Search the dblp DataBase
Robert P. Trueblood :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Walter D. Potter , Robert P. Trueblood Traditional, Semantic, and Hyper-Semantic Approaches to Data Modeling. [Citation Graph (7, 0)][DBLP ] IEEE Computer, 1988, v:21, n:6, pp:53-63 [Journal ] Robert P. Trueblood , H. Rex Hartson , Johannes J. Martin MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. [Citation Graph (1, 26)][DBLP ] ACM Trans. Database Syst., 1983, v:8, n:3, pp:382-409 [Journal ] James K. Harris , Robert P. Trueblood A model for studying the spread of computer viruses. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1990, pp:207- [Conf ] Robert P. Trueblood , Pao-Ing Lai Improving the performance of the BDB system by changing the query processing temporary file structures. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1990, pp:184- [Conf ] Tsau Young Lin , Larry Kerschberg , Robert P. Trueblood Security Algebras and Formal Models: Using Petri Net Theory. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:75-96 [Conf ] Caroline M. Eastman , Robert P. Trueblood Occupancy Models for the Estimation of Block Accesses. [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:6, pp:654-658 [Journal ] Jeffrey L. Riggs , Sheila B. Brown , Robert P. Trueblood Integration of technical, cost, and schedule risks in project management. [Citation Graph (0, 0)][DBLP ] Computers & OR, 1994, v:21, n:5, pp:521-533 [Journal ] Walter D. Potter , Robert P. Trueblood , Caroline M. Eastman Hyper-Semantic Data Modeling. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1989, v:4, n:1, pp:69-90 [Journal ] Robert P. Trueblood , H. Rex Hartson Multisafe - A Data Security Architecture. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1981, v:11, n:4, pp:26-31 [Journal ] Robert P. Trueblood , A. Sengupta Dynamic Analysis of the Effects Access Rule Modifications Have Upon Security. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:8, pp:866-874 [Journal ] Search in 0.003secs, Finished in 0.003secs