Biblio
Export 8461 results:
Dialogue with the Mediterranean: The Role of NATO’s Mediterranean Initiative . New York/London: Routledge, 2000.
Die parlamentarische Kontrolle der Nachrichtendienste [Parliamentary Control of the Intelligence Services]. Neue Zeitschrift für Verwaltungsrecht, 2000.
The Digital Prince of China." The Industry Standard (2000).
"Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
"A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
"Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
"A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
"Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
"Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
"Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
"Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
"DoD Redefining Info Ops." Federal Computer Week (2000).
"Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Earthquakes – Hazard and Contrameasures." 62 (2000).
"E-Business raises transaction security concerns . Gartner Advisory, 2000.
An Economic Analysis of a Drug-Selling Gang’s Finances." Quarterly Journal of Economics 115, no. 3 (2000): 755-789.
"An Economic Perspective on Transnational Terrorism." European Journal of Political Economy (2000).
"Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm In 10th National Conference on Information Security. Hualien, Taiwan, 2000.
Efficient Receipt-Free Voting based on Homomorphic Encryption In Advances in Cryptology, EUROCRYPT’00, Lecture Notes in Computer Science 1807. Berlin: Springer-Verlag, 2000.
An Efficient Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 958-961.
"Electronic Publishing and Software." Computer Law (2000).
"EMU: Threats and Opportunities for Companies and National Economies." In The Impact of the Euro. London: Palgrave Macmillan, 2000.
"Encyclopedia of Computer Science. John Wiley & Sons, 2000.
The End of Civilian Power EU: A Welcome Demise or Cause for Concern?" The International Spectator 35, no. 2 (2000): 11-28.
"Страницы
- « первая
- ‹ предыдущая
- …
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- …
- следующая ›
- последняя »