Vous êtes sur la page 1sur 2

(1) Central Intelligence Agency: Observations on GAO Access to Information on CIA Programs and Activities: GAO-01-975T.

GAO Reports 2001:1. (2) Acosta ED. Health Information System for the Comprehensive Management of a Sleep Clinic. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE 2009:61-66. (3) Adam K, Stanley L. Internet Information Services administration. Indianapolis, Ind.: New Riders; 2000. (4) AGENCY G0. DEPARTMENT OF ENERGY CITES BECHTEL JACOBS FOR CLASSIFIED INFORMATION SECURITY AND WORKER SAFETY AND HEALTH VIOLATIONS. FDCH Regulatory Intelligence Database 2010. (5) AGENCY G0. FEDERAL OFFICIALS MARK OPENING OF NEW AIKEN TRANSPORTATION RESOURCE CENTER. FDCH Regulatory Intelligence Database 2010. (6) AGENCY G0. NEW WEBSITE PROMOTES MILITARY INFO SHARING. FDCH Regulatory Intelligence Database 2011. (7) Arya A. Discretionary Disclosure of Proprietary Information in a Multisegment Firm. 14p; 1 Diagram00251909 ;56(4). (8) Buhmann JM. Context sensitive information: Model validation by information theory. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2011;6718 LNCS:12-21. (9) Capital Planning Information, British Library Research and Development Department, British Library Board. The Planning process and library and information services. 1990;88:74. (10) Carmona JL. UBS files lawsuit to protect proprietary information. Caribbean Business 2010;38(27):15-15. (11) Chen Y. Towards a conceptual design of an intelligent system for an international trade centre in China. Seventh International Conference on Electronic Commerce, Vols 1 and 2, Selected Proceedings 2005:78-84. (12) Dang T. Integration of power plant information system with business information system in the open electricity market: challenges and solutions. 2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3 2007:1209-1213. (13) Dong T, Shang W. Identification of sensitive information based on improved naive bayesian classifier. Proceedings - 4th International Joint Conference on Computational Sciences and Optimization, CSO 2011 2011:816-820.

(14) Dube A. Coups, Corporations, and Classified Information. Q J Econ 2011;126(3):1375-1409. (15) Ferscha A. Informative art display metaphors. Universal Access in HumanComputer Interaction: Ambient Interaction, Pt 2, Proceedings 2007;4555(2):82-92. (16) Gao S. Cognitive cost in route choice with real-time information: An exploratory analysis. TRANSPORTATION RESEARCH PART A-POLICY AND PRACTICE 2011;45(9):916-926. (17) Ghnemat R. Agent-Based Modeling Using Swarm Intelligence in Geographical Information Systems. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY 2008:539-543. (18) Giacobazzi R. Adjoining classified and unclassified information by abstract interpretation. 47p; 5 Diagrams, 3 Charts0926227X ;18(5). (19) Gresser JY. Terminology & Information Science(s). 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5 2008:573-582. (20) Ing D. Swiss Army signs for Spanish C2 information system. Jane's Defence Weekly 2007. (21) Ishibashi K, Tanaka K. Management of classified information for information dispersion technology. Proceedings - 2011 International Conference on Computational Science and Its Applications, ICCSA 2011 2011:294-296. (22) Mills DQ. Buy, lie, and sell high : how investors lost out on Enron and the Internet bubble. Upper Saddle River, NJ: Financial Times Prentice Hall; 2002.

Vous aimerez peut-être aussi