Biblio

Export 21404 results:
2003
Tagliabue, John. "Lockheed Wins Huge Sale to Poland With Complex Deal." The New York Times (2003).
Carbo, Javier, and Agapito Ledezma. A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers In Advances in Web Intelligence First International AtlanticWeb Intelligence Conference, AWIC 2003. Madrid, Spain, 2003.
Paoli, Letizia. Mafia Brotherhoods: Organized Crime, Italian Style. Oxford: Oxford University Press, 2003.
. "Making Sense of Security Governance." In Challenges of Security Sector Governance., 2003.
Pavlov, Georgi, and Juliana Karakaneva. "Management of the Information Systems Development Life Cycle." Trakia Journal of Sciences 1, no. 4 (2003): 8-12.
Winkler, Theodore. "Managing Change. The Reform and Democratic Control of the Security Sector and International Order." In Security Sector Reform: Institutions, Society and Good Governance. Baden-Baden: Nomos, 2003.
Kelly, Timothy. Managing Complex Safety Cases In Safety Critical System Symposium Berlin: Springer., 2003.
Kelly, Timothy. Managing Complex Safety Cases In 11th Safety Critical System Symposium ., 2003.
Tagarev, Todor, Tilcho Ivanov, and Dobromir Totev. "Managing Resources for Defence and Security." In Programme of Integration of the Republic of Bulgaria into NATO, edited by Konstantin Dimitrov and Velizar Shalamanov. Sofia: Institute for Euroatlantic Security, 2003.
Marjanovic, Olivera. Managing the Normative Context of Composite e-Services In International Conference on Web Services (ICWS-Europe’2003). Erfurt, Germany, 2003.
Wang, W. H.. Map building by mobile robots in unknown environment In Shanghai Jiao Tong University. Vol. Ph. D. Thesis., 2003.
Mosseau, Michael. "Market Civilization and Its Clash with Terror." International Security 27, no. 3 (2003): 5-29.
Georgiev, George, and Valentine Penev. "Mathematical Model of Fuzzy Control System for Autonomous Guided Vehicle in 3D Space." Information & Security: An International Journal 12, no. 2 (2003): 195-207.
Masek, Libor, and Peter Koves. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. School of Computer Science and Software Engineering, University of Western Australia, 2003.
Armitage, Grenville J.. Maximising Student Exposure to Unix Networking using FreeBSD Virtual Hosts In Technical Report. CAIA, 2003.
Kleppe, Anneke, Jos Warmer, and Wim Bast. MDA Explained: The Model Driven Architecture Practice and Promise. Addison Wesley, 2003.
Tagarev, Todor. "A Means of Comparing Military Budgeting Processes in South East Europe." Information & Security: An International Journal 11 (2003): 95-135.
Georgieva, Stoyana, and Avgustina Tzvetkova. "Media, Civil Society and Public Policy." In Defence and Security Sector Governance and Reform in South Easter Europe: Insights and Perspectives, edited by Jan A. Trapans and Philipp H. Fluri, 269-280. Vol. 1. Geneva/Belgrade: Geneva Centre for the Democratic Control of Armed Forces, 2003.
Klymov, Sergey. "Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System." Yzvestyia TRTU 4, no. 33 (2003): 27-31.
Hochhut, Martin. "Militärische Bundesintervention bei inländischem Terrorakt." Neue Zeitschrift für Wehrrecht (2003): 154-67.
Schmidinger, Franz, and Werner Suez. "Militärkommando Niederösterreich: Das Katastro-pheneinsatzkonzept [Provincial Military Command/Lower Austria: Disaster Relief Concept]." Truppendienst 2 (2003).
Szpyra, Ryszard. Militarne operacje informacyjne. Warsaw: AON, 2003.
Brömmelhörster, Jörn, and Wolf-Christian Paes. The Military as an Economic Actor: Soldiers in Business. New York: Palgrave Macmillan, 2003.
The Military Balance 2002-2003. London: The Institute for Strategic Studies, 2003.
Annati, Massimo. "Military Technology." Mine Hunting & Mine Clearing Revisited (2003): 48.

Pages