An embedded system for real-time navigation and remote command of a trained canine | 11 | 1.17 | 2011 |
Information assurance modeling using the Department of Defense architecture framework | 0 | 0.34 | 2010 |
User Identification Using Gui Manipulation Patterns And Artificial Neural Networks | 2 | 0.40 | 2009 |
A Compiler Classification Framework For Use In Reverse Engineering | 0 | 0.34 | 2009 |
Understanding security architecture | 3 | 0.47 | 2008 |
DSR and TORA in fixed and mobile wireless networks | 2 | 0.44 | 2008 |
A security-centric ring-based software architecture | 0 | 0.34 | 2007 |
A performance analysis of the spring protocol through simulation | 0 | 0.34 | 2007 |
Performance evaluation: running DSR and TORA routing protocols concurrently | 0 | 0.34 | 2007 |
Impact of daily computer usage on GUI usage analysis | 1 | 0.37 | 2007 |
Static analysis of anomalies and security vulnerabilities in executable files | 5 | 0.62 | 2006 |
Software Process as a Foundation for Teaching, Learning, and Accrediting | 6 | 0.94 | 2002 |
A comparison of Ada and Pascal in an introductory computer science course | 2 | 0.55 | 1998 |
Ada training and education in the US Army and US Air Force | 2 | 0.71 | 1996 |
Public domain tools for modeling and simulating computer networks | 1 | 0.42 | 1996 |
An open simulation architecture for Force XXI | 0 | 0.34 | 1995 |