Research Summaries
Showing 7604 results for all fiscal years.
Click the column headings to sort the list below.
No research summaries found.
 
2008 Core Mooring Data Support Oceanography Paduan, Jeffrey D. View
2008 Counter Improvised Explosive Devices Research Operations Research Bradley, Gordon H. View
2008 Counter Terrorism International Conference Defense Analysis Gustaitis, Peter J. View
2008 Counter-IED Resource Allocation National Security Institute Washburn, Alan R. View
2008 Country X Consultations National Security Affairs Davis, Zachary S. View
2008 Creation of a Realistic Open Source Combat Simulator Using Gait Tracking and Weapon Simulators Modeling, Virtual Environments & Simuation Institute McDowell, Perry L. View
2008 Critical Experiments in Condensed Matter Nuclear Science, Phase 2: Standard Heat Experiment Meyer Institute Melich, Michael E. View
2008 Critical Experiments in Condensed Matter Nuclear Science, Phase 2: Standard Heat Experiment Meyer Institute Melich, Michael E. View
2008 CubeSat Deployable Mechanisms and Attitude Control System Prototypes Space Systems Academic Group Newman, James H. View
2008 Cueing Receiver for Faster EA - Response Management Electrical & Computer Engineering Pace, Phillip E. View
2008 Cyber Attack Detection and Response Research and Exercise Center for Asymmetric Warfare Banks, David D. View
2008 DHS Science and Technology Support National Security Institute Boger, Dan C. View
2008 DL Certificate Program Center for Education Design, Development & Distribution Moule, Valerie A. View
2008 DOD Joint Strategic Communications Workshop Center for Executive Education Franklin, Ronald E. View
2008 DOD Joint Strategic Communications Workshop Center for Executive Education Franklin, Ronald E. View
2008 DSCA/STRATCOM Video/AHSMEE Support Center for Asymmetric Warfare Banks, David D. View
2008 Data Assimilation Using Pseudospectral Optimal Control Applied Mathematics Kang, Wei View
2008 Data Farming Using Agent-Based Models to Conduct Design of Experiments for Complex Test and Evaluation in a Joint Mission Environment Operations Research Sanchez, Susan M. View
2008 Defeating Disguised IEDs by Using Knowledge of the Environment National Security Institute Guest, Peter S. View
2008 Defense Counter Terrorism Technology Defense Analysis Budden, Nancy A. View
2008 Deployment Pool Funding for the CIRPAS Twin Otter Aircraft in Support of the NSF Approved Physics of Stratocumulus Tops (POST) Experiment Center for Interdisciplinary Remotely-Piloted Aircraft Studies Jonsson, Haflidi H. View
2008 Desert Hawk Flight Training Center for Interdisciplinary Remotely-Piloted Aircraft Studies Bluth, Robert T. View
2008 Desert Talon Center for Interdisciplinary Remotely-Piloted Aircraft Studies Bluth, Robert T. View
2008 Design and Implementation of Ultra-Mobile, Self Aligning Antenna Systems (SAAS) for Optimized Radio Frequency (AARF) Link Budget Analysis for Use Between a Ground Station and an Unmanned Aerial Vehicle (UAV) Platform Information Sciences Mishoe, Jr., Michael K. View
2008 Designing a Conceptual Data Model for the ACSIS Database Computer Science Otani, Thomas W. View
2008 Detecting Network Membership with Cross-Drive Analysis National Security Institute Garfinkel, Simson L. View
2008 Detection of IED Emplacement in Urban Environments National Security Institute Singh, Gurminder View
2008 Detection, Classification and Geolocation of IEEE 802.16 Signals Electrical & Computer Engineering McEachen, II, John C. View
2008 Detonable Liquid Technologies for EOD/Safe and Arm Physics Brown, Ronald E. View
2008 Developing Game for MASINT Instruction Modeling, Virtual Environments & Simuation Institute McDowell, Perry L. View