Biblio

Export 8062 results:
2000
Kawaguchi, T., D. Hidaka, and M. Rizon. "Detection of Eyes from Human Faces by Hough Transform and Separability Filter." In Proceedings of the IEEE International Conference on Image Processing, 49-52. Vol. 1 . Vancouver: British Columbia, 2000.
Sirois, Alexandre. "Deux Canadiens sur trois pensent ne pas influencer leurs gouvernements." La Presse (Montréal) (2000): C20.
Fink, D.. "Developing trust for Electronic Commerce." In Internet and Intranet: Security and Management: Risks and Solutions, 44-86. Idea Group Publishing, 2000.
Winrow, Gareth. Dialogue with the Mediterranean: The Role of NATO’s Mediterranean Initiative . New York/London: Routledge, 2000.
Die parlamentarische Kontrolle der Nachrichtendienste [Parliamentary Control of the Intelligence Services]. Neue Zeitschrift für Verwaltungsrecht, 2000.
Lee-Young, Joanne. "The Digital Prince of China." The Industry Standard (2000).
Hwang, Min-Shiang, Chin-Chen Chang, and Kuo-Feng Hwang. "Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
Chang, Chin-Chen, Min-Shiang Hwang, and Kuo-Feng Hwang. "A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
Brand, M., and V. Kettnaker. "Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
Strigini, Lorenzo, and Bev Littlewood. "A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
Baumgaertel, Hartwig. "Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).
Mendelsohn, J.. Does Arms Control Have a Future?,” NATO Parliamentary Assembly 46th Rose Roth Seminar In Non-Proliferation and Arms Control: The Agenda for the 21st Century. Portoroz, Slovenia, 2000.
Patrone, David M., and Tony Nardo. A Domain and Simulation-Independent Architecture for Creating Simulated Object Behaviors In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Christoskov, Ludmil. "Earthquakes – Hazard and Contrameasures." 62 (2000).
Dang, A.V.. E-Business raises transaction security concerns . Gartner Advisory, 2000.
Levitt, Steven D., and Sudhir Alladi Venkatesh. "An Economic Analysis of a Drug-Selling Gang’s Finances." Quarterly Journal of Economics 115, no. 3 (2000): 755-789.
Sandler, Todd, and Walter Enders. "An Economic Perspective on Transnational Terrorism." European Journal of Political Economy (2000).
Lee, W.-B., and C.-Y. Chang. Efficient Proxy-Protected Proxy Signature Scheme Based on Discrete Logarithm In 10th National Conference on Information Security. Hualien, Taiwan, 2000.
Hirt, Martin, and Kazue Sako. Efficient Receipt-Free Voting based on Homomorphic Encryption In Advances in Cryptology, EUROCRYPT’00, Lecture Notes in Computer Science 1807. Berlin: Springer-Verlag, 2000.
Sun, Hung-Min. "An Efficient Remote User Authentication Scheme Using Smart Cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 958-961.
E. Perle, Gabriel, Mark A. Fischer, and John Taylor Williams. "Electronic Publishing and Software." Computer Law (2000).

Страници