Export 300 results:
Dean T, Boddy M.  1988.  An Analysis of Time Dependent Planning. AAAI-88 Proceedings.
Haigh J.T.  1988.  Modeling Database Security Requirements. Database Security: Status and Prospects. :45-56.
Dean T, Boddy M.  1988.  Reasoning About Partially Ordered Events. Artificial Intelligence. 36
Harp S, Sederberg J..  1988.  Using a Truth Maintenance System to do Configuration. Proceedings of the Fourth Conference on Artificial Intelligence Applications. :393-394.
Harp S.  1986.  Density and Camouflage in Visual Search.
Isle B.A, Penner R., Applegate B..  1986.  Equipment Failure Projection Techniques.
Haigh J.T, Kemmerer RA, McHugh J, Young WD.  1986.  An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. :14-24.
Haigh J.T, Young W.D..  1986.  Extending the Non-Interference Version of MLS for SAT. 1986 IEEE Symposium on Security and Privacy. :232-239.
Isle B, Harp S, Marschall G., Marwaha S., Penner R., Wolff A..  1986.  Failure Projection and Remote Diagnostics Systems for Maintenance of Mail Processing Equipment. Proceedings of the U.S. Postal Service Advanced Technology Conference.
Isle B, Penner R., Pine S., Kondziela J..  1986.  MICRO SWITCH Operator Interface Advanced Product Study.
Dillaway B.B., Haigh J.T.  1986.  A Practical Design for a Multilevel Secure Database Management System. Proceedings of the Second Aerospace Computer Security Conference. :44-57.
Pejsa J.H., Isle B.A, Johnson S.E., Koch C.G..  1986.  SA•VANT system: An intelligent end-user interface to an expert system. Proceedings of the Tenth Annual Honeywell International Computer Sciences Conference.
Isle B.A, Pesja J.H., Johnson S.E., Koch C.G..  1986.  The SA•VANT system-Versatile end-user interface to an expert system. American Association of Artificial Intelligence.
Edman T., Harp S, Mitchell D., Hadden G..  1985.  A Knowledge Based System for Preventive Maintenance. The Use of New Technology to Improve Mechanical Readiness, Reliability and Maintainability: The Proceedings of the 40th Meeting of the Mechanical Failures Prevention Group.
Haigh J.T.  1984.  A Comparison of Formal Security Models. Proc. 7th National Computer Security Conference. :88-119.