Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Clark D. Thomborson
@inproceedings{DBLP:conf/acisp/ThomborsonJ17, author = {Clark D. Thomborson and Marc Jeanmougin}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Stegogames}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {414--421}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_26}, doi = {10.1007/978-3-319-59870-3\_26}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ThomborsonJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/TuTT16, author = {Yu{-}Cheng Tu and Ewan D. Tempero and Clark D. Thomborson}, title = {An experiment on the impact of transparency on the effectiveness of requirements documents}, journal = {Empir. Softw. Eng.}, volume = {21}, number = {3}, pages = {1035--1066}, year = {2016}, url = {https://doi.org/10.1007/s10664-015-9374-8}, doi = {10.1007/S10664-015-9374-8}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ese/TuTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Thomborson16, author = {Clark D. Thomborson}, title = {Privacy patterns}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {656--663}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906953}, doi = {10.1109/PST.2016.7906953}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/Thomborson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Thomborson16, author = {Clark D. Thomborson}, title = {Privacy Patterns}, journal = {CoRR}, volume = {abs/1612.01553}, year = {2016}, url = {http://arxiv.org/abs/1612.01553}, eprinttype = {arXiv}, eprint = {1612.01553}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Thomborson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KanzakiTMC15, author = {Yuichiro Kanzaki and Clark D. Thomborson and Akito Monden and Christian S. Collberg}, editor = {Jeffrey Todd McDonald and Mila Dalla Preda and Natalia Stakhanova}, title = {Pinpointing and Hiding Surprising Fragments in an Obfuscated Program}, booktitle = {Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2843859.2843862}, doi = {10.1145/2843859.2843862}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KanzakiTMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Thomborson15, author = {Clark D. Thomborson}, title = {Benchmarking Obfuscators of Functionality}, journal = {CoRR}, volume = {abs/1501.02885}, year = {2015}, url = {http://arxiv.org/abs/1501.02885}, eprinttype = {arXiv}, eprint = {1501.02885}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Thomborson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apres/TuTT14, author = {Yu{-}Cheng Tu and Ewan D. Tempero and Clark D. Thomborson}, editor = {Didar Zowghi and Zhi Jin}, title = {Evaluating Presentation of Requirements Documents: Results of an Experiment}, booktitle = {Requirements Engineering - First Asia Pacific Requirements Engineering Symposium, {APRES} 2014, Auckland, New Zealand, April 28-29, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {432}, pages = {120--134}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43610-3\_10}, doi = {10.1007/978-3-662-43610-3\_10}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apres/TuTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEicci/JarupunpholT13, author = {Pita Jarupunphol and Clark D. Thomborson}, title = {The dhammic framework for understanding the cause of system project failures from Buddhist insights}, booktitle = {{IEEE} 12th International Conference on Cognitive Informatics and Cognitive Computing, ICCI*CC 2013, New York, NY, USA, July 16-18, 2013}, pages = {387--396}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICCI-CC.2013.6622272}, doi = {10.1109/ICCI-CC.2013.6622272}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEicci/JarupunpholT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2013, editor = {Clark D. Thomborson and Udaya Parampalli}, title = {Eleventh Australasian Information Security Conference, {AISC} 2013, Adelaide, Australia, February 2013}, series = {{CRPIT}}, volume = {138}, publisher = {Australian Computer Society}, year = {2013}, url = {http://crpit.scem.westernsydney.edu.au/Vol138.html}, isbn = {978-1-921770-23-4}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/YuWT0LV12, author = {Zhiwei Yu and Chaokun Wang and Clark D. Thomborson and Jianmin Wang and Shiguo Lian and Athanasios V. Vasilakos}, title = {Multimedia Applications and Security in MapReduce: Opportunities and Challenges}, journal = {Concurr. Comput. Pract. Exp.}, volume = {24}, number = {17}, pages = {2083--2101}, year = {2012}, url = {https://doi.org/10.1002/cpe.1846}, doi = {10.1002/CPE.1846}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/YuWT0LV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/YuWTWLV12, author = {Zhiwei Yu and Chaokun Wang and Clark D. Thomborson and Jianmin Wang and Shiguo Lian and Athanasios V. Vasilakos}, title = {A novel watermarking method for software protection in the cloud}, journal = {Softw. Pract. Exp.