• An_Easily_Adopted_Markup_Discipline_for_Annotating_Electronic_Medical_Records_with_Ontological_and_Epistemological_Qualification_Toward_Disciplined_Asterisks_Parentheticals_Marginalia_Footnotes_a.pdf
  • An_ontology_for_active_and_passive_aerial_drone_threat_automatic_plan_recognition.pdf
  • Auralization_of_process_and_port_status_using_program_binaries_to_generate_semantically_meaningful_non-fatiguing_noise_as_canonical_sound_signals.pdf
  • Digital_flight_plans_for_server_access_control_Restricting_anomalous_activity_with_path-based_declarations_of_intentions.pdf
  • Efficient_Population_of_Structured_Data_Forms_for_Medical_Records_Using_Syntactic_Constraints_and_Intermediate_Text.pdf
  • FPsed_a_streaming_content_search-and-replace_module_for_an_Internet_firewall.pdf
  • Hardware_accelerated_algorithms_for_semantic_processing_of_document_streams.pdf
  • High-Speed_Identification_of_Language_and_Script.pdf
  • How_to_Survive_a_Cyber_Pearl_Harbor.pdf
  • Implementation_of_a_content-scanning_module_for_an_Internet_firewall.pdf
  • Information_Warfare_Amplified_by_Cyberwarfare_and_Hacking_the_National_Knowledge_Infrastructure.pdf
  • In_Praise_of_Scripting_Real_Programming_Pragmatism.pdf
  • Investigating_a_two-way-audio_query-response_command_interface_with_navigation_data_extraction_for_driver_assistance.pdf
  • Information Warfare Amplified by Cyberwarfare and Hacking the National Knowledge Infrastructure
  • Plausible_Deniability_for_ISP_Log_and_Browser_Suggestion_Obfuscation_with_a_Phrase_Extractor_on_Potentially_Open_Text.pdf
  • Sensitivity_Analysis_of_Gigabit_Concept_Mining_System.pdf
  • Streaming_Hierarchical_Clustering_for_Concept_Mining.pdf
  • Transformation_Algorithms_for_Data_Streams.pdf
  • Virtualized_dynamic_port_assignment_and_windowed_whitelisting_for_securing_infrastructure_servers.pdf
  • Dispute Resolution with Arguments Over Milestones.docx