Biblio
Export 21400 results:
Middle Eastern Terrorism and Netwar." Studies in Conflict and Terrorism 22, no. 3 (1999).
"Military Culture Does Matter." FPRI Wire 7, no. 2 (1999).
"Military Doctrine of the Republic of Bulgaria. National Assembly, 1999.
Military Signs a New Doctrine." Izvestiya (1999).
"Military Simulation: Techniques & Technology." Information & Security: An International Journal 3 (1999): 170-184.
"Mind the Gap: Promoting a Transatlantic Revolution in Military Affairs. Washington, D.C.: National Defense University, 1999.
Modeling and Simulation in Defense and Security: NATO Context." Information & Security: An International Journal 3 (1999): 2-11.
"Modeling CGF with Learning Stochastic Finite-State Machines In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Berlin: Springer-Verlag, 1999.
Mode-Set Adaptive IMM for Maneuvring Target Tracking In IEEE Trans. AES 35., 1999.
The Modular Simulation Language (MODSIM) -A Powerful Tool for Computer Simulation." Information & Security: An International Journal 3 (1999): 132-139.
"Money Laundering. A Guide for Criminal Investigators ." Boca Raton, FL: CRC Press (1999).
"Monitor Reference." Information & Security: An International Journal 3 (1999): 196-213.
"Monitor Research Centers." Information & Security: An International Journal 3 (1999): 214-220.
"Is more Necessarily Better? Advantages and Disadvantages of the Explosion of Information Technologies for Political and Military Preparedness." In NL ARMS – Netherlands Annual Review of Military Studies, edited by J.M.J. Bosch, H.A.M. Luiijf and A.R. Mollema, 259-274., 1999.
"A morphable model for the synthesis of 3D faces In 26th annual conference on Computer graphics and interactive techniques (SIGGRAPH ’99). USA: ACM Press/Addison-Wesley Publishing Co., 1999.
A Multi-Level Hardware-in-the-Loop Simulation In 1999 Summer Computer Simulation Conference. Chicago, Illinois, 1999.
Multiple Hypothesis Tracking Using Hough Transform Track Detector." Information & Security: An International Journal 2 (1999): 113-121.
"Multiple sensor fusion under unknown distributions." Journal of the Franklin Institute 336, no. 2 (1999): 285-299.
"A Multiple-Model Adaptive Kalman Filter Algorithm for Continuous Systems In Comptes rendus de l'Academie Bulgare des Sciences. Vol. 51. Sofia, Bulgaria, 1999.
Mutual Legal Assistance Treaty between the United States of America and the Russian Federation., 1999.
Napoleon: Network Application Policy Environment In 4th ACM Workshop on Role-Based Access Control. Fairfax, Virginia, USA, 1999.
National Military Command Center Concept of Operations In Draft., 1999.
NATO and Caspian Security: A Mission Too Far? In Project Air Force. Santa Monica, CA: RAND Corporation, 1999.