Biblio

Export 21402 results:
2000
Zielke, Anne. "Der Körper des Gegners. Frauen dürfen an die Waffen: Endet damit die Männerherrschaft?" Süddeutsche Zeitung (2000): 14.
Blackman, Samuel S., and Robert Populi. Design and Analysis of Modern Tracking Systems. Norwood: MA: Artech House, 2000, 2000.
Kawaguchi, T., D. Hidaka, and M. Rizon. "Detection of Eyes from Human Faces by Hough Transform and Separability Filter." In Proceedings of the IEEE International Conference on Image Processing, 49-52. Vol. 1 . Vancouver: British Columbia, 2000.
Sirois, Alexandre. "Deux Canadiens sur trois pensent ne pas influencer leurs gouvernements." La Presse (Montréal) (2000): C20.
Fink, D.. "Developing trust for Electronic Commerce." In Internet and Intranet: Security and Management: Risks and Solutions, 44-86. Idea Group Publishing, 2000.
Borden, Andrew. "The Dialectics of Information – A Framework." Information & Security: An International Journal 4 (2000): 33-40.
Editorial. "Dialectics of Information Security." Information & Security: An International Journal 4 (2000): 2-12.
Winrow, Gareth. Dialogue with the Mediterranean: The Role of NATO’s Mediterranean Initiative . New York/London: Routledge, 2000.
Kipphoff, Petra. "Die Berufung der Frau. Warum das Gewehr bei uns Männersache ist." Die Zeit (2000): 39.
Die Bundeswehr – sicher ins 21. Jahrhundert. Eckpfeiler für eine Erneuerung von Grund auf. Bonn: German Ministry of Defense, 2000.
Peitsch, Dietmar, and Christina Polzin. "Die parlamentarische Kontrolle der Nachrichtendienste." Neue Zeitschrift für Verwaltungsrecht 4 (2000): 387-93.
Die parlamentarische Kontrolle der Nachrichtendienste [Parliamentary Control of the Intelligence Services]. Neue Zeitschrift für Verwaltungsrecht, 2000.
Lee-Young, Joanne. "The Digital Prince of China." The Industry Standard (2000).
Hwang, Min-Shiang, Chin-Chen Chang, and Kuo-Feng Hwang. "Digital Watermarking of Images Using Neural Networks." Journal of Electronic Imaging 9, no. 4 (2000): 548-555.
Chang, Chin-Chen, Min-Shiang Hwang, and Kuo-Feng Hwang. "A Digital Watermarking Scheme Using Human Visual Effects." Informatica: An International Journal of Computing and Informatics 24, no. 4 (2000): 505-511.
Brand, M., and V. Kettnaker. "Discovery and segmentation of activities in video." IEEE Trans. Pattern Analysis and Machine Intelligence 22, no. 8 (2000).
Strigini, Lorenzo, and Bev Littlewood. "A Discussion of Practices for Enhancing Diversity in Software Designs." Technical Report LS_DI_TR_04 (2000).
Cutts, Mark, Sean Loughna, and Frances Nicholson. "Displacement in the Former Soviet Region." In The State of the World’s Refugees 2000 – Fifty Years of Humanitarian Action, 192-193. Oxford: Oxford University Press, 2000.
Baumgaertel, Hartwig. "Distributed Constraint Processing for Production Logistics." IEEE Intelligent Systems 15, no. 1 (2000): 40-48.
Naor, Moni, and Benny Pinkas. "Distributed Oblivious Transfer." In Advances in Cryptology: ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security . Kyoto, Japan, 2000.
Hutchins, Edwin. Distribution Cognition. San Diego: University of California Press, 2000.
M., Daniel. "Distribution of Contradictive Belief Masses in Combination of Belief Functions." In Information, Uncertainty and Fusion, 431-446. Kluwer Academic Publishers, 2000.
Robson, John. "Do Not Interrupt the Politicians." Ottawa Citizen (2000): A16.
Doctrine of National Security of the Russian Federation - 2000., 2000.
Verton, Dan. "DoD Redefining Info Ops." Federal Computer Week (2000).

Pages