Biblio

Export 21376 results:
2000
IEEE Std 1471 In IEEE Recommended Practice for Architectural Description of Software-Intensive Systems., 2000.
IEEE Std 1516-2000 - IEEE Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) — Framework and Rules. Institute of Electrical and Electronics Engineers Inc, 2000.
Alexiev, Kiril. Implementation of Hough Transform as Track Detector In International Conference on Multisource Multisensor Information Fusion ., 2000.
Suro, Roberto. "In Kosovo, an Uncertain Mission." Washington Post (2000).
Radaev, N.N.. "Increasing disaster probability prediction accuracy by taking into account heterogeneous statistical data." Automatics and Telemechanics 3 (2000).
Smith, Steve. "The Increasing Insecurity of Security Studies: Conceptualizing Security in the Last Twenty Years." In Critical Reflections on Security and Change. London: Frank Cass, 2000.
Ivanova, Petya, and Todor Tagarev. "Indicator Space Configuration for Early Warning of Violent Political Conflicts by Genetic Algorithms." Annals of Operations Research 97 (2000): 287-311.
Monitor, ISIJ. "Information Assurance Challenges." Information & Security: An International Journal 5 (2000): 131-132.
Tselkov, Veselin, and Dragomir Pargov. "Information Assurance in C4I Systems." Information & Security: An International Journal 4 (2000): 43-59.
Katzenbeisser, Stefan, and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Norwood, MA: Artech House Inc, 2000.
Information Operations as an Integrating Strategy In Cyberwar 3.0: Human Factors in Information Operations and Future Conflict. Fairfax, VA: AFCEA International Press, 2000.
Krusche, Stefan, and Andreas Tolk. Information Processing as a Key Factor for Modern Federations of Combat Information Systems In NATO IST Panel Symposium on New Information Processing Techniques for Military Systems, RTO-MP-049. Istanbul, Turkey, 2000.
Monitor, ISIJ. "The Information Revolution and Post-Modern Warfare." Information & Security: An International Journal 5 (2000): 127-128.
Monitor, ISIJ. "Information Security Architecture: An Integrated Approach to Security in the Organization." Information & Security: An International Journal 4 (2000): 116.
Monitor, ISIJ. "Information Security Management Handbook." Information & Security: An International Journal 4 (2000): 117-120.
Lakov, Dimitar, and Georgi Kirov. Information Soft Computing Agents In International Conference on Automatics and Informatics’2000, October 24-26, 2000), 135-140., 2000.
Koburov, Todor. "Information Support for Decision-Making during the Kosovo Crisis." Information & Security: An International Journal 5 (2000): 86-93.
Monitor, ISIJ. "Information Warfare and Security." Information & Security: An International Journal 4 (2000): 113-115.
Wallander, Celeste A.. "Institutional Assets and Adaptability: NATO after the Cold War." International Organization 54, no. 4 (2000): 705-735.
Grooms, Linda D.. "Interaction in the Computer-mediated Adult Distance Learning Environment: Leadership Development through Online Education." Dissertation Abstracts International 61, no. 12 (2000): 4692A.
Graschew, Georgi, Stefan Rakowsky, P. Balanou, and Peter M. Schlag. "Interactive Telemedicine in the Operating Theatre of the Future." Journal of Telemedicine and Telecare 6, no. 24 (2000): 20-34.
Graschew, Georgi, Stefan Rakowsky, Theo A. Roelofs, and Peter M. Schlag. "Interaktive Telemedizin in dem EU-Projekt GALENOS." Biomedizinische Technik 45 (2000): 326.
Belitser, N.. "Interethnic relations and the Islamic factor in the Crimea (Міжетнічні відносини та ісламський фактор в Криму)." Kryms’ki studii (2000): 1, 37.
Paolucci, M., K. Sycara, and O. Shehory. Interleaving planning and execution in a multiagent team planning environment. Pittsburgh: The Robotics Institute, Carnegie Mellon Univeristy, 2000.
“International Policing in South-eastern Europe, report from the Assembly In doc. A/1721, 07/12/00. Western European Union, 2000.

Pages