Biblio
Export 21401 results:
Разработка многоагентной технологии управления контекстом в открытой информационной среде." Труды СПИИРАН 3, no. 1 (2006): 33-61.
"Сблъсъкът на цивилизациите. Обсидиан, 2006.
Центральный Кавказ: От геополитики к геоэкономике. Стокгольм: Институт Стратегических Исследований Кавказа и CA&CC Press, 2006.
The 2003 European Union Security Strategy: A Critical Appraisal." European Foreign Affairs Review 10, no. 1 (2005): 129.
"2005 EU Organised Crime Report. Brussels: Council of the European Union, 2005.
2005 World Summit Outcome In Resolution adopted by the General Assembly, Document., 2005.
4 least Significant Bits Information Hiding Implementation and Analysis." In ICGST International Conference on Graphics, Vision and Image Processing (GVIP-05). Cairo, Egypt, 2005.
" Absolute Destruction: Military Culture and the Practices of War in Imperial Germany . New York: Cornell University Press, 2005.
After the Re-election of President Bush: An Outlook on Transatlantic Relations from a German Perspective; or, Why German-U.S. Relations Still Matter to the Transatlantic Alliance In Athena Papers. Vol. 2. Garmisch-Partenkirchen: Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2005.
Agent-Based Intelligent Support to Coalition Operations." Information & Security: An International Journal 16 (2005): 41-61.
"Al-Qaeda's Operational Evolution: Behavioral and Organizational Perspectives In Mental Health Law & Policy Faculty Publications. University of South Florida, 2005.
Alternative Futures and Army Force Planning . Santa Monica, CA: RAND Arroyo Center, 2005.
Alternative Futures and Army Force Planning: Implications for the Future Force Era. Santa Monica, CA: RAND Corporation, Arroyo Center, 2005.
Analiza primene IMM algoritma za praćenje manevrišućih ciljeva." Vojnotehnički glasnik 3-4 (2005).
"Analysis and adaptation of NC3A and NATO member countries’ models for analysis, estimation, decision-making, planning and management in emergency situations and support to the computer assisted staff exercises at national and regional level (SEE and the In IT4Sec Reports. Sofia: Institute of Information and Communication Technologies, 2005.
Analysis of IMM algorithm for maneuvering target tracking." Vojnotehnički glasnik 53, no. 3-4 (2005).
"The Analysis of Protracted Social Conflict: A Tribute to Edward Azar." Review of International Studies 31, no. 1 (2005): 109-126.
"An Analysis of the Legal Framework Governing Prosecution of Traffickers and Victim Protection in Central Asian Countries." Connections: The Quarterly Journal 4, no. 4 (2005): 29-38.
"An Analytical Overview of Democratic Oversight and Governance of the Defence and Security Sector in Ukraine." In DCAF Working Papers., 2005.
"Analyzing Security Protocols with Secrecy Types and Logic Programs." Journal of the ACM 52, no. 1 (2005): 102-146.
"