default search action
BibTeX records: Phillip G. Bradford
@article{DBLP:journals/corr/abs-2404-04729, author = {Agron Gemajli and Shivam Patel and Phillip G. Bradford}, title = {Towards a low carbon proof-of-work blockchain}, journal = {CoRR}, volume = {abs/2404.04729}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.04729}, doi = {10.48550/ARXIV.2404.04729}, eprinttype = {arXiv}, eprint = {2404.04729}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-04729.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/TanqueB23, author = {Marcus Tanque and Phillip G. Bradford}, title = {Chapter Six - Virtual Raspberry Pi-s with blockchain and cybersecurity applications}, journal = {Advances in Computers}, volume = {131}, pages = {201--232}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2023.04.005}, doi = {10.1016/BS.ADCOM.2023.04.005}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/TanqueB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/Bradford18, author = {Phillip G. Bradford}, title = {Preliminary exploration of co-functional gene networks for wireless sensor networks}, booktitle = {{IEEE} 8th Annual Computing and Communication Workshop and Conference, {CCWC} 2018, Las Vegas, NV, USA, January 8-10, 2018}, pages = {1005--1008}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCWC.2018.8301765}, doi = {10.1109/CCWC.2018.8301765}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/ccwc/Bradford18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-05239, author = {Phillip G. Bradford}, title = {Efficient Exact Paths For Dyck and semi-Dyck Labeled Path Reachability}, journal = {CoRR}, volume = {abs/1802.05239}, year = {2018}, url = {http://arxiv.org/abs/1802.05239}, eprinttype = {arXiv}, eprint = {1802.05239}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-05239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/Bradford17, author = {Phillip G. Bradford}, title = {Efficient exact paths for dyck and semi-dyck labeled path reachability (extended abstract)}, booktitle = {8th {IEEE} Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, {UEMCON} 2017, New York City, NY, USA, October 19-21, 2017}, pages = {247--253}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UEMCON.2017.8249039}, doi = {10.1109/UEMCON.2017.8249039}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/uemcom/Bradford17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/BradfordC16, author = {Phillip G. Bradford and Venkatesh Choppella}, title = {Fast point-to-point Dyck constrained shortest paths on a {DAG} (Extended abstract)}, booktitle = {7th {IEEE} Annual Ubiquitous Computing, Electronics {\&} Mobile Communication Conference, {UEMCON} 2016, New York City, NY, USA, October 20-22, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/UEMCON.2016.7777894}, doi = {10.1109/UEMCON.2016.7777894}, timestamp = {Fri, 06 Mar 2020 10:55:16 +0100}, biburl = {https://dblp.org/rec/conf/uemcom/BradfordC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/BradfordT09, author = {Phillip G. Bradford and David A. Thomas}, title = {Labeled shortest paths in digraphs with negative and positive edge weights}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {43}, number = {3}, pages = {567--583}, year = {2009}, url = {https://doi.org/10.1051/ita/2009011}, doi = {10.1051/ITA/2009011}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/BradfordT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/BradfordPRP08, author = {Phillip G. Bradford and Sunju Park and Michael H. Rothkopf and Heejin Park}, title = {Protocol completion incentive problems in cryptographic Vickrey auctions}, journal = {Electron. Commer. Res.}, volume = {8}, number = {1-2}, pages = {57--77}, year = {2008}, url = {https://doi.org/10.1007/s10660-008-9013-1}, doi = {10.1007/S10660-008-9013-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/BradfordPRP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TangHB08, author = {Lei Tang and Xiaoyan Hong and Phillip G. Bradford}, title = {Privacy-preserving secure relative localization in vehicular networks}, journal = {Secur. Commun. Networks}, volume = {1}, number = {3}, pages = {195--204}, year = {2008}, url = {https://doi.org/10.1002/sec.31}, doi = {10.1002/SEC.31}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TangHB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BradfordR08, author = {Phillip G. Bradford and Daniel A. Ray}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Semantics for a domain-specific language for the digital forensics domain}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {11:1--11:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413153}, doi = {10.1145/1413140.1413153}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BradfordR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/BradfordR08, author = {Phillip G. Bradford and Daniel A. Ray}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Requirements for Digital Forensics Investigation Domain-Specific Languages}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {428--434}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/BradfordR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/WardWB08, author = {Charles B. Ward and Nathan M. Wiegand and Phillip G. Bradford}, title = {A Distributed Context-Free Language Constrained Shortest Path Algorithm}, booktitle = {2008 International Conference on Parallel Processing, {ICPP} 2008, September 8-12, 2008, Portland, Oregon, {USA}}, pages = {373--380}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICPP.2008.67}, doi = {10.1109/ICPP.2008.