Levin

Results: 1589



#Item
111

Making Resources Matter: A Researcher’s Perspective Jesse Levin Principal Research Economist Background on the Researcher

Add to Reading List

Source URL: www.rockinst.org

Language: English - Date: 2015-09-24 14:49:15
    112

    MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

    Add to Reading List

    Source URL: cisr.nps.edu

    Language: English - Date: 2010-03-24 14:46:06
      113

      Monterey Security Enhanced Architecture Project Cynthia Irvine, David Shifflett, Paul Clark, Timothy Levin, George Dinolt Naval Postgraduate School Abstract This research project has produced an innovative

      Add to Reading List

      Source URL: www.cisr.us

      Language: English - Date: 2007-11-15 12:21:10
        114

        Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

        Add to Reading List

        Source URL: www.cisr.us

        Language: English - Date: 2007-11-15 12:21:56
          115Visual arts / Video artists / Modern artists / Contemporary art / Golan Levin / Darren Almond / Zachary Lieberman / Paul Rooney / Darren Siwes / Jaap Blonk

          PDF Document

          Add to Reading List

          Source URL: www.tmema.org

          Language: English - Date: 2006-12-04 11:07:15
          116

          The Table is The Score: An Augmented-Reality Interface for Real-Time, Tangible, Spectrographic Performance Golan Levin School of Art, Carnegie Mellon University golan [at] andrew.cmu.edu

          Add to Reading List

          Source URL: flong.com

          Language: English - Date: 2007-05-15 00:56:11
            117

            FIXED-DIMENSIONAL ACOUSTIC EMBEDDINGS OF VARIABLE-LENGTH SEGMENTS IN LOW-RESOURCE SETTINGS Keith Levin,1 Katharine Henry,2 Aren Jansen,1 Karen Livescu3 1 Human Language Technology Center of Excellence & The Center for L

            Add to Reading List

            Source URL: ttic.uchicago.edu

            Language: English - Date: 2013-10-29 11:40:08
              118

              MYSEA Technology Demonstration Cynthia Irvine, David Shifflett, Paul Clark, Timothy Levin, George Dinolt Naval Postgraduate School Abstract ß

              Add to Reading List

              Source URL: www.cisr.us

              Language: English - Date: 2007-11-15 12:21:10
                119

                Alibi Routing Dave Levin∗ Youndo Lee∗ Luke Valenta† Zhihao Li∗ Victoria Lai∗ Cristian Lumezanu‡ Neil Spring∗ Bobby Bhattacharjee∗ ∗ University of Maryland

                Add to Reading List

                Source URL: alibi.cs.umd.edu

                Language: English - Date: 2015-08-12 16:07:03
                  120Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

                  A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

                  Add to Reading List

                  Source URL: cisr.nps.edu

                  Language: English - Date: 2008-08-18 13:41:12
                  UPDATE