Biblio

Export 21341 results:
2000
Lee-Young, Joanne. "The Digital Prince of China." The Industry Standard (2000).
Hwang, Min-Shiang, Chin-Chen Chang, and Kuo-Feng Hwang. "Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
Chang, Chin-Chen, Min-Shiang Hwang, and Kuo-Feng Hwang. "A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
Brand, M., and V. Kettnaker. "Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
Strigini, Lorenzo, and Bev Littlewood. "A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
Cutts, Mark, Sean Loughna, and Frances Nicholson. "Displacement in the Former Soviet Region." In The State of the World’s Refugees 2000 – Fifty Years of Humanitarian Action, 192-193. Oxford: Oxford University Press, 2000.
Baumgaertel, Hartwig. "Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
Hutchins, Edwin. Distribution Cognition. San Diego: University of California Press, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Doctrine of National Security of the Russian Federation - 2000., 2000.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).
Mendelsohn, J.. Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
Patrone, David M., and Tony Nardo. A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Chemeris, I.. "A dossier for voting (Досьє для голосування)." Den’ (2000): 4.
Christoskov, Ludmil. "Earthquakes – Hazard and Contrameasures." 62 (2000).
Dang, A.V.. E-Business raises transaction security concerns . Gartner Advisory, 2000.
Levitt, Steven D., and Sudhir Alladi Venkatesh. "An Economic Analysis of a Drug-Selling Gang’s Finances." Quarterly Journal of Economics 115, no. 3 (2000): 755-789.
Wright, Jerry W., and Laura Drake. Economic and Political Impediments to Middle East Peace: Critical Questions and Alternative Scenarios. New York: Palgrave Macmillian, 2000.
Sandler, Todd, and Walter Enders. "An Economic Perspective on Transnational Terrorism." European Journal of Political Economy (2000).
Lee, W.-B., and C.-Y. Chang. Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm In 10th National Conference on Information Security. Hualien, Taiwan, 2000.
Hirt, Martin, and Kazue Sako. Efficient Receipt-Free Voting based on Homomorphic Encryption In Advances in Cryptology, EUROCRYPT’00, Lecture Notes in Computer Science 1807. Berlin: Springer-Verlag, 2000.
Sun, Hung-Min. "An Efficient Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 958-961.
Nachev, Atanas. "Electromagnetic Radiation and the Computer Systems Data Security Problem." Information & Security: An International Journal 4 (2000): 105-109.

Pages