Biblio

Export 8450 results:
1998
"Analysis of the functional and real-time requirements of a Multi-Sensor Data Fusion (MSDF) / Situation and Threat Assessment (STA) / Resource Management (RM) system." In Sensor Fusion: Architectures, Algorithms, and Applications II, SPIE Aerosense‘98, 198-209. Orlando, 1998.
Ozkaya, B., and Cengiz C. Arcasoy. "Analytical Solution of discrete colored noise ECA Tracking filter." IEEE AES-34 1 (1998): 93-102.
Mu, Yi, and Vijay Varadharajan. Anonymous Secure e-Voting over a Network In Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC’98). Scottsdale, AZ, USA: IEEE Computer Society, 1998.
Answering Senate Questions about NATO Enlargement In The Heritage Foundation Backgrounder., 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach For a Fast reduction of the Full Ignorance in the Target Identification Process In First International Conference on Information Fusion (Fusion’98). Las Vegas, 1998.
Semerdjiev, Emil, and Albena Tchamova. An Approach for a Fast Reduction of the Full Ignorance in the Target Identification Process In the First International Conference on Multisource-Multisensor Information Fusion. Vol. 2. Las Vegas, Nevada, 1998.
Slamić, Miroslav, Neven Šosterič, Jadranka Jukić, Ante Modrić, and Dražen Penzar. An Architecture for a Combat Simulation In 20th Information Technology Interfaces Conference ITI ‘98 . Pula, 1998.
Kelly, Timothy Patrick. Arguing Safety – A Systematic Approach to Managing Safety Cases. University of York, 1998.
The Armenians of Iran . Cambridge, MA: Harvard Middle Eastern Monographs, 1998.
Singh, Ravinder Pal. Arms Procurement Decision Making Processes. Oxford: Oxford University, 1998.
Guay, Terrence. At Arm’s Length – The European Union and Europe’s Defence Industry. London: MacMillan, 1998.
Basic Principle of the Security and Defense Policy of the Republic of Hungary. Resolution of the National Assembly 94, 1998.
Bennis, Warren. "Becoming a Leader of Leaders." In Rethinking the Future, 148-63. London: Nicholas Brealey Publishing, 1998.
Blair, W., and G. Watson. "Benchmark for radar resource allocation and tracking targets in the presence of ECM." IEEE Trans. on AES 34, no. 4 (1998): 1094-1114.
Bruzelius, Nils, Bent Flyvbjerg, and Werner Rothengatter. "Big decisions, big risks: improving accountability in mega projects." International Review of Administrative Sciences 64, no. 3 (1998): 423-440.
Huberts, Leo W. J. C.. Blinde Vlekken in de Politiepraktijk en de Politiewetenschap – Over Politie, Wetenschap, Macht, Beleid, Integriteit en Communicatie. Arnhem: Gouda Quint, 1998.
Hoveyda, Fereydoun. The Broken Crescent: The “Threat” of Militant Islamic Fundamentalism. Westport, CT: Praeger, 1998.
Simon, Jeffrey. Bulgaria and NATO: 7 Lost Years. Strategic Forum, 1998.
Bundesverfassung der Schweizerischen Eidgenossenschaft. Bern: Die Bundesbehörden der Schweizerischen Eidgenossenschaft, 1998.
Hill, Christopher. "“Closing the capabilities-expectations gap?”." In A Common Foreign Policy for Europe. London: Routledge, 1998.
Troebst, Stefan. Conflict in Kosovo: Failure of Prevention? Analytical Documentation, 1992–1998. Flensburg: European Centre for Minority Issues, 1998.
Czerwinski, Thomas. Coping With The Bounds: Speculations on Nonlinearity in Military Affairs. Washington, D.C.: NDU Press, 1998.
Mauro, Paolo. "Corruption and Composition of Government Expenditure." Journal of Public Economics 69, no. 2 (1998): 263-79.
Heath, Robert. Crisis Management for Managers and Executives. London/San Francisco: Financial Times Pitman Publishing, 1998.
Reiter, Michael K., and Aviel D. Rubin. "Crowds: Anonymity for Web Transactions." ACM Transactions on Information and System Security 1, no. 1 (1998): 66-92.

Страницы