Free Delivery Over $100
76539 books were found.
""The SETL Project Master Catalog"" is a comprehensive listing of reports, working papers, and computer-readable... Read More >>
The pressure to decrease costs within the Department of Defense has influenced the start of many cost estimating... Read More >>
Today many organizations are faced with multiple large legacy data stores in different formats and the need to use... Read More >>
Protecting intellectual property contained in application source code and preventing tampering with application... Read More >>
This research focuses on how to reengineer Cobol legacy systems into object-oriented systems using Sward's Parameter... Read More >>
The use of formal specifications allows for a software system to be defined with stringent mathematical semantics... Read More >>
This paper presents a methodology for solving military aircraft load- scheduling problems modeled as a multidimensional... Read More >>
This research develops the Android Protection System (APS), a hardware-implemented application security mechanism... Read More >>
Project managers typically set three success criteria for their projects: meet specifications, be on time, and be... Read More >>
Agent Tool is an AFIT-produced, AFOSR-sponsored multi-agent system (MAS) development tool intended for production... Read More >>
Graphs express relationships among objects, such as the radio connectivity among nodes in unmanned vehicle swarms.... Read More >>
Failed or troubled modernization efforts, such as the multi-million dollar 1997-2000 ROCC/SOCC failure, are a serious... Read More >>
This work explores a parallel implementation of geometric hashing on the Connection Machine. It delves into the... Read More >>
The research effort presented here is focused on the development of a basic mathematical model to simulate multiple... Read More >>
GeoBEST (Base Engineer Survey Toolkit) is a software program built under contract with the USAF. It is designed... Read More >>
This research presents an original emulation-based software protection scheme providing protection from reverse... Read More >>
Routing in Mobile Ad Hoc Networks (MANETs) presents unique challenges not encountered in conventional networks.... Read More >>
Round trip engineering of software from source code and reverse engineering of software from binary files have both... Read More >>
Routing protocols designed for wired networks cannot be used in mobile ad hoc networks (MANETs) due to the dynamic... Read More >>
Your indispensable friend in helping you to grasp the fundamental language of contemporary web development is The... Read More >>
Binary program analysis is a critical capability for offensive and defensive operations in Cyberspace. However,... Read More >>
The goal of the research presented was to find a way to effectively identify text data and instructions in a machine... Read More >>
Using formal methods to create automatic code generation systems is one of the goals of Knowledge Based Software... Read More >>
This research creates a methodology and corresponding prototype for the transformation of object-oriented (00) specifications... Read More >>
Software capabilities have steadily increased over the last half century. The Department of Defense has seized this... Read More >>