Richard B. Neely

According to our database1, Richard B. Neely authored at least 10 papers between 1973 and 1999.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1999
Security Architecture Development and Results for a Distributed Modeling and Simulation System .
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1997
Risk Assessment for Large Heterogeneous Systems.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1994
A validated security policy modeling approach.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1989
Achieving Understandable Results in a Formal Design Verification.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1985
Structuring Systems for Formal Verification.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1984
Multinet Gateway-Towards A1 Certification.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1979
KSOS - Computer network applications.
Proceedings of the 1979 International Workshop on Managing Requirements Knowledge, 1979

1976
The Hearsay- I Speech Understanding System: An Example of the Recognition Process.
IEEE Trans. Computers, 1976

1974
On the Use of Syntax in a Low Cost Real Time Speech Recognition System.
Proceedings of the Information Processing, 1974

1973
The Hearsay Speech Understanding System: An Example of the Recognition Process.
Proceedings of the 3rd International Joint Conference on Artificial Intelligence. Standford, 1973


  Loading...