kw.\*:("Defensa nacional")
Results 1 to 25 of 47
Selection :
COMPASS: the verification and validation of an operational analysis model for use in the prediction of Nimrod MRA4 operational effectivenessBRENNAN, J. F. M; DENTON, A. L.The Journal of the Operational Research Society. 2004, Vol 55, Num 4, pp 413-421, issn 0160-5682, 9 p.Article
Red de Bibliotecas de Defensa = The Spanish Defence Library NetworkIZQUIERDO-ALBERCA, María-José.El Profesional de la información. 2010, Vol 19, Num 5, pp 510-513, issn 1386-6710, 4 p.Article
Where computer security meets national securityNISSENBAUM, Helen.Ethics and information technology. 2005, Vol 7, Num 2, pp 61-73, issn 1388-1957, 13 p.Article
Limits of German defence reform: results of parametric analyses for the commission 'Common Security and Future of the Bundeswehr'HUBER, R. K; SCHMIDT, B.The Journal of the Operational Research Society. 2004, Vol 55, Num 4, pp 350-360, issn 0160-5682, 11 p.Article
Being data retentive : a knee jerk reaction?DAVIES, Gareth; TRIGG, Gayle.Communications law (Haywards Heath). 2006, Vol 11, Num 1, pp 18-21, issn 1746-7616, 4 p.Article
Intelligence and security informaticsCHEN, Hsinchun.Journal of the American Society for Information Science and Technology (Print). 2005, Vol 56, Num 3, issn 1532-2882, 110 p.Serial Issue
Validation of the mission-based approach to representing command and control in simulation models of conflictMOFFAT, J; CAMPBELL, I; GLOVER, P et al.The Journal of the Operational Research Society. 2004, Vol 55, Num 4, pp 340-349, issn 0160-5682, 10 p.Article
Analysis and evaluation of the command and Control Concept of the NATO Immediate Reaction Task Force (Land)LAMBERT, N. J.The Journal of the Operational Research Society. 2004, Vol 55, Num 4, pp 375-389, issn 0160-5682, 15 p.Article
Libraries in the WAR on TERRORISMROBISON, Brad.Online (Weston, CT). 2006, Vol 30, Num 5, pp 39-42, issn 0146-5422, 4 p.Article
Des « services historiques des armées » au « service historique de la défense » - 25 ans pour une réforme (1980 - 2005) = From Army historical services to Defence historical service - a 25 years reform (1980-2005)HENWOOD, Philippe; RENE-BAZIN, Paule; BARRIERE, Danielle et al.Gazette des archives. 2005, Num 200, pp 1-20, issn 0016-5522, 20 p.Article
A delicate balance: National security vs. public accessKLEIN, Bonnie; SCHWALB, Sandy.Computers in libraries. 2005, Vol 25, Num 3, pp 16-23, issn 1041-7915, 5 p.Article
Using SysML Modeling To Understand and Evolve Systems of SystemsJO ANN LANE; BOHN, Tim.Systems engineering (Print). 2013, Vol 16, Num 1, pp 87-98, issn 1098-1241, 12 p.Article
An Integer Programming Formulation for a Single Pallet in the Airlift Loading Problem with Insufficient AircraftROESENER, August G; HALL, Shane N; ÖZEN, Yaşar G et al.Scientific computing. International conferenceWorldComp'2010. 2010, pp 107-113, isbn 1-60132-137-6, 7 p.Conference Paper
L'européanisation de l'industrie d'armement = The Europeanisation of the Arms IndustryPERGET, Jacques.Topique (Paris). 2009, Num 107, pp 225-235, issn 0040-9375, 11 p.Article
Do mention the war : Applying information management principles to issues of defence and national securityJOINT, Nicholas.Library review (Glasgow). 2008, Vol 57, Num 1-2, pp 5-12, issn 0024-2535, 8 p.Article
The United States 2002 Unified Command Plan : Antarctica and the areas of responsibility of military commandersDODDS, Klaus; HEMMINGS, D.Polar record. 2008, Vol 44, Num 229, pp 173-177, issn 0032-2474, 5 p.Article
User acceptance of Intelligence and Security informatics technology: A study of COPLINKJEN-HWA HU, Paul; CHIENTING LIN; HSINCHUN CHEN et al.Journal of the American Society for Information Science and Technology (Print). 2005, Vol 56, Num 3, pp 235-244, issn 1532-2882, 10 p.Article
A semi-supervised active learning algorithm for information extraction from textual dataWU, Tianhao; POTTENGER, William M.Journal of the American Society for Information Science and Technology (Print). 2005, Vol 56, Num 3, pp 258-271, issn 1532-2882, 14 p.Article
Automatic crosslingual thesaurus generated from the Hong Kong sar Police Department Web corpus for crime analysisLI, Kar Wing; YANG, Christopher C.Journal of the American Society for Information Science and Technology (Print). 2005, Vol 56, Num 3, pp 272-282, issn 1532-2882, 11 p.Article
Trust-based secure information sharing between federal government agenciesLIU, Peng; CHETAL, Amit.Journal of the American Society for Information Science and Technology (Print). 2005, Vol 56, Num 3, pp 283-298, issn 1532-2882, 16 p.Article
A distributed multisensor-multitarget tracking testbed for maritime surveillanceAKSELROD, D; SINHA, A; KIRUBARAJAN, T et al.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 111-122, issn 0277-786X, isbn 0-8194-5794-9, 1Vol, 12 p.Conference Paper
Breaking developments in domestic intelligenceSTRICKLAND, Lee S.Bulletin of the American Society for Information Science. 2003, Vol 29, Num 3, pp 20-22, issn 0095-4403, 3 p.Article
Multi-agent simulation of human behavior in Naval Air DefenseCALFEE, Sharif H; ROWE, Neil C.Naval engineers journal. 2004, Vol 116, Num 4, pp 53-64, issn 0028-1425, 12 p.Article
Ecosystem Requirements for Composability and Reuse: An Investigation into Ecosystem Factors That Support Adoption of Composable Practices for Engineering DesignOSTER, Christopher; WADE, Jon.Systems engineering (Print). 2013, Vol 16, Num 4, pp 439-452, issn 1098-1241, 14 p.Article
First Steps in the Development of a Program Organizational Architectural Framework (POAF)WILLIAMS, Jeffery L; STRACENER, Jerrell T.Systems engineering (Print). 2013, Vol 16, Num 1, pp 45-70, issn 1098-1241, 26 p.Article