629 | -- | 0 | Fairouz Kamareddine. Capsule reviews |
630 | -- | 631 | Erol Gelenbe, Andrew Tilbrook, Richard Vinter. Editorial: Introduction to the Special Issue |
632 | -- | 645 | Robert A. Ghanea-Hercock, Erol Gelenbe, Nicholas R. Jennings, Oliver Smith, David N. Allsopp, Alex Healing, Hakan Duman, Simon Sparks, Nishan C. Karunatillake, Perukrishnen Vytelingum. Hyperion - Next-Generation Battlespace Information Services |
646 | -- | 659 | Asher Mahmood, Philip M. Tudor, William Oxford, Robert Hansford, James D. B. Nelson, Nicholas G. Kingsbury, Antonis Katartzis, Maria Petrou, Nikolaos Mitianoudis, Tania Stathaki, Alin Achim, David R. Bull, Cedric Nishan Canagarajah, Stavri G. Nikolov, Artur Loza, Nedeljko Cvejic. Applied Multi-Dimensional Fusion |
660 | -- | 673 | Nikolaos Mitianoudis, Tania Stathaki. Joint Fusion and Blind Restoration For Multiple Image Scenarios With Missing Data |
674 | -- | 693 | William Ng, Jack Li, Simon J. Godsill, Sze Kim Pang. Multitarget Initiation, Tracking and Termination Using Bayesian Monte Carlo Methods |
694 | -- | 702 | Samuel M. Waldron, John Patrick, Phillip L. Morgan, Sophia L. King. Influencing Cognitive Strategy by Manipulating Information Access |
703 | -- | 716 | Paul R. Smart, Alistair Russell, Nigel R. Shadbolt, m. c. schraefel, Les Carr. AKTiveSA: A Technical Demonstrator System For Enhanced Situation Awareness |
717 | -- | 727 | Gülay Öke, Georgios Loukas. A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network |
728 | -- | 738 | Imtiaz Ahmad, A. Shoba Das. Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs |
739 | -- | 757 | Chung-Ming Huang, Jian Wei Li. Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS |
758 | -- | 0 | Jan Peters. Computational Intelligence: Principles, Techniques and Applications |