}, volume = {42}, number = {4}, pages = {409--430}, year = {2012}, url = {https://doi.org/10.1002/spe.1088}, doi = {10.1002/SPE.1088}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/YuWTWLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icistm/Thomborson12, author = {Clark D. Thomborson}, editor = {Sumeet Dua and Aryya Gangopadhyay and Parimala Thulasiraman and Umberto Straccia and Michael A. Shepherd and Benno Stein}, title = {The Art and Science of Obfuscation}, booktitle = {Information Systems, Technology and Management - 6th International Conference, {ICISTM} 2012, Grenoble, France, March 28-30, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {285}, pages = {445--450}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29166-1\_43}, doi = {10.1007/978-3-642-29166-1\_43}, timestamp = {Wed, 30 Oct 2019 15:50:13 +0100}, biburl = {https://dblp.org/rec/conf/icistm/Thomborson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/YuTWWL12, author = {Zhiwei Yu and Clark D. Thomborson and Chaokun Wang and Jianmin Wang and Rui Li}, editor = {Waleed W. Smari and Vesna Zeljkovic}, title = {A cloud-based watermarking method for health data security}, booktitle = {2012 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2012, Madrid, Spain, July 2-6, 2012}, pages = {642--647}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/HPCSim.2012.6266986}, doi = {10.1109/HPCSIM.2012.6266986}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/YuTWWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/auisc/2012, editor = {Josef Pieprzyk and Clark D. Thomborson}, title = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne, Australia, January 2012}, series = {{CRPIT}}, volume = {125}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/Vol125.html}, isbn = {978-1-921770-06-7}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/TuTT11, author = {Yu{-}Cheng Tu and Clark D. Thomborson and Ewan D. Tempero}, editor = {Tran Dan Thu and Karl R. P. H. Leung}, title = {Illusions and Perceptions of Transparency in Software Engineering}, booktitle = {18th Asia Pacific Software Engineering Conference, {APSEC} 2011, Ho Chi Minh, Vietnam, December 5-8, 2011}, pages = {365--372}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/APSEC.2011.42}, doi = {10.1109/APSEC.2011.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/TuTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Thomborson10, author = {Clark D. Thomborson}, editor = {Alessandro Acquisti and Sean W. Smith and Ahmad{-}Reza Sadeghi}, title = {Axiomatic and Behavioural Trust}, booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST} 2010, Berlin, Germany, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6101}, pages = {352--366}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13869-0\_26}, doi = {10.1007/978-3-642-13869-0\_26}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/Thomborson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/icsec/Thomborson10, author = {Clark D. Thomborson}, editor = {Peter P. Stavroulakis and Mark Stamp}, title = {A Framework for System Security}, booktitle = {Handbook of Information and Communication Security}, pages = {3--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-04117-4\_1}, doi = {10.1007/978-3-642-04117-4\_1}, timestamp = {Mon, 13 Mar 2023 20:54:16 +0100}, biburl = {https://dblp.org/rec/reference/icsec/Thomborson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/Thomborson09, author = {Clark D. Thomborson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Foundation for Systems Security}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {3}, publisher = {Australian Computer Society}, year = {2009}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/Thomborson09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/NotoatmodjoT09, author = {Gilbert Notoatmodjo and Clark D. Thomborson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Passwords and Perceptions}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {71--78}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Notoatmodjo.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/NotoatmodjoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/TuT09, author = {Yu{-}Cheng Tu and Clark D. Thomborson}, editor = {Ljiljana Brankovic and Willy Susilo}, title = {Preliminary Security Specification for New Zealand's igovt System}, booktitle = {Seventh Australasian Information Security Conference, {AISC} 2009, Wellington, New Zealand, January 2009}, series = {{CRPIT}}, volume = {98}, pages = {79--88}, publisher = {Australian Computer Society}, year = {2009}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Tu.