Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental study of a 1.5-MW, 110-GHz gyrotron oscillator.. Massachusetts Institute of Technology, Cambridge, MA, USA, (2005)ndltd.org (oai:dspace.mit.edu:1721.1/30158).A note on some compiling algorithms.. Commun. ACM, 7 (3): 149-150 (1964)Program structures for parallel processing.. Commun. ACM, 8 (12): 786-788 (1965)Information Security in a Multi-User Computer Environment.. Advances in Computers, (1972)Computer Security Technology Planning Study. volume 2. U.S. Air Force Electronic Systems Division, (October 1972)An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments.. S&P, page 102-106. IEEE Computer Society, (1983)Privacy and protection in operating systems (Panel Session)., , , , and . ACM Annual Conference (2), page 665-666. ACM, (1972)Accelerating Computer Security Innovation.. S&P, page 91-98. IEEE Computer Society, (1982)Computer security myths mythtakes or 'The real security problem is...'.. ACSAC, IEEE, (1992)A computer for direct execution of algorithmic languages.. AFIPS Eastern Joint Computing Conference, page 184-193. ACM, (1961)