Biblio

Export 8456 results:
Filters: Filter is   [Clear All Filters]
2003
Lambrinoudakis, Costas, Stefanos Gritzalis, Fredj Dridi, and Günther Pernul. "Security Requirements for E-Government Services: A Methodological Approach for Developing a Common PKI-based Security Policy." Computer Communications 26, no. 16 (2003): 1873-1883.
Law, David, and Philipp Fluri. Security Sector Expert Formation-Achievements and Needs in South East Europe In Vienna: National Defence Academy,Geneva Centre for the Democratic Control of Armed Forces and the PfP-Consortium of Defence Academies and Security Studies Institutes., 2003.
Fluri, Philipp H., and Velizar Shalamanov. Security Sector Reform – Does It Work? Problems of Civil-Military and Interagency Cooperation in the Security Sector . Geneva/Sofia: DCAF and GCMA, 2003.
Fluri, Philipp H., and Velizar Shalamanov. Security Sector Reform – Does It Work?: Problems of Civil-Military and Interagency Cooperation in the Security Sector. Geneva/Sofia: DCAF and GCMA, 2003.
Fluri, Philipp H., and Eden Cole. "Security Sector Reform in South East Europe: A Study in Norms Transfer." In Challenges of Security Sector Governance, 119-146. Münster: LIT, 2003.
Benatallah, Boualem, Quan Z. Sheng, and Marlon Dumas. "The Self-Serv Environment for Web Services Composition." IEEE Internet Computing 7, no. 1 (2003): 40-48.
Dang, Tran Khanh. Semantic Based Similarity Searches in Database Systems (Multidimensional Access Methods, Similarity Search Algorithms) In FAW-Institute. Vol. PhD Thesis. Austria: University of Linz, 2003.
Wache, Holger. Semantische Mediation für heterogene Informationsquellen. Berlin: Akademische Verlagsgesellschaft Aka GmbH, 2003.
Wu, Huadong. Sensor Data Fusion for Context-Aware Computing Using Dempster-Shafer Theory In CMU-RI-TR-03-52. Pittsburg, Pennsylvania: Robotics Institute, Carnegie Mellon University, 2003.
Maamar, Zakaria, Boualem Benatallah, and Wathiq Mansoor. Service Chart Diagrams – Description & Application In Alternate Tracks of the Twelfth International World Wide Web Conference (WWW’2003). Budapest, Hungary, 2003.
Pallen, Daniel. "Sexual Slavery in Bosnia; the Negative Externality of the Marketplace." Swords and Plowshare 13, no. 1 (2003): 27-43.
McDermott, Roger. Shanghai Cooperation Organization Takes Significant Step Towards Viability., 2003.
Lempert, Robert J., Steven W. Popper, and Steven C. Bankes. " Shaping the Next One Hundred Years: New Methods for Quantitative, Long-Term Policy Analysis." RAND Corporation (2003).
Tagarev, Todor. "Shaping the Security Environment in South-Eastern Europe: Bulgarian Armed Forces and National Security Policy." In Almost NATO: Partners and Players in Central and Eastern Europe, edited by Charles Krupnick, 119-155. Lanham, Md.: Rowman & Littlefield, 2003.
Brown, Judy. A Shared View from the Academic ADL Co-Lab In International Conference on Emerging Telecommunications Applications. Košice, Slovak Republic, 2003.
Bobbitt, Philip. The Shield of Achilles: War, Peace and the Course of History. London: Penguin Books, 2003.
Wiefelspütz, Dieter. "Sicherheit vor den Gefahren des Terrorismus durch den Einsatz der Streitkräfte." Neue Zeitschrift für Wehrrecht (2003): 45-65.
Montemerlo, M., and S. Thrun. Simultaneous localization and mapping with unknown data association using Fast SLAM In IEEE International Conference on Robotics and Automation., 2003.
Derdzinski, Joseph L.. "Slovenia’s Contemporary Defense Framework: What Implications for Theory?" Slovene Studies 1, no. 2 (2003): 71-80.
Koval, Valeriy N., Volodymyr Turchenko, V. Kochan, George Markowsky, and Anatoly Sachenko. Smart License Plate Recognition System based on Image Processing Using Neural Network In Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing System: Technology and Applications., 2003.
"The Solution to the ‘Democratic Deficit.’ A New Type of Governance for the European Union." Laurent PechJournal of European Integration 25:2 25, no. 2 (2003).
Chang, Chin-Chen, and Kuo-Feng Hwang. "Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards." Informatica 14, no. 3 (2003): 289-294.
Southeast European Security after the 2004 Dual Enlargement . Bucharest, 2003.
Statement of Interdiction Principles., 2003.
Shelley, Louise. Statement to the House Committee on International Relations, Subcommittee on International Terrorism, Nonproliferation and Human Rights., 2003.

Страницы