FPRI Wire 7, no. 2 (1999).
Military Doctrine of the Republic of Bulgaria. National Assembly, 1999.
Yermolin, Vladimir. "Military Signs a New Doctrine." Izvestiya (1999).
Smith, Roger D.. "Military Simulation: Techniques & Technology." Information & Security: An International Journal 3 (1999): 170-184.
Gompert, David C., Richard L. Kugler, and Martin C. Libicki. Mind the Gap: Promoting a Transatlantic Revolution in Military Affairs. Washington, D.C.: National Defense University, 1999.
Editorial. "Modeling and Simulation in Defense and Security: NATO Context." Information & Security: An International Journal 3 (1999): 2-11.
Gelenbe, Erol. Modeling CGF with Learning Stochastic Finite-State Machines In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Goldreich, Oded. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin: Springer-Verlag, 1999.
Jilkov, Vesselin, Donka Angelova, and Tzvetan Semerdjiev. Mode-Set Adaptive IMM for Maneuvring Target Tracking In IEEE Trans. AES 35., 1999.
Karakaneva, Juliana. "The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation." Information & Security: An International Journal 3 (1999): 132-139.
Madinger, John, and Sydney A. Zalopany. "Money Laundering. A Guide for Criminal Investigators ." Boca Raton, FL: CRC Press (1999).
Monitor, ISIJ. "Monitor Reference." Information & Security: An International Journal 3 (1999): 196-213.
Monitor, ISIJ. "Monitor Research Centers." Information & Security: An International Journal 3 (1999): 214-220.
Metselaar, Max V.. "Is more Necessarily Better? Advantages and Disadvantages of the Explosion of Information Technologies for Political and Military Preparedness." In NL ARMS – Netherlands Annual Review of Military Studies, edited by J.M.J. Bosch, H.A.M. Luiijf and A.R. Mollema, 259-274., 1999.
Blanz, Volker, and Thomas Vetter. A morphable model for the synthesis of 3D faces In 26th annual conference on Computer graphics and interactive techniques (SIGGRAPH ’99). USA: ACM Press/Addison-Wesley Publishing Co., 1999.
Ćosić, Krešimir, Todor Kostic, Miroslav Slamić, Mario Volarevic, and Ivica Kopriva. A Multi-Level Hardware-in-the-Loop Simulation In 1999 Summer Computer Simulation Conference. Chicago, Illinois, 1999.
Semerdjiev, Emil, Kiril Alexiev, Emanuil Djerassi, and Pavlina Konstantinova. "Multiple Hypothesis Tracking Using Hough Transform Track Detector." Information & Security: An International Journal 2 (1999): 113-121.
Rao, Nageswara S. V.. "Multiple sensor fusion under unknown distributions." Journal of the Franklin Institute 336, no. 2 (1999): 285-299.
Madjarov, N., and L.S. Mihaylova. A Multiple-Model Adaptive Kalman Filter Algorithm for Continuous Systems In Comptes rendus de l'Academie Bulgare des Sciences. Vol. 51. Sofia, Bulgaria, 1999.
Mutual Legal Assistance Treaty between the United States of America and the Russian Federation., 1999.
Thomsen, D.J., Richard C. O’Brien, and C. Payne. Napoleon: Network Application Policy Environment In 4th ACM Workshop on Role-Based Access Control. Fairfax, Virginia, USA, 1999.
National Armed Forces Law, Latvia., 1999.
National Military Command Center Concept of Operations In Draft., 1999.
Sokolsky, Richard, and Tanya Charlick-Paley. “NATO and Caspian Security: A Mission Too Far?” In Project Air Force. Santa Monica, CA: RAND Corporation, 1999.

Pages