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/auisc/TuT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ZhangWTWC09, author = {Changjiang Zhang and Jianmin Wang and Clark D. Thomborson and Chaokun Wang and Christian S. Collberg}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {A semi-dynamic multiple watermarking schemefor java applications}, booktitle = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, pages = {59--72}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655048.1655058}, doi = {10.1145/1655048.1655058}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ZhangWTWC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/Thomborson08, author = {Clark D. Thomborson}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {A Model for New Zealand's Identity Verification Service}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {92--106}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_7}, doi = {10.1007/978-3-540-68979-9\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/Thomborson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/CollbergTT07, author = {Christian S. Collberg and Clark D. Thomborson and Gregg M. Townsend}, title = {Dynamic graph-based software fingerprinting}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {29}, number = {6}, pages = {35}, year = {2007}, url = {https://doi.org/10.1145/1286821.1286826}, doi = {10.1145/1286821.1286826}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/CollbergTT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/DrapeMT07, author = {Stephen Drape and Anirban Majumdar and Clark D. Thomborson}, title = {Slicing Aided Design of Obfuscating Transforms}, booktitle = {6th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia}, pages = {1019--1024}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICIS.2007.167}, doi = {10.1109/ICIS.2007.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/DrapeMT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MajumdarDT07, author = {Anirban Majumdar and Stephen Drape and Clark D. Thomborson}, editor = {Ning Zhang and Ajith Abraham}, title = {Metrics-based Evaluation of Slicing Obfuscations}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {472--477}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.50}, doi = {10.1109/IAS.2007.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/MajumdarDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MajumdarDT07, author = {Anirban Majumdar and Stephen Drape and Clark D. Thomborson}, editor = {Moti Yung and Aggelos Kiayias and Ahmad{-}Reza Sadeghi}, title = {Slicing obfuscations: design, correctness, and evaluation}, booktitle = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007}, pages = {70--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314276.1314290}, doi = {10.1145/1314276.1314290}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MajumdarDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DrapeTM07, author = {Stephen Drape and Clark D. Thomborson and Anirban Majumdar}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Specifying Imperative Data Obfuscations}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {299--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_20}, doi = {10.1007/978-3-540-75496-1\_20}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DrapeTM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/MajumdarT06, author = {Anirban Majumdar and Clark D. Thomborson}, editor = {Vladimir Estivill{-}Castro and Gillian Dobbie}, title = {Manufacturing opaque predicates in distributed systems for code obfuscation}, booktitle = {Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006}, series = {{CRPIT}}, volume = {48}, pages = {187--196}, publisher = {Australian Computer Society}, year = {2006}, url = {https://dl.acm.org/citation.cfm?id=1151721}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsc/MajumdarT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/BarrettT06, author = {Matt Barrett and Clark D. Thomborson}, title = {Frameworks Built on the Trusted Platform Module}, booktitle = {30th Annual International Computer Software and Applications Conference, {COMPSAC} 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2}, pages = {59--62}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/COMPSAC.2006.132}, doi = {10.1109/COMPSAC.2006.132}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/BarrettT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/ZhuTW06, author = {William Zhu and Clark D. Thomborson and Fei{-}Yue Wang}, title = {Obfuscate arrays by homomorphic functions}, booktitle = {2006 {IEEE} International Conference on Granular Computing, GrC 2006, Atlanta, Georgia, USA, May 10-12, 2006}, pages = {770--773}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GRC.2006.1635914}, doi = {10.1109/GRC.2006.1635914}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/grc/ZhuTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MajumdarTD06, author = {Anirban Majumdar and Clark D. Thomborson and Stephen Drape}, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {A Survey of Control-Flow Obfuscations}, booktitle = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {353--356}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635\_26}, doi = {10.1007/11961635\_26}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MajumdarTD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/ZhuT06, author = {William Zhu and Clark D. Thomborson}, editor = {Sviatoslav Voloshynovskiy and Jana Dittmann and Jessica J. Fridrich}, title = {Extraction in software watermarking}, booktitle = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec 2006, Geneva, Switzerland, September 26-27, 2006}, pages = {175--181}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161366.1161398}, doi = {10.1145/1161366.1161398}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/ZhuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisi/ZhuTW06, author = {William Zhu and Clark D. Thomborson and Fei{-}Yue Wang}, editor = {Hsinchun Chen and Fei{-}Yue Wang and Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang}, title = {Applications of Homomorphic Functions to Software Obfuscation}, booktitle = {Intelligence and Security Informatics, International Workshop, {WISI} 2006, Singapore, April 9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3917}, pages = {152--153}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734628\_18}, doi = {10.1007/11734628\_18}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisi/ZhuTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MondenMT05, author = {Akito Monden and Antoine Monsifrot and Clark D. Thomborson}, title = {Tamper-Resistant Software System Based on a Finite State Machine}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {112--122}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_112\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MondenMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drmtics/ZhuT05, author = {William Zhu and Clark D. Thomborson}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Algorithms to Watermark Software Through Register Allocation}, booktitle = {Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, {DRMTICS} 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3919}, pages = {180--191}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11787952\_14}, doi = {10.1007/11787952\_14}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drmtics/ZhuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhuTW05, author = {William Zhu and Clark D. Thomborson and Fei{-}Yue Wang}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {A Survey of Software Watermarking}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {454--458}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_42}, doi = {10.1007/11427995\_42}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ZhuTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhuT05, author = {William Zhu and Clark D. Thomborson}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {On the {QP} Algorithm in Software Watermarking}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {646--647}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_89}, doi = {10.1007/11427995\_89}, timestamp = {Fri, 14 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/ZhuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MajumdarT05, author = {Anirban Majumdar and Clark D. Thomborson}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {On the Use of Opaque Predicates in Mobile Agent Code Obfuscation}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {648--649}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_90}, doi = {10.1007/11427995\_90}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/MajumdarT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/MajumdarT05, author = {Anirban Majumdar and Clark D. Thomborson}, editor = {Rajiv Khosla and Robert J. Howlett and Lakhmi C. Jain}, title = {Securing Mobile Agents Control Flow Using Opaque Predicates}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, {KES} 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3683}, pages = {1065--1071}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11553939\_149}, doi = {10.1007/11553939\_149}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/MajumdarT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/MondenMT04, author = {Akito Monden and Antoine Monsifrot and Clark D. Thomborson}, editor = {James M. Hogan and Paul Montague and Martin K. Purvis and Chris Steketee}, title = {A Framework for Obfuscated Interpretation}, booktitle = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand, January 2004}, series = {{CRPIT}}, volume = {32}, pages = {7--16}, publisher = {Australian Computer Society}, year = {2004}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Monden.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/MondenMT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/ThomborsonNSH04, author = {Clark D. Thomborson and Jasvir Nagra and Ram Somaraju and Charles He}, editor = {James M. Hogan and Paul Montague and Martin K. Purvis and Chris Steketee}, title = {Tamper-proo ng Software Watermarks}, booktitle = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand, January 2004}, series = {{CRPIT}}, volume = {32}, pages = {27--36}, publisher = {Australian Computer Society}, year = {2004}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Thomborson.