SIMULATION INTEROPERABILITY STANDARDS ORGANIZATION INTRINSIC EARTH SURFACE MATERIAL CLASSIFIER SYSTEM PHASE II AWARD
暂无分享,去创建一个
[1] Ted G. Lewis. Directories Don't Get No Respect , 1999, Computer.
[2] Michael J. Zyda. The Institute for Collaborative Environment Studies , 1999 .
[3] Luqi,et al. A formal model for software evolution , 1999, Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR00300).
[4] N.C. Rowe. A computer tutor for logic semantics , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.
[5] Michael J. Zyda. Directions in Modeling, Virtual Environments and Simulation (MOVES) , 1999, Proceedings IEEE Virtual Reality (Cat. No. 99CB36316).
[6] Luqi. Engineering Automation for Computer Based Systems , 1999, Electron. Notes Theor. Comput. Sci..
[7] Ladislau Bölöni,et al. A comparison study of static mapping heuristics for a class of meta-tasks on heterogeneous computing systems , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).
[8] T.J. Shimeall,et al. Software Security in an Internet World: An Executive Summary , 1999, IEEE Softw..
[9] Luqi,et al. Object Modeling to Re-Engineer Legacy Systems , 2000, Int. J. Softw. Eng. Knowl. Eng..
[10] T. Lewis,et al. Fast-lane browsers put the Web on wheels , 1999 .
[11] Dennis M. Volpano. Formalization and proof of secrecy properties , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[12] Ted G. Lewis,et al. Sony Versus Wintel: Mortal Combar , 1999, Computer.
[13] Ted G. Lewis. Where the Smart Money Is? , 1999, Computer.
[14] Debra A. Hensgen,et al. Passive, domain-independent, end-to-end message passing performance monitoring to support adaptive applications in MSHN , 1999, Proceedings. The Eighth International Symposium on High Performance Distributed Computing (Cat. No.99TH8469).
[15] Geoffrey Smith,et al. Probabilistic noninterference in a concurrent language , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[16] Cynthia E. Irvine,et al. A multi-threading architecture for multilevel secure transaction processing , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[17] Luqi,et al. Re-engineering the Janus (A) combat simulation system , 1999 .
[18] Wolfgang Baer,et al. Progress on Development of an Intrinsic Earth Surface Material Classifier , 2000 .
[19] Luqi,et al. Toward automated retrieval for a software component repository , 1999, Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems.
[20] Dennis M. Volpano. Safety versus Secrecy , 1999, SAS.
[21] G. U. Wood,et al. Something for nothing , 1991, Nature.
[22] Geoffrey G. Xie,et al. LLPA: A Protocol for High Speed Packet Authentication , 1999 .
[23] Luqi,et al. Software evolution via reusable architecture , 1999, Proceedings ECBS'99. IEEE Conference and Workshop on Engineering of Computer-Based Systems.
[24] Luqi,et al. Architectural Re-engineering of Janus using Object Modeling and Rapid Prototyping , 1999, Proceedings Tenth IEEE International Workshop on Rapid System Prototyping. Shortening the Path from Specification to Prototype (Cat. No.PR00246).
[25] Ted G. Lewis. Jump-Starting the Global Vending Machine , 1999, Computer.
[26] Michael Zyda. VR and the Future of Networked Entertainment , 1999 .
[27] Neil Rowe,et al. Use of image feedback loops for real-time terrain feature extraction , 1999, Electronic Imaging.
[29] Michael Zyda,et al. Orientation tracking for humans and robots using inertial sensors , 1999, Proceedings 1999 IEEE International Symposium on Computational Intelligence in Robotics and Automation. CIRA'99 (Cat. No.99EX375).
[30] Michael W. Godfrey,et al. An overview of MSHN: the Management System for Heterogeneous Networks , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).
[31] Meng-Chyi Harn. Computer-aided software evolution based on inferred dependencies , 1999 .
[32] Khaled Jaber,et al. Using adapters to reduce interaction complexity in reusable component-based software development , 1999, SSR '99.
[33] N.C. Rowe. An intrusion-detection environment for information-security instruction , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.
[34] Simon R. Goerger,et al. THE TRANSFER OF STRATEGIES FROM VIRTUAL TO REAL ENVIRONMENTS : AN EXPLANATION FOR PERFORMANCE DIFFERENCES ? , 1999 .
[35] Luqi,et al. Evolution of C4I Systems , 1999 .
[36] Ted G. Lewis,et al. Fast, Expensive, and Horribly Complex , 1999, Computer.
[37] Manfred Broy,et al. Preface - Software Engineering to our Planning Horizon , 1999, Electron. Notes Theor. Comput. Sci..
[38] Kent Watsen,et al. Cyberspace and Mock Apple Pie: A Vision of the Future of Graphics and VEs , 1999 .
[39] R. F. Freund,et al. Dynamic Mapping of a Class of Independent Tasks onto Heterogeneous Computing Systems , 1999, J. Parallel Distributed Comput..