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/WardWB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BradfordK07, author = {Phillip G. Bradford and Michael N. Katehakis}, title = {A Probabilistic Study on Combinatorial Expanders and Hashing}, journal = {{SIAM} J. Comput.}, volume = {37}, number = {1}, pages = {83--111}, year = {2007}, url = {https://doi.org/10.1137/S009753970444630X}, doi = {10.1137/S009753970444630X}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/BradfordK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisse/BradfordO07, author = {Phillip G. Bradford and Alina Olteanu}, editor = {Tarek M. Sobh}, title = {Issues in Simulation for Valuing Long-Term Forwards}, booktitle = {Advances in Computer and Information Sciences and Engineering, Proceedings of the 2007 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering {(CISSE} 2007), Bridgeport, CT, USA, December 3-12, 2007}, pages = {394--398}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-1-4020-8741-7\_71}, doi = {10.1007/978-1-4020-8741-7\_71}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisse/BradfordO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/BradfordR07, author = {Phillip G. Bradford and Daniel A. Ray}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Finding the Change-Point in a Binary Stream with Two Unknown, but Distant, Distributions}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {426--431}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/BradfordR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/RayB07, author = {Daniel A. Ray and Phillip G. Bradford}, editor = {Philip Craiger and Sujeet Shenoi}, title = {An Integrated System for Insider Threat Detection}, booktitle = {Advances in Digital Forensics {III} - {IFIP} International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007}, series = {{IFIP}}, volume = {242}, pages = {75--86}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73742-3\_5}, doi = {10.1007/978-0-387-73742-3\_5}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-9/RayB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BradfordR07, author = {Phillip G. Bradford and Daniel A. Ray}, title = {Using Digital Chains of Custody on Constrained Devices to Verify Evidence}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings}, pages = {8--15}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISI.2007.379522}, doi = {10.1109/ISI.2007.379522}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/BradfordR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0705-2876, author = {Phillip G. Bradford and Daniel A. Ray}, title = {An online algorithm for generating fractal hash chains applied to digital chains of custody}, journal = {CoRR}, volume = {abs/0705.2876}, year = {2007}, url = {http://arxiv.org/abs/0705.2876}, eprinttype = {arXiv}, eprint = {0705.2876}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0705-2876.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/UngureanuMKB06, author = {Victoria Ungureanu and Benjamin Melamed and Michael N. Katehakis and Phillip G. Bradford}, title = {Deferred Assignment Scheduling in Cluster-Based Servers}, journal = {Clust. Comput.}, volume = {9}, number = {1}, pages = {57--65}, year = {2006}, url = {https://doi.org/10.1007/s10586-006-4897-9}, doi = {10.1007/S10586-006-4897-9}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/UngureanuMKB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/BradfordG06, author = {Phillip G. Bradford and Olga V. Gavrylyako}, title = {Hash chains with diminishing ranges for sensors}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {4}, number = {1/2}, pages = {31--38}, year = {2006}, url = {https://doi.org/10.1504/IJHPCN.2006.010201}, doi = {10.1504/IJHPCN.2006.010201}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/BradfordG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/HuBL06, author = {Ning Hu and Phillip G. Bradford and Jun Liu}, editor = {Ronaldo Menezes}, title = {Applying role based access control and genetic algorithms to insider threat detection}, booktitle = {Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006}, pages = {790--791}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1185448.1185638}, doi = {10.1145/1185448.1185638}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/HuBL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/BradfordPSW06, author = {Phillip G. Bradford and Irina Perevalova and Michiel H. M. Smid and Charles B. Ward}, title = {Indicator Random Variables in Traffic Analysis and the Birthday Problem}, booktitle = {{LCN} 2006, The 31st Annual {IEEE} Conference on Local Computer Networks, Tampa, Florida, USA, 14-16 November 2006}, pages = {1016--1023}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/LCN.2006.322217}, doi = {10.1109/LCN.2006.322217}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/BradfordPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/TangHB06, author = {Lei Tang and Xiaoyan Hong and Phillip G. Bradford}, editor = {Jiannong Cao and Ivan Stojmenovic and Xiaohua Jia and Sajal K. Das}, title = {Secure Relative Location Determination in Vehicular Network}, booktitle = {Mobile Ad-hoc and Sensor Networks, Second International Conference, {MSN} 2006, Hong Kong, China, December 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4325}, pages = {543--554}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11943952\_46}, doi = {10.1007/11943952\_46}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/TangHB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/BradfordG05, author = {Phillip G. Bradford and Olga V. Gavrylyako}, title = {Foundations of Security for Hash Chains in Ad Hoc Networks}, journal = {Clust. Comput.