Spelling suggestions: "subject:"multics (6electronic computer system)"" "subject:"multics (belectronic computer system)""
1 |
Encryption-based protection protocols for interactive user-computer communication over physically unsecured channels.Kent, Stephen Thomas January 1976 (has links)
Thesis. 1976. M.S.--Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science. / Microfiche copy available in Archives and Engineering. / Bibliography: leaves 119-121. / M.S.
|
2 |
A performance analysis of the relational data management system.Martin, Thomas Joseph. January 1976 (has links)
Thesis: B.S., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 1976 / Includes bibliographical references. / B.S. / B.S. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
|
3 |
Minimizing the naming facilities requiring protection in a computing utility.Bratt, Richard Glenn. January 1975 (has links)
Thesis: M.S., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 1975 / Bibliography: leaves 129-130. / M.S. / M.S. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
|
4 |
Enhancement of catalog processing system for MIT Science Fiction SocietyWheeler, Cheryl Ann January 1982 (has links)
Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING / Includes bibliographical references. / by Cheryl Ann Wheeler. / B.S.
|
5 |
Multiplexed network commnication for secure operating systemsCiccarelli, Eugene Charles. January 1978 (has links)
Thesis: Elec. E., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 1978 / Bibliography: leaves 247-251. / by Eugene Charles Ciccarelli, IV. / Elec. E. / Elec. E. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
|
Page generated in 0.1197 seconds