Month

14 Matching Results

Results open in a new window/tab.

Altus Times (Altus, Okla.), Vol. 99, No. 43, Ed. 1 Sunday, May 3, 1998 (open access)

Altus Times (Altus, Okla.), Vol. 99, No. 43, Ed. 1 Sunday, May 3, 1998

Daily newspaper from Altus, Oklahoma that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: Cole, Carol
Object Type: Newspaper
System: The Gateway to Oklahoma History
Alvin Sun-Advertiser (Alvin, Tex.), Vol. 107, No. 76, Ed. 1 Sunday, May 3, 1998 (open access)

Alvin Sun-Advertiser (Alvin, Tex.), Vol. 107, No. 76, Ed. 1 Sunday, May 3, 1998

Weekly newspaper from Alvin, Texas that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: Schwind, Jim & Dodson, Doug
Object Type: Newspaper
System: The Portal to Texas History
The Baytown Sun (Baytown, Tex.), Vol. 76, No. 157, Ed. 1 Sunday, May 3, 1998 (open access)

The Baytown Sun (Baytown, Tex.), Vol. 76, No. 157, Ed. 1 Sunday, May 3, 1998

Daily newspaper from Baytown, Texas that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: Dobbs, Gary
Object Type: Newspaper
System: The Portal to Texas History
Boron-enhanced diffusion of boron from ultralow-energy boron implantation (open access)

Boron-enhanced diffusion of boron from ultralow-energy boron implantation

The authors have investigated the diffusion enhancement mechanism of BED (boron enhanced diffusion), wherein the boron diffusivity is enhanced three to four times over the equilibrium diffusivity at 1,050 C in the proximity of a silicon layer containing a high boron concentration. It is shown that BED is associated with the formation of a fine-grain polycrystalline silicon boride phase within an initially amorphous Si layer having a high B concentration. For 0.5 keV B{sup +}, the threshold implantation dose which leads to BED lies between 3 {times} 10{sup 14} and of 1 {times} 10{sup 15}/cm{sup {minus}2}. Formation of the shallowest possible junctions by 0.5 keV B{sup +} requires that the implant dose be kept lower than this threshold.
Date: May 3, 1998
Creator: Agarwal, A.; Eaglesham, D.J.; Gossmann, H.J.; Pelaz, L.; Herner, S.B.; Jacobson, D.C. et al.
Object Type: Report
System: The UNT Digital Library
Chickasha Daily Express (Chickasha, Okla.), Ed. 1 Sunday, May 3, 1998 (open access)

Chickasha Daily Express (Chickasha, Okla.), Ed. 1 Sunday, May 3, 1998

Daily newspaper from Chickasha, Oklahoma that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: Bush, Kent
Object Type: Newspaper
System: The Gateway to Oklahoma History
A graph-based network-vulnerability analysis system (open access)

A graph-based network-vulnerability analysis system

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.
Date: May 3, 1998
Creator: Swiler, L. P.; Phillips, C. & Gaylor, T.
Object Type: Article
System: The UNT Digital Library
Levelland and Hockley County News-Press (Levelland, Tex.), Vol. 20, No. 10, Ed. 1 Sunday, May 3, 1998 (open access)

Levelland and Hockley County News-Press (Levelland, Tex.), Vol. 20, No. 10, Ed. 1 Sunday, May 3, 1998

Semiweekly newspaper from Levelland, Texas that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: Rigg, John
Object Type: Newspaper
System: The Portal to Texas History
[News Clip: Winnetka] captions transcript

[News Clip: Winnetka]

B-roll video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story.
Date: May 3, 1998, 10:00 p.m.
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Object Type: Video
System: The UNT Digital Library
The Panola Watchman (Carthage, Tex.), Vol. 125, No. 37, Ed. 1 Sunday, May 3, 1998 (open access)

The Panola Watchman (Carthage, Tex.), Vol. 125, No. 37, Ed. 1 Sunday, May 3, 1998

Semiweekly newspaper from Carthage, Texas that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: unknown
Object Type: Newspaper
System: The Portal to Texas History
Polk County Enterprise (Livingston, Tex.), Vol. 116, No. 36, Ed. 1 Sunday, May 3, 1998 (open access)

Polk County Enterprise (Livingston, Tex.), Vol. 116, No. 36, Ed. 1 Sunday, May 3, 1998

Semi-weekly newspaper from Livingston, Texas that includes local, state and national news along with advertising.
Date: May 3, 1998
Creator: White, Barbara
Object Type: Newspaper
System: The Portal to Texas History
Proactive DSA application and implementation (open access)

Proactive DSA application and implementation

Data authentication as provided by digital signatures is a well known technique for verifying data sent via untrusted network links. Recent work has extended digital signatures to allow jointly generated signatures using threshold techniques. In addition, new proactive mechanisms have been developed to protect the joint private key over long periods of time and to allow each of the parties involved to verify the actions of the other parties. In this paper, the authors describe an application in which proactive digital signature techniques are a particularly valuable tool. They describe the proactive DSA protocol and discuss the underlying software tools that they found valuable in developing an implementation. Finally, the authors briefly describe the protocol and note difficulties they experienced and continue to experience in implementing this complex cryptographic protocol.
Date: May 3, 1998
Creator: Draelos, T.; Hamilton, V. & Istrail, G.
Object Type: Article
System: The UNT Digital Library
San Antonio Monthly Reports: April 1998 (open access)

San Antonio Monthly Reports: April 1998

Compilation of monthly reports from departments in the city of San Antonio, Texas providing statistics, project updates, and other information about services and activities.
Date: May 3, 1998
Creator: San Antonio (Tex.)
Object Type: Report
System: The Portal to Texas History
Sapulpa Daily Herald (Sapulpa, Okla.), Vol. 83, No. 198, Ed. 1 Sunday, May 3, 1998 (open access)

Sapulpa Daily Herald (Sapulpa, Okla.), Vol. 83, No. 198, Ed. 1 Sunday, May 3, 1998

Daily newspaper from Sapulpa, Oklahoma that includes local, state, and national news along with advertising.
Date: May 3, 1998
Creator: Horn, Richard A.
Object Type: Newspaper
System: The Gateway to Oklahoma History
[Wheeler Avenue Baptist Church Bulletin: May 3, 1998] (open access)

[Wheeler Avenue Baptist Church Bulletin: May 3, 1998]

Church bulletin listing the order of worship for the 7:30 and 11:00 Sunday morning services at the Wheeler Avenue Baptist Church, as well as various notes about upcoming events, congregational news, and other information of relevance to church members.
Date: May 3, 1998
Creator: Wheeler Avenue Baptist Church (Houston, Tex.)
Object Type: Pamphlet
System: The Portal to Texas History