-
1
-
-
0001888939
-
Network-centric warfare: Its origin and future
-
(Jan.)
-
Cebrowski, A. K. and Garstka, J. J. Network-centric warfare: Its origin and future. U.S. Naval Inst. Proc. 124, 1 (Jan. 1998), 28-35.
-
(1998)
U.S. Naval Inst. Proc.
, vol.124
, Issue.1
, pp. 28-35
-
-
Cebrowski, A.K.1
Garstka, J.J.2
-
2
-
-
0010645250
-
-
Institute for Defence Analyses, Alexandria, Va. Interview, 18 Sept
-
Larsen, G. N. Institute for Defence Analyses, Alexandria, Va. Interview, 18 Sept. 2001.
-
(2001)
-
-
Larsen, G.N.1
-
3
-
-
79551602978
-
The semantic web
-
(May)
-
Berners-Lee, T., Hendler, J., and Lassila, O. The semantic web. Sci. Amer. 284, 5 (May 2001), 34-43.
-
(2001)
Sci. Amer.
, vol.284
, Issue.5
, pp. 34-43
-
-
Berners-Lee, T.1
Hendler, J.2
Lassila, O.3
-
4
-
-
0010647418
-
Dependable semantic web
-
(San Diego, Calif., Jan.)
-
Thuraisingham, B., Hughes, E., and Allen, D. Dependable semantic web. In Proc. Seventh Int. Workshop Object-oriented Real-Time Dependable Syst., IEEE (San Diego, Calif., Jan. 2002), 305-308.
-
(2002)
Proc. Seventh Int. Workshop Object-Oriented Real-Time Dependable Syst., IEEE
, pp. 305-308
-
-
Thuraisingham, B.1
Hughes, E.2
Allen, D.3
-
5
-
-
84873157353
-
Software decoys: Intrusion detection and countermeasures
-
(West Point, N.Y., June)
-
Michael, J. B., Auguston, M., Rowe, N. C., and Riehle, R. D. Software decoys: Intrusion detection and countermeasures. In Proc. Workshop on Inf. Assurance, IEEE (West Point, N.Y., June 2002).
-
(2002)
Proc. Workshop on Inf. Assurance, IEEE
-
-
Michael, J.B.1
Auguston, M.2
Rowe, N.C.3
Riehle, R.D.4
-
6
-
-
0010731575
-
Intelligent software decoys
-
n.p., (Monterey, Calif., June)
-
Michael, J. B. and Riehle, R. D. Intelligent software decoys. In Proc. Monterey Workshop: Eng. Automation for Software Intensive Syst. Integration, n.p., (Monterey, Calif., June 2001), 178-187.
-
(2001)
Proc. Monterey Workshop: Eng. Automation for Software Intensive Syst. Integration
, pp. 178-187
-
-
Michael, J.B.1
Riehle, R.D.2
-
11
-
-
0031273982
-
The very idea of computer self-knowledge and self-deception
-
(Nov.)
-
Goldberg, S. C. The very idea of computer self-knowledge and self-deception. Minds and Machines 7, 4 (Nov. 1997), 515-529.
-
(1997)
Minds and Machines
, vol.7
, Issue.4
, pp. 515-529
-
-
Goldberg, S.C.1
-
12
-
-
4243652625
-
Self-deception and confabulation
-
(Sept.)
-
Hirstein, W. Self-deception and confabulation. J. Phil. Sci. 67, 3 (Suppl. S, Sept. 2000), S418-S429.
-
(2000)
J. Phil. Sci.
, vol.67
, Issue.3 SUPPL. S
-
-
Hirstein, W.1
-
13
-
-
0004138558
-
Use of an experimental policy workbench: Description and preliminary results
-
Sibley, E. H., Michael, J. B., and Wexelblat, R. L. Use of an experimental policy workbench: Description and preliminary results. IFIP Trans. A-6 (1992), 47-76.
-
(1992)
IFIP Trans.
, vol.A-6
, pp. 47-76
-
-
Sibley, E.H.1
Michael, J.B.2
Wexelblat, R.L.3
-
14
-
-
0010646470
-
Tactical deception in air-land warfare
-
(June)
-
Fowler, C. A. and Nesbit, R. F. Tactical deception in air-land warfare. J. Electronic Defense 18, 6 (June 1995), 37-44 and 76-79.
-
(1995)
J. Electronic Defense
, vol.18
, Issue.6
-
-
Fowler, C.A.1
Nesbit, R.F.2
|