[40] Ted G. Lewis. Asbestos Paajamas: An Open Source Dialogue , 1999, Computer.
[41] Luqi,et al. Software evolution process via a relational hypergraph model , 1999, Proceedings 199 IEEE/IEEJ/JSAI International Conference on Intelligent Transportation Systems (Cat. No.99TH8383).
[42] Ted G. Lewis,et al. The Open Source Acid Test , 1999, Computer.
[43] Ted G. Lewis. Innovation in the small , 1999, Computer.
[44] Valdis Berzins,et al. Interoperability Technology Assessment for Joint C4ISR Systems , 1999 .
[45] Rudolph P. Darken,et al. A Handheld Computer as an Interaction Device to a Virtual Environment , 1999 .
[46] Cynthia E. Irvine. The Reference Monitor Concept as a Unifying Principle in Computer Security Education , 1999 .
[47] Cynthia E. Irvine,et al. High assurance multilevel secure mail service: session server and IMAP server , 1999 .
[48] Debra A. Hensgen,et al. Are CORBA services ready to support resource management middleware for heterogeneous computing? , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).
[49] Chaplin,et al. Quality of Security Service in a Resource Management System Benefit Function Report Documentation Page , .
[50] Michael Zyda,et al. Networked virtual environments - desgin and implementation , 1999 .
[51] Cynthia E. Irvine,et al. A note on mapping user-oriented security policies to complex mechanisms and services , 1999 .
[52] Robert B. McGhee,et al. Testing and evaluation of an integrated GPS/INS system for small AUV navigation , 1999 .
[53] A.A. Irizarry-Rivera,et al. Using virtual worlds to explore electric power grids and plants , 1999, FIE'99 Frontiers in Education. 29th Annual Frontiers in Education Conference. Designing the Future of Science and Engineering Education. Conference Proceedings (IEEE Cat. No.99CH37011.
[54] Barry Peterson,et al. Quantitative Measures of Presence in Virtual Environments: The Roles of Attention and Spatial Comprehension , 1999, Cyberpsychology Behav. Soc. Netw..
[55] Cynthia E. Irvine,et al. Amplifying Security Education in the Laboratory , 1999 .
[56] Mj Sinai,et al. Egocentric Distance Perception in a Virutal Environment Using a Perceptual Matching Task , 1999 .
[57] Cynthia E. Irvine. Security: Where Testing Fails , 2000 .
[58] Geoffrey Smith,et al. Confinement Properties for Multi-Threaded Programs , 1999, MFPS.
[59] Debra A. Hensgen,et al. Why the mean is inadequate for accurate scheduling decisions , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[60] Ted G. Lewis,et al. Microsoft Rising: ...and other tales of Silicon Valley , 2000 .
[61] Cynthia E. Irvine,et al. An Approach to Characterizing Resource Usage and User Preferences in Benefit Functions , 1999 .
[62] R. F. Freund,et al. Dynamic matching and scheduling of a class of independent tasks onto heterogeneous computing systems , 1999, Proceedings. Eighth Heterogeneous Computing Workshop (HCW'99).
[63] C. Deltheil,et al. Simulating an optical guidance system for the recovery of an unmanned underwater vehicle , 2000, IEEE Journal of Oceanic Engineering.
[64] Michael Zyda,et al. Cyberspace and Mock Apple Pie A Vision of the Future of Graphics and Virtual Environments Projects in VR , 2022 .
[65] Geoffrey G. Xie,et al. Network policy languages: a survey and a new approach , 2001, IEEE Netw..
[66] David St. John,et al. Experiences Using Semi-Formal Methods During Development of Distributed, Research-Oriented, System-Level Software , 1999 .
[67] R. E. Deemer. Advanced engineering environments: achieving the vision , 2000, 2000 IEEE Aerospace Conference. Proceedings (Cat. No.00TH8484).
[68] Neil C. Rowe,et al. Precise and Efficient Retrieval of Captioned Images: The MARIE Project , 1999, Libr. Trends.
[69] Cynthia E. Irvine,et al. Toward a taxonomy and costing method for security services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[70] Luqi,et al. The Story of Re-engineering 350,000 Lines of FORTRAN Code , 1999, Electron. Notes Theor. Comput. Sci..
[71] Valdis Berzins. Lightweight inference for automation efficiency , 2002, Sci. Comput. Program..
[72] Ted G. Lewis,et al. Mainframes Are Dead, Long Live Mainframes , 1999, Computer.
[73] Mark A. Miller,et al. Lessons Learned from a Review of Evaluations of Automated Highway Systems , 1999 .
[74] Rudy Darken,et al. Map usage in virtual environments: orientation issues , 1999, Proceedings IEEE Virtual Reality (Cat. No. 99CB36316).
[75] James Bret Michael,et al. Secure group management in large distributed systems: what is a group and what does it do? , 1999, NSPW '99.