}, volume = {8}, number = {2-3}, pages = {189--195}, year = {2005}, url = {https://doi.org/10.1007/s10586-005-6184-6}, doi = {10.1007/S10586-005-6184-6}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/BradfordG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/BradfordGWW05, author = {Phillip G. Bradford and Olga V. Gavrylyako and Charles B. Ward and Nathan M. Wiegand}, editor = {Laurence Tianruo Yang and Hamid R. Arabnia and Li{-}Chun Wang}, title = {A Proposal for a Multimedia Traffic Analysis Attack}, booktitle = {Proceedings of the 2005 International Conference on Wireless Networks, {ICWN} 2005, Las Vegas, Nevada, USA, June 27-30, 2005}, pages = {261--267}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Tue, 29 Oct 2019 17:54:20 +0100}, biburl = {https://dblp.org/rec/conf/icwn/BradfordGWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/LiuGB04, author = {Shuang Liu and Olga V. Gavrylyako and Phillip G. Bradford}, editor = {Seong{-}Moo Yoo and Letha H. Etzkorn}, title = {Implementing the {TEA} algorithm on sensors}, booktitle = {Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004}, pages = {64--69}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/986537.986553}, doi = {10.1145/986537.986553}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/LiuGB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/HuSB04, author = {Ning Hu and Randy K. Smith and Phillip G. Bradford}, editor = {Seong{-}Moo Yoo and Letha H. Etzkorn}, title = {Security for fixed sensor networks}, booktitle = {Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004}, pages = {212--213}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/986537.986586}, doi = {10.1145/986537.986586}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/HuSB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/BradfordG04, author = {Phillip G. Bradford and Olga V. Gavrylyako}, title = {Hash Chains with Diminishing Ranges for Sensors}, booktitle = {33rd International Conference on Parallel Processing Workshops {(ICPP} 2004 Workshops), 15-18 August 2004, Montreal, Quebec, Canada}, pages = {77--83}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ICPPW.2004.1327999}, doi = {10.1109/ICPPW.2004.1327999}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/BradfordG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BradfordBPS04, author = {Phillip G. Bradford and Marcus Brown and Josh Perdue and Bonnie Self}, title = {Towards Proactive Computer-System Forensics}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {648--652}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286727}, doi = {10.1109/ITCC.2004.1286727}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BradfordBPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/UngureanuMBK04, author = {Victoria Ungureanu and Benjamin Melamed and Phillip G. Bradford and Michael N. Katehakis}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Class-Dependent Assignment in cluster-based servers}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {1420--1425}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.968185}, doi = {10.1145/967900.968185}, timestamp = {Tue, 06 Nov 2018 11:06:44 +0100}, biburl = {https://dblp.org/rec/conf/sac/UngureanuMBK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/BradfordG03, author = {Phillip G. Bradford and Olga V. Gavrylyako}, title = {Foundations of Security for Hash Chains in Ad Hoc Networks}, booktitle = {23rd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2003 Workshops), 19-22 May 2003, Providence, RI, {USA}}, pages = {743--748}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDCSW.2003.1203641}, doi = {10.1109/ICDCSW.2003.1203641}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/BradfordG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/BradfordGS03, author = {Phillip G. Bradford and Olga V. Gavrylyako and Randy K. Smith}, title = {Perfect Secrecy in Wireless Networks}, booktitle = {32nd International Conference on Parallel Processing Workshops {(ICPP} 2003 Workshops), 6-9 October 2003, Kaohsiung, Taiwan}, pages = {409--416}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICPPW.2003.1240396}, doi = {10.1109/ICPPW.2003.1240396}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/BradfordGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/BradfordGLR02, author = {Phillip G. Bradford and Mordecai J. Golin and Lawrence L. Larmore and Wojciech Rytter}, title = {Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property}, journal = {J. Algorithms}, volume = {42}, number = {2}, pages = {277--303}, year = {2002}, url = {https://doi.org/10.1006/jagm.2002.1213}, doi = {10.1006/JAGM.2002.1213}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/BradfordGLR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/BradfordBS01, author = {Phillip G. Bradford and Herbert E. Brown and Paula M. Saunders}, title = {Pricing, Agents, Perceived Value and the Internet}, journal = {First Monday}, volume = {6}, number = {6}, year = {2001}, url = {https://doi.org/10.5210/fm.v6i6.866}, doi = {10.5210/FM.V6I6.866}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/BradfordBS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/PurdomBTK00, author = {Paul Walton Purdom Jr. and Phillip G. Bradford and Koichiro Tamura and Sudhir Kumar}, title = {Single column discrepancy and dynamic max-mini optimizations for quickly finding the most parsimonious evolutionary trees}, journal = {Bioinform.