Biblio
Export 21463 results:
A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
"Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
"A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
"Displacement in the Former Soviet Region." In The State of the World’s Refugees 2000 – Fifty Years of Humanitarian Action, 192-193. Oxford: Oxford University Press, 2000.
"Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
"Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
"Distribution Cognition. San Diego: University of California Press, 2000.
Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
"Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
"DoD Redefining Info Ops." Federal Computer Week (2000).
"Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
A dossier for voting (Досьє для голосування)." Den’ (2000): 4.
"Earthquakes – Hazard and Contrameasures." 62 (2000).
"E-Business raises transaction security concerns . Gartner Advisory, 2000.
An Economic Analysis of a Drug-Selling Gang’s Finances." Quarterly Journal of Economics 115, no. 3 (2000): 755-789.
"Economic and Political Impediments to Middle East Peace: Critical Questions and Alternative Scenarios. New York: Palgrave Macmillian, 2000.
An Economic Perspective on Transnational Terrorism." European Journal of Political Economy (2000).
"Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm In 10th National Conference on Information Security. Hualien, Taiwan, 2000.
Efficient Receipt-Free Voting based on Homomorphic Encryption In Advances in Cryptology, EUROCRYPT’00, Lecture Notes in Computer Science 1807. Berlin: Springer-Verlag, 2000.
An Efficient Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 958-961.
"Electromagnetic Radiation and the Computer Systems Data Security Problem." Information & Security: An International Journal 4 (2000): 105-109.
"Electronic Publishing and Software." Computer Law (2000).
"Emergency Preparedness Act., 2000.