Biblio
Export 8456 results:
Filters: Filter is [Clear All Filters]
Security Requirements for E-Government Services: A Methodological Approach for Developing a Common PKI-based Security Policy." Computer Communications 26, no. 16 (2003): 1873-1883.
"Security Sector Expert Formation-Achievements and Needs in South East Europe In Vienna: National Defence Academy,Geneva Centre for the Democratic Control of Armed Forces and the PfP-Consortium of Defence Academies and Security Studies Institutes., 2003.
Security Sector Reform – Does It Work? Problems of Civil-Military and Interagency Cooperation in the Security Sector . Geneva/Sofia: DCAF and GCMA, 2003.
Security Sector Reform – Does It Work?: Problems of Civil-Military and Interagency Cooperation in the Security Sector. Geneva/Sofia: DCAF and GCMA, 2003.
Security Sector Reform in South East Europe: A Study in Norms Transfer." In Challenges of Security Sector Governance, 119-146. Münster: LIT, 2003.
"The Self-Serv Environment for Web Services Composition." IEEE Internet Computing 7, no. 1 (2003): 40-48.
"Semantic Based Similarity Searches in Database Systems (Multidimensional Access Methods, Similarity Search Algorithms) In FAW-Institute. Vol. PhD Thesis. Austria: University of Linz, 2003.
Semantische Mediation für heterogene Informationsquellen. Berlin: Akademische Verlagsgesellschaft Aka GmbH, 2003.
Sensor Data Fusion for Context-Aware Computing Using Dempster-Shafer Theory In CMU-RI-TR-03-52. Pittsburg, Pennsylvania: Robotics Institute, Carnegie Mellon University, 2003.
Service Chart Diagrams – Description & Application In Alternate Tracks of the Twelfth International World Wide Web Conference (WWW’2003). Budapest, Hungary, 2003.
Sexual Slavery in Bosnia; the Negative Externality of the Marketplace." Swords and Plowshare 13, no. 1 (2003): 27-43.
" Shaping the Next One Hundred Years: New Methods for Quantitative, Long-Term Policy Analysis." RAND Corporation (2003).
"Shaping the Security Environment in South-Eastern Europe: Bulgarian Armed Forces and National Security Policy." In Almost NATO: Partners and Players in Central and Eastern Europe, edited by Charles Krupnick, 119-155. Lanham, Md.: Rowman & Littlefield, 2003.
"A Shared View from the Academic ADL Co-Lab In International Conference on Emerging Telecommunications Applications. Košice, Slovak Republic, 2003.
The Shield of Achilles: War, Peace and the Course of History. London: Penguin Books, 2003.
Sicherheit vor den Gefahren des Terrorismus durch den Einsatz der Streitkräfte." Neue Zeitschrift für Wehrrecht (2003): 45-65.
"Simultaneous localization and mapping with unknown data association using Fast SLAM In IEEE International Conference on Robotics and Automation., 2003.
Slovenia’s Contemporary Defense Framework: What Implications for Theory?" Slovene Studies 1, no. 2 (2003): 71-80.
"Smart License Plate Recognition System based on Image Processing Using Neural Network In Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing System: Technology and Applications., 2003.
"The Solution to the ‘Democratic Deficit.’ A New Type of Governance for the European Union." Laurent PechJournal of European Integration 25:2 25, no. 2 (2003).
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards." Informatica 14, no. 3 (2003): 289-294.
"Southeast European Security after the 2004 Dual Enlargement . Bucharest, 2003.
Страницы
- « первая
- ‹ предыдущая
- …
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- …
- следующая ›
- последняя »