Biblio

Export 21393 results:
2005
Gadeyne, Klaas. Sequential Monte Carlo Methods for Rigorous Bayesian Modeling of Autonomous Compliant Motion (Recursieve Monte Carlo methodes voor het autonoom uitvoeren van robottaken in contact). Vol. dissertation. KU Leuven, 2005.
Peterson, G. D.. "Service Oriented Security Architecture." nformation Security Bulletin 10 (2005): 325-30.
R., Haenni. "Shedding New Light on Zadeh’s Criticism of Dempster’s Rule of Combination." In Proceedings of Information Fusion. Philadelphia, 2005.
R., Haenni. Shedding New Light on Zadeh’s Criticism of Dempsters Rule of Combination In Fusion 2005 Conference. Philadelphia, 2005.
Bonàs, Mònica Casabayó. Shopping behaviour forecasts: Experiments based on a fuzzy learning technique in the Spanish food retailing industry. Vol. PhD . Barcelona, Spain: The University of Edinburgh, 2005.
Dezert, Jean, and Florentin Smarandache. A short overview on DSmT for Information Fusion In 10th Int. Conf. on Fuzzy Theory and Techn. Salt Lake City, Utah, USA, 2005.
The Significance of Sino-Russian Military Exercises., 2005.
Smarandache, Florentin, and Jean Dezert. "A Simple Proportional Conflict Redistribution Rule." International Journal of AppliedMathematics & Statistics 3, no. J05 (2005): 1-36.
Niemeyer, Klaus. "Simulation of Critical Infrastructure." Information & Security : An International Journal 17 (2005): 120-143.
Niemeyer, Klaus. "Simulation of Critical Infrastructures." Information & Security: An International Journal 17 (2005): 120-143.
A Single Army for the 21st Century. Sarajevo: Final Report by the Defense Reform Commission, 2005.
Prezelj, Iztok, and Marija Gaber. Smuggling as a Threat to National and International Security: Slovenia and the Balkan Route In Athena Papers. Vol. 5. Garmisch-Partenkirchen: Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2005.
Dunn, Myriam. "The socio-political dimensions of critical information infrastructure protection (CIIP)." International Journal of Critical Infrastructures 1, no. 2/3 (2005).
Fluri, Philipp H., and Miroslav Hadzic. Sourcebook on Security Sector Reform. Belgrade/Geneva: DCAF, 2005.
Hansen, Thomas Blom. "Sovereigns Beyond the State: On Legality and Authority in Urban India." In Sovereign Bodies: Citizens, Migrants, and States in the Postcolonial World, 169-91. Princeton, New Jersey: Princeton University Press, 2005.
Rudolph, Christopher. "Sovereignty and Territorial Borders in a Global Age." International Studies Review 7, no. 1 (2005): 1-20.
Dotzev, Nikolay. "The Soviet Legacy: Transforming Bulgaria’s Armed Forces for Homeland Security Missions." Connections: The Quarterly Journal 4, no. 3 (2005): 83-95.
Alexiev, Kiril. Spatio-Temporal Data Visualization and Analysis for Multi-Target Tracking In Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management. Том 198 от Elisa Shahbazian,Galina Rogova, Pierre Valin ed., 2005.
Alexiev, Kiril. "Spatio-Temporal Data Visualization and Analysis for Multi-Target Tracking." In NATO SCIENCE SERIES SUB SERIES III COMPUTER AND SYSTEMS SCIENCES 198 ., 2005.
Barni, Mauro, and F. Pérez-González. "Special Session on Watermarking Security." In Security, Steganography, and Watermarking of Multimedia Contents VII, of Proceedings of SPIE-IS&T Electronic Imaging, 685-768. Vol. 5681. San Jose, CA: SPIE, 2005.
Berkok, Ugurhan G.. "Specialization in Defence Forces." Defence and Peace Economics 16 (2005): 191-204.
Okamoto, Eiji, Jose L. Vivas, Jose A. Montenegro, Javier Lopez, and Ed Dawson. "Specification and Design of Advanced Authentication Authorization Services." Computer Standards and Interfaces 27 (2005): 467-78.
Powell, Nancy. Statement to the House Armed Services Committee hearing., 2005.
Shea, Jamie. STOPWATCH 2, Bridging the Mediterranean In Special Interactive Video Forum series ., 2005.
Zubir, Mokhzani, and Mohd Nizam Basiron. The Straits of Malacca: The Rise of China, America’s Intentions and the Dilemma of the Littoral States. Maritime Institute of Malaysia online articles, 2005.

Pages