}, volume = {16}, number = {2}, pages = {140--151}, year = {2000}, url = {https://doi.org/10.1093/bioinformatics/16.2.140}, doi = {10.1093/BIOINFORMATICS/16.2.140}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/PurdomBTK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BradfordRS98, author = {Phillip G. Bradford and Gregory J. E. Rawlins and Gregory E. Shannon}, title = {Efficient Matrix Chain Ordering in Polylog Time}, journal = {{SIAM} J. Comput.}, volume = {27}, number = {2}, pages = {466--490}, year = {1998}, url = {https://doi.org/10.1137/S0097539794270698}, doi = {10.1137/S0097539794270698}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/BradfordRS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/BradfordGLR98, author = {Phillip G. Bradford and Mordecai J. Golin and Lawrence L. Larmore and Wojciech Rytter}, editor = {Gianfranco Bilardi and Giuseppe F. Italiano and Andrea Pietracaprina and Geppino Pucci}, title = {Optimal Prefix-Free Codes for Unequal Letter Costs: Dynamic Programming with the Monge Property}, booktitle = {Algorithms - {ESA} '98, 6th Annual European Symposium, Venice, Italy, August 24-26, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1461}, pages = {43--54}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-68530-8\_4}, doi = {10.1007/3-540-68530-8\_4}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/BradfordGLR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcg/BradfordC97, author = {Phillip G. Bradford and Vasilis Capoyleas}, title = {Weak epsilon-Nets for Points on a Hypersphere}, journal = {Discret. Comput. Geom.}, volume = {18}, number = {1}, pages = {83--91}, year = {1997}, url = {https://doi.org/10.1007/PL00009309}, doi = {10.1007/PL00009309}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcg/BradfordC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jal/BradfordFS97, author = {Phillip G. Bradford and Rudolf Fleischer and Michiel H. M. Smid}, title = {More Efficient Parallel Totally Monotone Matrix Searching}, journal = {J. Algorithms}, volume = {23}, number = {2}, pages = {386--400}, year = {1997}, url = {https://doi.org/10.1006/jagm.1996.0824}, doi = {10.1006/JAGM.1996.0824}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jal/BradfordFS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AlonBF96, author = {Noga Alon and Phillip G. Bradford and Rudolf Fleischer}, title = {Matching Nuts and Bolts Faster}, journal = {Inf. Process. Lett.}, volume = {59}, number = {3}, pages = {123--127}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00104-4}, doi = {10.1016/0020-0190(96)00104-4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AlonBF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BradfordR96, author = {Phillip G. Bradford and Knut Reinert}, editor = {Friedhelm Meyer auf der Heide and Burkhard Monien}, title = {Lower Bounds for Row Minima Searching (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 23rd International Colloquium, ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1099}, pages = {454--465}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61440-0\_150}, doi = {10.1007/3-540-61440-0\_150}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BradfordR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigart/BradfordW95, author = {Phillip G. Bradford and Michael Wollowski}, title = {A Formalization of the Turing Test}, journal = {{SIGART} Bull.}, volume = {6}, number = {4}, pages = {3--10}, year = {1995}, url = {https://doi.org/10.1145/222267.222268}, doi = {10.1145/222267.222268}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigart/BradfordW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/BradfordF95, author = {Phillip G. Bradford and Rudolf Fleischer}, editor = {John Staples and Peter Eades and Naoki Katoh and Alistair Moffat}, title = {Matching Nuts and Bolts Faster}, booktitle = {Algorithms and Computation, 6th International Symposium, {ISAAC} '95, Cairns, Australia, December 4-6, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1004}, pages = {402--408}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0015446}, doi = {10.1007/BFB0015446}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/BradfordF95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latin/BradfordCR95, author = {Phillip G. Bradford and Venkatesh Choppella and Gregory J. E. Rawlins}, editor = {Ricardo A. Baeza{-}Yates and Eric Goles Ch. and Patricio V. Poblete}, title = {Lower Bounds for the Matrix Chain Ordering Problem (Extended bstract)}, booktitle = {{LATIN} '95: Theoretical Informatics, Second Latin American Symposium, Valpara{\'{\i}}so, Chile, April 3-7, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {911}, pages = {112--130}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-59175-3\_85}, doi = {10.1007/3-540-59175-3\_85}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/latin/BradfordCR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/BradfordRS94, author = {Phillip G. Bradford and Gregory J. E. Rawlins and Gregory E. Shannon}, editor = {Howard Jay Siegel}, title = {Efficient Matrix Chain Ordering in Polylog Time}, booktitle = {Proceedings of the 8th International Symposium on Parallel Processing, Canc{\'{u}}n, Mexico, April 1994}, pages = {234--241}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/IPPS.1994.288295}, doi = {10.1109/IPPS.1994.288295}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/BradfordRS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.