Biblio

Export 21363 results:
1998
Kempf, Hubert. "15 Jahre umfassende Landesverteidigung im Bundeskanzleramt [15 Years of Comprehensive National Defense in the Federal Chancellery." Austrian Military Journal 2, no. 2 (1998): 98.
Bohlen, Celestine. "4 Foreigners Are Found Beheaded in Chechnya." New York Times (1998).
Act dated 5 June 1998 on County Self-Government., 1998.
Act dated 5 June 1998 on Provincial Self-Government., 1998.
Fox, D., W. Burgard, and S. Thrun. "Active Markov localization for mobile robots." Robotics and Autonomous Systems 25, no. 12 (1998): 195-207.
Oppermann, Reinhard, and Marcus Specht. Adaptive Support for a Mobile Museum Guide In Workshop on Interactive Applications of Mobile Computing (IMC'98). Rostock, Germany, 1998.
Ball, Nicole. Addressing Military Expenditures and Military Roles in Developing Countries: A Review of Members Approaches., 1998.
Administration Act (1998). State Gazette, no.130, 1998.
Magnus, Ralph H., and Eden Naby. Afghanistan: Mullah, Marx and Mujahid. Bouder, CO: Westview Press, 1998.
Agreement on the Multinational Peace Force South Eastern Europe. SEDM states, 1998.
Freud, Sigmund. "Aktualne uwagi o wojnie i śmierci." In Pisma społeczne, 29. Warsaw: Wydawnictwo KR, 1998.
Katsirdakis, G.. "Albania: A Case Study in the Practical Implementation of Partnership for Peace." NATO Review 46, no. 2 (1998): 22-26.
Koblitz, Neal. Algebraic aspects of cryptography . Springer, 1998.
Jilkov, V.P., L.S. Mihaylova, and X. Rong-Li. An Alternative IMM Filter for Benchmark Tracking Problem In 1st Intern. Conf. on Multisource-Multisensor Inform. Fusion-FUSION' 98 . Vol. 2. Las Vegas, Nevada, 1998.
Ćosić, Krešimir, Imre Balogh, and Sasa Bistrovic. Analysis of DYNTACS and ModSAF LOS Algorithms In 20th International Conference on Information Technology Interfaces ITI '98 . Pula, Croatia, 1998.
"Analysis of the functional and real-time requirements of a Multi-Sensor Data Fusion (MSDF) / Situation and Threat Assessment (STA) / Resource Management (RM) system." In Sensor Fusion: Architectures, Algorithms, and Applications II, SPIE Aerosense‘98, 198-209. Orlando, 1998.
Ozkaya, B., and Cengiz C. Arcasoy. "Analytical Solution of discrete colored noise ECA Tracking filter." IEEE AES-34 1 (1998): 93-102.
Mu, Yi, and Vijay Varadharajan. Anonymous Secure e-Voting over a Network In Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC’98). Scottsdale, AZ, USA: IEEE Computer Society, 1998.
Answering Senate Questions about NATO Enlargement In The Heritage Foundation Backgrounder., 1998.
The Application of a Customer Funding Regime to the NATO C3 Agency., 1998.
Powers, David M. W.. "Applications and Explanations of Zipf's Law." In New Methods in Language Processing and Computational Natural Language Learning, 151-160. ACL, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach for a Fast Reduction of the Full Ignorance in the Target Identification Process In the First International Conference on Multisource-Multisensor Information Fusion. Vol. 2. Las Vegas, Nevada, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach For a Fast reduction of the Full Ignorance in the Target Identification Process In First International Conference on Information Fusion (Fusion’98). Las Vegas, 1998.
Slamić, Miroslav, Neven Šosterič, Jadranka Jukić, Ante Modrić, and Dražen Penzar. An Architecture for a Combat Simulation In 20th Information Technology Interfaces Conference ITI ‘98 . Pula, 1998.

Pages