1994 |
10 | EE | Jeffrey L. Riggs,
Sheila B. Brown,
Robert P. Trueblood:
Integration of technical, cost, and schedule risks in project management.
Computers & OR 21(5): 521-533 (1994) |
1992 |
9 | | Caroline M. Eastman,
Robert P. Trueblood:
Occupancy Models for the Estimation of Block Accesses.
Comput. J. 35(6): 654-658 (1992) |
1990 |
8 | EE | Robert P. Trueblood,
Pao-Ing Lai:
Improving the performance of the BDB system by changing the query processing temporary file structures.
ACM Southeast Regional Conference 1990: 184 |
7 | EE | James K. Harris,
Robert P. Trueblood:
A model for studying the spread of computer viruses.
ACM Southeast Regional Conference 1990: 207 |
1989 |
6 | | Tsau Young Lin,
Larry Kerschberg,
Robert P. Trueblood:
Security Algebras and Formal Models: Using Petri Net Theory.
DBSec 1989: 75-96 |
5 | | Walter D. Potter,
Robert P. Trueblood,
Caroline M. Eastman:
Hyper-Semantic Data Modeling.
Data Knowl. Eng. 4(1): 69-90 (1989) |
1988 |
4 | | Walter D. Potter,
Robert P. Trueblood:
Traditional, Semantic, and Hyper-Semantic Approaches to Data Modeling.
IEEE Computer 21(6): 53-63 (1988) |
1986 |
3 | | Robert P. Trueblood,
A. Sengupta:
Dynamic Analysis of the Effects Access Rule Modifications Have Upon Security.
IEEE Trans. Software Eng. 12(8): 866-874 (1986) |
1983 |
2 | EE | Robert P. Trueblood,
H. Rex Hartson,
Johannes J. Martin:
MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management.
ACM Trans. Database Syst. 8(3): 382-409 (1983) |
1981 |
1 | EE | Robert P. Trueblood,
H. Rex Hartson:
Multisafe - A Data Security Architecture.
SIGMOD Record 11(4): 26-31 (1981) |