Biblio
Export 8453 results:
Cyber Laws Pass – but Confusion Reigns." Bangkok Post (2000).
"Cyber-warfare rages across Taiwan Strait." Jane’s Intelligence Review (2000).
" Data Fusion in the Transferable Belief Model In Proc. of Fusion 2000. Paris: Intern. Conf. on Information Fusion, 2000.
Decision Making Support: Representing the C2 Process in Simulations: Modelling the Human Decision-Maker In 2000 Winter Simulation Conference. Orlando, FL, USA, 2000.
Decontamination of Chemically Contaminated Casualties: Implications for the Health Service and a Regional Strategy." Pre-hospital Immediate Care 4, no. 3 (2000): 122-125.
"Defence Diplomacy, Policy Paper 1. MoD , 2000.
Defending America’s Cyberspace: National Plan for Information Systems Protection, Version 1.0: An Invitation to a Dialogue. Washington, D.C.: The White House, 2000.
Democracy and Governance." In Debating Governance: Authority, Steering, and Democracy, edited by Jon Pierre, 13-35. Oxford: Oxford University Press, 2000.
"Democratic Commitments: Legislatures and International Cooperation. Princeton, NJ: Princeton University Press, 2000.
De-Mystifying Telecom Fraud." Telecom Business (2000).
"Dépenses Militaires, Restructuration de l’Industrie d’Armement et Privatisation de la Défense: Analyse Comparée France–États-Unis 1994-1999." Arès 28, no. 46 (2000): 48.
"Design and Analysis of Modern Tracking Systems. Norwood: MA: Artech House, 2000, 2000.
Detection of Eyes from Human Faces by Hough Transform and Separability Filter." In Proceedings of the IEEE International Conference on Image Processing, 49-52. Vol. 1 . Vancouver: British Columbia, 2000.
"Deux Canadiens sur trois pensent ne pas influencer leurs gouvernements." La Presse (Montréal) (2000): C20.
"Developing trust for Electronic Commerce." In Internet and Intranet: Security and Management: Risks and Solutions, 44-86. Idea Group Publishing, 2000.
"Dialogue with the Mediterranean: The Role of NATO’s Mediterranean Initiative . New York/London: Routledge, 2000.
Die parlamentarische Kontrolle der Nachrichtendienste [Parliamentary Control of the Intelligence Services]. Neue Zeitschrift für Verwaltungsrecht, 2000.
The Digital Prince of China." The Industry Standard (2000).
"Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
"A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
"Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
"A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
"Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
"Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
"Страницы
- « первая
- ‹ предыдущая
- …
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- …
- следующая ›
- последняя »