Biblio

Export 8432 results:
2000
Brand, M., and V. Kettnaker. "Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
Strigini, Lorenzo, and Bev Littlewood. "A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
Baumgaertel, Hartwig. "Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).
Mendelsohn, J.. Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
Patrone, David M., and Tony Nardo. A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Christoskov, Ludmil. "Earthquakes – Hazard and Contrameasures." 62 (2000).
Dang, A.V.. E-Business raises transaction security concerns . Gartner Advisory, 2000.
Levitt, Steven D., and Sudhir Alladi Venkatesh. "An Economic Analysis of a Drug-Selling Gang’s Finances." Quarterly Journal of Economics 115, no. 3 (2000): 755-789.
Sandler, Todd, and Walter Enders. "An Economic Perspective on Transnational Terrorism." European Journal of Political Economy (2000).
Lee, W.-B., and C.-Y. Chang. Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm In 10th National Conference on Information Security. Hualien, Taiwan, 2000.
Hirt, Martin, and Kazue Sako. Efficient Receipt-Free Voting based on Homomorphic Encryption In Advances in Cryptology, EUROCRYPT’00, Lecture Notes in Computer Science 1807. Berlin: Springer-Verlag, 2000.
Sun, Hung-Min. "An Efficient Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 958-961.
E. Perle, Gabriel, Mark A. Fischer, and John Taylor Williams. "Electronic Publishing and Software." Computer Law (2000).
Currie, David. "EMU: Threats and Opportunities for Companies and National Economies." In The Impact of the Euro. London: Palgrave Macmillan, 2000.
Ralston, Anthony, David Hemmendinger, and Edwin D. Reilly. Encyclopedia of Computer Science. John Wiley & Sons, 2000.
Smith, Karen. "The End of Civilian Power EU: A Welcome Demise or Cause for Concern?" The International Spectator 35, no. 2 (2000): 11-28.
Ebel, Robert, and Rajan Menon. Energy and Conflict in Central Asia and the Caucasus. Lanham: Rowman and Littlefield Publishers, 2000.
Salem, Fadi, and Fawaz Jarrah. "Escalating Middle East Cyberwar may Prove too Costly for Israeli Business." IT News (2000).
“Establishment of a committee for civilian crisis management. Council of the European Union, 2000.
Tkachenko, S.. "EU enlargement and Russia’s Security Concerns." In Russia and the European Security Institutions: Entering the Twenty First Century. Moscow: Carnegie Institute, 2000.
"EU Global Policing Role: How Non-military Crisis Management will Contaminate Justice and Home Affairs." Statewatch Bulletin 10, no. 3/4 (2000).

Страницы