|
Search the dblp DataBase
Scott Lathrop:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Donald Welch, Scott Lathrop
Wirless Security Threat Taxonomy. [Citation Graph (0, 0)][DBLP] IAW, 2003, pp:76-83 [Conf]
- Gregory J. Conti, John M. D. Hill, Scott Lathrop, Kenneth L. Alford, Daniel Ragsdale
A Comprehensive Undergraduate Information Assurance Program. [Citation Graph (0, 0)][DBLP] World Conference on Information Security Education, 2003, pp:243-260 [Conf]
- David A. Joiner, Steven Gordon, Scott Lathrop, Marilyn McClelland, D. E. Stevenson
Applying verification, validation, and accreditation processes to digital libraries. [Citation Graph (0, 0)][DBLP] JCDL, 2005, pp:382- [Conf]
- Scott Lathrop, Gary R. Bertoline
TeraGrid outreach - TeraGrid outreach and campus partnerships. [Citation Graph (0, 0)][DBLP] SC, 2006, pp:44- [Conf]
- Scott Lathrop
TeraGrid institute - TeraGrid Institute. [Citation Graph (0, 0)][DBLP] SC, 2006, pp:231- [Conf]
- Scott Lathrop
Integrating multi-site information through Gopher. [Citation Graph (0, 0)][DBLP] SIGUCCS, 1993, pp:21-22 [Conf]
Networked Intelligent Munitions and Sensor System. [Citation Graph (, )][DBLP]
High-Performance Computing Education. [Citation Graph (, )][DBLP]
Challenges and Opportunities in Preparing Students for Petascale Computational Science and Engineering. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|