Biblio

Export 21401 results:
2005
Alexiev, Kiril. "Spatio-Temporal Data Visualization and Analysis for Multi-Target Tracking." In NATO SCIENCE SERIES SUB SERIES III COMPUTER AND SYSTEMS SCIENCES 198 ., 2005.
Alexiev, Kiril. Spatio-Temporal Data Visualization and Analysis for Multi-Target Tracking In Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management. Том 198 от Elisa Shahbazian,Galina Rogova, Pierre Valin ed., 2005.
Barni, Mauro, and F. Pérez-González. "Special Session on Watermarking Security." In Security, Steganography, and Watermarking of Multimedia Contents VII, of Proceedings of SPIE-IS&T Electronic Imaging, 685-768. Vol. 5681. San Jose, CA: SPIE, 2005.
Berkok, Ugurhan G.. "Specialization in Defence Forces." Defence and Peace Economics 16 (2005): 191-204.
Okamoto, Eiji, Jose L. Vivas, Jose A. Montenegro, Javier Lopez, and Ed Dawson. "Specification and Design of Advanced Authentication Authorization Services." Computer Standards and Interfaces 27 (2005): 467-78.
Powell, Nancy. Statement to the House Armed Services Committee hearing., 2005.
Shea, Jamie. STOPWATCH 2, Bridging the Mediterranean In Special Interactive Video Forum series ., 2005.
Zubir, Mokhzani, and Mohd Nizam Basiron. The Straits of Malacca: The Rise of China, America’s Intentions and the Dilemma of the Littoral States. Maritime Institute of Malaysia online articles, 2005.
Gilstrap, Donald L.. "Strange Attractors and Human Interaction: Leading Complex Organizations through the Use of Metaphors." Complicity: An International Journal of Complexity and Education 2, no. 1 (2005): 55-69.
Jones, Jeffrey B.. "Strategic Communication: A Mandate for the United States." Joint Force Quarterly, no. 39 (2005).
Li, Hao, Gary W. Rosenwald, Juhwan Jung, and Chen-Ching Liu. Strategic Power Infrastructure Defense In IEEE ., 2005.
Government of the Republic of Macedonia. Strategy and action plan on informatics society of the Republic of Macedonia., 2005.
Strengthening Black Sea Security . Sofia, 2005.
Davis, Lynn E., and Micheal J. Polich. Stretched Thin: Army Forces for Sustained Operations. Santa Monica, CA: Rand Corporation, 2005.
Strong passwords. Microsoft Technet Library, 2005.
Chen, I-Te. Studies on Proxy Signatures with/without Proactive Property In Department of Computer Science, College of Computer Science . Vol. Doctor of Philosophy in Computer Science. HsinChu, Taiwan, Republic of China: National Chiao Tung University, 2005.
Simmhan, Yogesh L., Beth Plale, and Dennis Gannon. "A Survey of Data Provenance in e-Science." ACM SIGMOD 34, no. 3 (2005): 31-36.
Haddad, Simon. "A Survey of Lebanese Shi’i attitudes towards Hezbollah." Small Wars and Insurgencies 16, no. 3 (2005): 317-333.
Brady, Arlo Kristjan O.. The Sustainability Effect: Rethinking Corporate Reputation in the 21st Century. New York: Palgrave Macmillan, 2005.
Kolesnykov, Aleksandr A.. Synergetycheskoe metodы upravlenyja slozhnыmy systemamy: teoryja systemnogo synteza. Moscow: Edytoral URSS, 2005.
Salloukh, Bassel F.. Syria and Lebanon: A Brotherhood Transformed In Middle East Research and Information Project., 2005.
Karklins, Rasma. The System Made Me Do It: Corruption in Post-Communist Societies. Armonk, NY: M. E. Sharpe, 2005.
Makarenko, Tamara. "Takfiri Presence Grows in Europe." Jane’s Intelligence Review (2005).
Speckhard, Anne, and Khapta Akhmedova. "Talking to Terrorists." Journal of Psychohistory (2005): 125-56.
Walt, Stephen. Taming American Power: The Global Response to U.S. Primacy. New York: W. W. Norton, 2005.

Pages