2004 |
6 | EE | Anand R. Tripathi,
Muralidhar Koka,
Sandeep Karanth,
Ivan Osipkov,
Harsha Talkad,
Tanvir Ahmed,
D. Johnson,
S. Dier:
Robustness and Security in a Mobile-Agent Based Network Monitoring System.
ICAC 2004: 320-321 |
2003 |
5 | EE | A. Ceseracciu,
M. Piemontese,
F. Safai Tehrani,
P. Elmer,
D. Johnson,
T. M. Pulliam:
The new BaBar Data Reconstruction Control System
CoRR cs.DC/0306008: (2003) |
2000 |
4 | EE | D. Johnson,
L. Benzinger:
Layering Boundary Protections: An Experiment in Information Assurance.
ACSAC 2000: 60-66 |
1998 |
3 | EE | Padmanabh Dabke,
A. Cox,
D. Johnson:
NetBuilder: an environment for integrating tools and people.
Computer-Aided Design 30(6): 465-472 (1998) |
1991 |
2 | | S. R. Haynes,
D. Johnson,
G. Raychaudhuri,
A. L. Beyer:
The Drosophila Hrb87F gene encodes a new member of the A and B hnRNP protein group.
Nucleic Acids Research 19(1): 25-31 (1991) |
1979 |
1 | EE | J. Larmouth,
R. Bowman,
D. Johnson,
N. D. H. Ross,
G. F. T. Young,
H. D. Ellison:
Username mapping in a network.
Computer Communications 2(5): 220-223 (1979) |