Biblio

Export 8450 results:
2000
Smets, Ph.. Data Fusion in the Transferable Belief Model In Proc. of Fusion 2000. Paris: Intern. Conf. on Information Fusion, 2000.
Mason, Colin R., and James Moffat. Decision Making Support: Representing the C2 Process in Simulations: Modelling the Human Decision-Maker In 2000 Winter Simulation Conference. Orlando, FL, USA, 2000.
Saunders, P.J., and G. Ward. "Decontamination of Chemically Contaminated Casualties: Implications for the Health Service and a Regional Strategy." Pre-hospital Immediate Care 4, no. 3 (2000): 122-125.
Defence, United Kingdom Mi. Defence Diplomacy, Policy Paper 1. MoD , 2000.
Defending America’s Cyberspace: National Plan for Information Systems Protection, Version 1.0: An Invitation to a Dialogue. Washington, D.C.: The White House, 2000.
Hirst, Paul. "Democracy and Governance." In Debating Governance: Authority, Steering, and Democracy, edited by Jon Pierre, 13-35. Oxford: Oxford University Press, 2000.
Martin, Lisa L.. Democratic Commitments: Legislatures and International Cooperation. Princeton, NJ: Princeton University Press, 2000.
West, D.. "De-Mystifying Telecom Fraud." Telecom Business (2000).
Le Blanc, Gilles. "Dépenses Militaires, Restructuration de l’Industrie d’Armement et Privatisation de la Défense: Analyse Comparée France–États-Unis 1994-1999." Arès 28, no. 46 (2000): 48.
Blackman, Samuel S., and Robert Populi. Design and Analysis of Modern Tracking Systems. Norwood: MA: Artech House, 2000, 2000.
Kawaguchi, T., D. Hidaka, and M. Rizon. "Detection of Eyes from Human Faces by Hough Transform and Separability Filter." In Proceedings of the IEEE International Conference on Image Processing, 49-52. Vol. 1 . Vancouver: British Columbia, 2000.
Sirois, Alexandre. "Deux Canadiens sur trois pensent ne pas influencer leurs gouvernements." La Presse (Montréal) (2000): C20.
Fink, D.. "Developing trust for Electronic Commerce." In Internet and Intranet: Security and Management: Risks and Solutions, 44-86. Idea Group Publishing, 2000.
Winrow, Gareth. Dialogue with the Mediterranean: The Role of NATO’s Mediterranean Initiative . New York/London: Routledge, 2000.
Die parlamentarische Kontrolle der Nachrichtendienste [Parliamentary Control of the Intelligence Services]. Neue Zeitschrift für Verwaltungsrecht, 2000.
Lee-Young, Joanne. "The Digital Prince of China." The Industry Standard (2000).
Hwang, Min-Shiang, Chin-Chen Chang, and Kuo-Feng Hwang. "Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
Chang, Chin-Chen, Min-Shiang Hwang, and Kuo-Feng Hwang. "A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
Brand, M., and V. Kettnaker. "Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
Strigini, Lorenzo, and Bev Littlewood. "A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
Baumgaertel, Hartwig. "Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).

Страницы