PROCEEDINGS VOLUME 3575
ENABLING TECHNOLOGIES FOR LAW ENFORCEMENT AND SECURITY | 1-6 NOVEMBER 1998
Enforcement and Security Technologies
Editor(s): A. Trent DePersia, John J. Pennella
Editor Affiliations +
ENABLING TECHNOLOGIES FOR LAW ENFORCEMENT AND SECURITY
1-6 November 1998
Boston, MA, United States
Law Enforcement Tools and Techniques
Jennifer M. DePoy
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334974
Vladimir A. Podgornov, Gennady S. Tsygankov
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334990
Jeff LaCoss, John Granacki, Jack Wills
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335000
Jay D. Kehoe
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335009
Joseph A. Domanico, Terry E. Thomas
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335018
James F. McNulty
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335019
Surveillance and Assessment Technologies for Law Enforcement
Allen R. Hunt, R. Douglas Hogg, William Foreman
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335020
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334975
Douglas L. McMakin, David M. Sheen, Thomas E. Hall, Ronald H. Severtsen
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334976
Franklin S. Felber, Norbert C. Wild, Scott C. Nunan, Dennis Breuner, Frank Doft
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334977
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334978
Lawrence M. Frazier
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334979
Jack McCready, Errol M. Glenn, Richard N. Paolino
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334980
Nicholas G. Paulter
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334981
Securing the Border
David M. Hull, Stephen J. Vinci
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334982
Kenneth L. Tacke
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334983
Securing Our Correctional Facilities
Debra D. Spencer, G. Steve Morrison
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334984
Lyle G. Roybal, Philip M. Rice, Ernest Glenn Shell
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334985
David S. de Moulpied, Peter J. Rothschild, Gerald J. Smith
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334986
George G. Wagner
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334987
Emerging Security Technologies
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334988
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334989
Roy N. Bordes
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334991
Applying Security Technologies
Sal DePasquale
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334992
Van D. Romero, Bradley Rogers, Tim Winfree, Dan Walsh, Mary Lynn Garcia
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334993
Mary W. Green
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334994
Dong-guang Li, Anthony Watson
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334995
Transportation Safety and Security Technologies
William A. Swansiger, John E. Brockmann
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334996
Cindy C. Edge, Julie Gibb, Regina E. Dugan
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334997
Marc Williams, J. M. Johnston, Matt Cicoria, E. Paletz, L. Paul Waggoner, Cindy C. Edge, Susan F. Hallowell
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334998
Richard T. Lazarick
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.334999
William E. Nettles, Stephen Trotter
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335001
Gail E. Toth
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335002
Contraband Detection Technologies and Techniques
Stuart Enz Clark, John A. Lovberg, Joseph A. Galliano Jr.
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335003
Gerald J. Smith, William L. Adams, Suzhou Huang
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335004
Carla J. Miller, D. F. Glenn, Steven D. Hartenstein, Susan F. Hallowell
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335005
Douglas R. Brown, Tsahi Gozani, Joseph Bendahan, Felix Liu, Robert Loveman, Peter Ryge, Patrick Shea, Mala Sivakumar, John Stevenson
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335006
William Wade Sapp Jr., Suzhou Huang
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335007
L. Paul Waggoner, Meredith H. Jones, Marc Williams, J. M. Johnston, Cindy C. Edge, James A. Petrousky
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335008
Joseph Bendahan, Tsahi Gozani
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335010
Victor V. Verbinski, Jay Payne, Michael Snell
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335011
Lawrence V. Haley, Julian M. Romeskie
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335012
John E. Parmeter, Kevin L. Linker, Charles L. Rhykerd, David W. Hannum, Francis A. Bouchier
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335013
Edward J. Poziomek, Saeed H. Almeer
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335014
Edward J. Poziomek, Juliana Homstead, Saeed H. Almeer
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335015
Applying Security Technologies
Kirk S. Spring
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335016
Law Enforcement Tools and Techniques
Jaime H. Cuadros
Proceedings Volume Enforcement and Security Technologies, (1998) https://doi.org/10.1117/12.335017
Back to Top