|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 6 scholarly publications.
Prototyping
Computer security
Data storage
Magnetism
Data archive systems
Databases
Network security