Author of the publication

Performance modeling of the advanced field artillery tactical data system.

, , , and . SMC, page 2257-2262. IEEE, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using the Trees to Find the Forest: Trustworthy Computing as a Systems-Level Issue., and . IWIA, page 109-112. IEEE Computer Society, (2003)Unicode Steganographic Exploits: Maintaining Enterprise Border Security., , and . IEEE Secur. Priv., 5 (5): 32-39 (2007)Performance modeling of the advanced field artillery tactical data system., , , and . SMC, page 2257-2262. IEEE, (2000)Cyber-physical situation awareness and decision support., , , , and . NSW, page 114-117. IEEE Computer Society, (2013)Scholars portal: beyond simple metasearch., and . JCDL, page 401. ACM, (2004)Building Trustworthy Systems: Guided State Estimation as a Feasible Approach for Interpretation, Decision and Action Based on Sensor Data ., and . HICSS, IEEE Computer Society, (2004)Architecture of a cyber defense competition., and . SMC, page 4300-4305. IEEE, (2003)An experimental framework for investigating hashgraph algorithm transaction speed., , , , , and . BlockSys@SenSys, page 15-21. ACM, (2019)Modeling of information dominance in complex systems: A system partitioning and hybrid control framework.. HICSS, page 58. IEEE Computer Society, (2003)Seeing the Real World: Sharing Protected Data in Real Time., , and . HICSS, page 2357-2365. IEEE Computer Society, (2012)