| "Macdonald's Theorem for Quadratic Jordan Algebras," Pacific
Journal of Mathematics, 35, (1970), 681-706 (co-author).
|
| "Hereditary Radicals in Jordan Rings," Proceedings of the
American Mathematical Society, 33, (1972), 302-306.
|
| "Extending a Jordan Ring Homomorphism," Proceedings of the
American Mathematical Society, 40, (1975), 57-59.
|
| Sentence Helpers, Media Materials, Inc., Baltimore (1982) (co-author).
(This is software whose purpose is to teach the formation of properly
constructed sentences.)
|
| "Induction and Recursion," Collegiate Microcomputer, v.2, n.2,
(May 1984).
|
| "Artificial Intelligence," The Goucher Quarterly, v.63, n.4,
(Summer 1985).
|
| "The Relation between Parsimonious Covering Theory and
Competition-Based Spreading Activation," TR-1580, University of Maryland
Department of Computer Science, July 1986.
|
| "A Case Study in Building an Expert System," Proceedings of the
Third Annual Eastern Small College Computing Conference, October 1987.
(Reprinted in the Journal of Computing in Small Colleges, February 1988).
|
| Expert System Development, Q.E.D. Information Services, (1988)
(co-author).
|
| Intelligent Systems Design, John Wiley & Sons, (1990)
(co-author).
|
| "Fibonacci Melodies," Humanistic Mathematics Journal, 14, (November 1996), 36-39 |
| Cryptological Mathematics, Mathematical Association of America Press,
(2000) |
| "International Mathematical
Experiences," Math Horizons, (September 2006) |
| "A Cryptology Course at
Bletchley Park," Cryptologia, v.31, n.2, (April 2007) |
|
"Cryptology in a Liberal Arts
Setting," Journal of Mathematics and Computer Education, v.41, n.3, (Fall
2007). |
|
"The Perfect Cipher," The Mathematical Gazette, v.94, n.531, (Fall 2010) |
|
"Secret Keeping 101 - Dr. Janice Martin Benario and the Women's College Connection to ULTRA," Cryptologia, v. 35, n.1, (Winter 2011) |