Biblio

Export 21362 results:
1999
Semerdjiev, Emil, Ludmila Mihaylova, and X. Rong-Li. An Adaptive IMM Filter for Aircraft Tracking In 2nd Intern. Conf. on Multisource-Multisensor Information Fusion (Fusion’99). Sunnyvale, California, 1999.
Tolk, Andreas. Adjustable Rulesets versus Neural Nets for Order Generation in Closed Combat Simulation Models In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 1999.
Advanced Re-Locatable Multi-Sensor System for Buried Landmine Detection (Delft: International Research Center for Telecommunications-transmission and Radar. Technical University of Delft, 1999.
Labrou, Y., T. Finin, and Y. Peng. "Agent communication languages: The current landscape." IEEE Intelligent Systems 14, no. 2 (1999): 45-52.
Ambroszkiewicz, S.. Agent virtual organizations within the framework of network computing: a case study In The First International Workshop of Central and Eastern Europe on Multi-agent Systems CEEMAS'99 . St. Petersburg, Russia, 1999.
Maes, P., A. Moukas, and R. Guttman. "Agents that buy and sell." Communications of the ACM 42 (1999): 81-91.
Carothers, Thomas. Aiding Democracy Abroad. Washington, D.C.: Carnegie Endowment for International Peace, 1999.
Majko, Pandeli. "Albania and the Pact of Stability for South-East Europe." Analisti I Ballkanit 3, no. 14 (1999).
The Alliance’s Strategic Concept In NATO Press Release., 1999.
Piccoli, Wolfango. "Alliance Theory: The Case of Turkey and Israel." In CIAO Working Papers ., 1999.
Bell, Coral. "American Ascendancy and the Pretense of Concert." The National Interest (1999): 60.
Gierszewska, Grażyna, and Maria Romanowska. Analiza strategiczna przedsiębiorstwa. Warsaw: PWE, 1999.
Cilluffo, Frank, and George Salmoiraghi. "And the Winner is … the Albanian Mafia." The Washington Quarterly (1999).
Munslow, Barry. "Angola: The politics of unsustainable development." Third World Quarterly 20, no. 3 (1999): 551-568.
Tseng, Yuh-Min, and Jinn-Ke Jan. "Anonymous Conference Key Distribution Systems Based on the Discrete Logarithm Problem." Computer Communications 22, no. 8 (1999): 749-754.
Reiter, Michael K., and Aviel D. Rubin. "Anonymous Web Transactions with Crowds." Communications of the ACM 42, no. 2 (1999): 32-38.
Charney, Jonathon I.. "Anticipatory Humanitarian Intervention in Kosovo." American Journal of International Law 93, no. 4 (1999): 841.
Angelova, Donka, Tzvetan Semerdjiev, Vesselin Jilkov, and Emil Semerdjiev. Application of a Monte Carlo Method for Tracking Maneuvering Target in Clutter In Second IMACS Seminar on Monte-Carlo Methods. Varna, 1999.
George, Gary R., and Frank Cardullo. Application of Neuro-Fuzzy Systems to Behavioral Representation in Computer Generated Forces In Eighth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL: 575-585, 1999.
Gorbunov, A.. "Application of the Self-Organizing Map in Business and Finance." Bank Technologies 4 (1999): 34-40.
Binmore, K., and N. Vulkan. "Applying game theory to automated negotiation." In Netnomics 1-9. Baltzer Science Publishers BV, 1999.
Ronald, Roland. "Applying Modeling and Simulation to Enhance National and Multi-National Cooperation." Information & Security: An International Journal 3 (1999): 12-24.
Roland, Roland J.. "Applying modeling and simulations to enhance national and multi-national cooperation." Information and Security: An International Journal 3 (1999): 12-24.
Banks, Sheila B., and Martin R. Stytz. An Approach to Enhance Human Behavior Modeling for Computer-Generated Actors In Fourth International Simulation Technology and Training Conference (SimTecT ’99) . Melbourne, Australia, 1999.
Bessant, John, and Howard Rush. Approaches to Benchmarking: the case of ‘framework conditions’ and ICT-Os. Brighton, UK: Centre for Research in Innovation Management, University of Brighton, 1999.

Pages