Search

Showing total 10 results
10 results

Search Results

1. Security Kernel Validation in Practice.

2. A Lattice Model of Secure Information Flow.

3. WIRELESS COYOTE: A COMPUTER-SUPPORTED FIELD TRIP.

4. EDITORIAL POINTERS.

5. To protect and preserve.

6. Tablet PCs Find Home in Higher Ed.

7. SIGGRAPH 2004.

8. SIGGRAPH 2004.

9. There's a Scarcity of Great Stuff.

10. BEA Systems Updates Former Plumtree Business Process Management Tool.