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/ThomborsonNSH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11/ColarikTJ04, author = {Andrew M. Colarik and Clark D. Thomborson and Lech J. Janczewski}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Update/Patch Management Systems: {A} Protocol Taxonomy with Security Implications}, booktitle = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, pages = {67--80}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8145-6\_5}, doi = {10.1007/1-4020-8145-6\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11/ColarikTJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NagraT04, author = {Jasvir Nagra and Clark D. Thomborson}, editor = {Jessica J. Fridrich}, title = {Threading Software Watermarks}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {208--223}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_15}, doi = {10.1007/978-3-540-30114-1\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/NagraT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CarterFT03, author = {Larry Carter and Jeanne Ferrante and Clark D. Thomborson}, editor = {Alex Aiken and Greg Morrisett}, title = {Folklore confirmed: reducible flow graphs are exponentially larger}, booktitle = {Conference Record of {POPL} 2003: The 30th {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, New Orleans, Louisisana, USA, January 15-17, 2003}, pages = {106--114}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/604131.604141}, doi = {10.1145/604131.604141}, timestamp = {Fri, 25 Jun 2021 17:17:37 +0200}, biburl = {https://dblp.org/rec/conf/popl/CarterFT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wg/CollbergKCT03, author = {Christian S. Collberg and Stephen G. Kobourov and Edward Carter and Clark D. Thomborson}, editor = {Hans L. Bodlaender}, title = {Graph-Based Approaches to Software Watermarking}, booktitle = {Graph-Theoretic Concepts in Computer Science, 29th International Workshop, {WG} 2003, Elspeet, The Netherlands, June 19-21, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2880}, pages = {156--167}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39890-5\_14}, doi = {10.1007/978-3-540-39890-5\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/wg/CollbergKCT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/CollbergT02, author = {Christian S. Collberg and Clark D. Thomborson}, title = {Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection}, journal = {{IEEE} Trans. Software Eng.}, volume = {28}, number = {8}, pages = {735--746}, year = {2002}, url = {https://doi.org/10.1109/TSE.2002.1027797}, doi = {10.1109/TSE.2002.1027797}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/CollbergT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/NagraTC02, author = {Jasvir Nagra and Clark D. Thomborson and Christian S. Collberg}, editor = {Michael J. Oudshoorn}, title = {A Functional Taxonomy for Software Watermarking}, booktitle = {Computer Science 2002, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Monash University, Melbourne, Victoria, Australia, January/February 2002}, series = {{CRPIT}}, volume = {4}, pages = {177--186}, publisher = {Australian Computer Society}, year = {2002}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV4Nagra.html}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsc/NagraTC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CollbergT99, author = {Christian S. Collberg and Clark D. Thomborson}, editor = {Andrew W. Appel and Alex Aiken}, title = {Software Watermarking: Models and Dynamic Embeddings}, booktitle = {{POPL} '99, Proceedings of the 26th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, San Antonio, TX, USA, January 20-22, 1999}, pages = {311--324}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/292540.292569}, doi = {10.1145/292540.292569}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/CollbergT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Thomborson98, author = {Clark D. Thomborson}, title = {The Economics of Large-Memory Computations}, journal = {Inf. Process. Lett.}, volume = {66}, number = {5}, pages = {263--268}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00063-5}, doi = {10.1016/S0020-0190(98)00063-5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Thomborson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/LiT98, author = {Enyou Li and Clark D. Thomborson}, title = {Data cache parameter measurements}, booktitle = {International Conference on Computer Design: {VLSI} in Computers and Processors, {ICCD} 1998, Proceedings, 5-7 October, 1998, Austin, TX, {USA}}, pages = {376--383}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICCD.1998.727077}, doi = {10.1109/ICCD.1998.727077}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/LiT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccl/CollbergTL98, author = {Christian S. Collberg and Clark D. Thomborson and Douglas Low}, title = {Breaking Abstractions and Unstructuring Data Structures}, booktitle = {Proceedings of the 1998 International Conference on Computer Languages, {ICCL} 1998, Chicago, IL, USA, May 14-16, 1998}, pages = {28--38}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICCL.1998.674154}, doi = {10.1109/ICCL.1998.674154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccl/CollbergTL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/CollbergTL98, author = {Christian S. Collberg and Clark D. Thomborson and Douglas Low}, editor = {David B. MacQueen and Luca Cardelli}, title = {Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs}, booktitle = {{POPL} '98, Proceedings of the 25th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, San Diego, CA, USA, January 19-21, 1998}, pages = {184--196}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/268946.268962}, doi = {10.1145/268946.268962}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/CollbergTL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rsa/DeneenST94, author = {Linda L. Deneen and Gary M. Shute and Clark D. Thomborson}, title = {A Probaby Fast, Provably Optimal Algorithm for Rectilinear Steiner Trees}, journal = {Random Struct. Algorithms}, volume = {5}, number = {4}, pages = {535--558}, year = {1994}, url = {https://doi.org/10.1002/rsa.3240050405}, doi = {10.1002/RSA.3240050405}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rsa/DeneenST94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Thomborson93, author = {Clark D. Thomborson}, title = {Does Your Workstation Computation Belong on a Vector Supercomputer?}, journal = {Commun. {ACM}}, volume = {36}, number = {11}, pages = {41--49}, year = {1993}, url = {https://doi.org/10.1145/163359.163363}, doi = {10.1145/163359.163363}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Thomborson93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/Thomborson93, author = {Clark D. Thomborson}, title = {Why are fewer females obtaining bachelor's degrees in computer science?}, journal = {{SIGACT} News}, volume = {24}, number = {3}, pages = {114--116}, year = {1993}, url = {https://doi.org/10.1145/166589.166593}, doi = {10.1145/166589.166593}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/Thomborson93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/ThomborsonS93, author = {Clark D. Thomborson and Yi Sun}, title = {Optimizing carry lookahead adders for semicustom {CMOS}}, booktitle = {Third Great Lakes Symposium on Design Automation of High Performance {VLSI} Systems, Kalamazoo, MI, USA, March 5-6, 1993}, pages = {119--122}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/GLSV.1993.224466}, doi = {10.1109/GLSV.1993.224466}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/ThomborsonS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/Thomborson92, author = {Clark D. Thomborson}, title = {The V.42bis standard for data-compressing modems}, journal = {{IEEE} Micro}, volume = {12}, number = {5}, pages = {41--53}, year = {1992}, url = {https://doi.org/10.1109/40.166712}, doi = {10.1109/40.166712}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/micro/Thomborson92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ChanSTO92, author = {Pak K. Chan and Martine D. F. Schlag and Clark D. Thomborson and Vojin G. Oklobdzija}, title = {Delay Optimization of Carry-Skip Adders and Block Carry-Lookahead Adders Using Multidimensional Dynamic Programming}, journal = {{IEEE} Trans. Computers}, volume = {41}, number = {8}, pages = {920--930}, year = {1992}, url = {https://doi.org/10.1109/12.156534}, doi = {10.1109/12.156534}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ChanSTO92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/ThomborsonAC92, author = {Clark D. Thomborson and Bowen Alpern and Larry Carter}, editor = {Nathaniel Dean and Gregory E. Shannon}, title = {Rectilinear Steiner Tree Minimization on a Workstation}, booktitle = {Computational Support for Discrete Mathematics, Proceedings of a {DIMACS} Workshop, Piscataway, New Jersey, USA, March 12-14, 1992}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {15}, pages = {119--136}, publisher = {{DIMACS/AMS}}, year = {1992}, url = {https://doi.org/10.1090/dimacs/015/10}, doi = {10.1090/DIMACS/015/10}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/ThomborsonAC92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/RaghavanT91, author = {Prabhakar Raghavan and Clark D. Thompson}, title = {Multiterminal Global Routing: {A} Deterministic Approximation Scheme}, journal = {Algorithmica}, volume = {6}, number = {1}, pages = {73--82}, year = {1991}, url = {https://doi.org/10.1007/BF01759035}, doi = {10.1007/BF01759035}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/RaghavanT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/ShuteDT91, author = {Gary M. Shute and Linda L. Deneen and Clark D. Thomborson}, title = {An O(n log n) Plane-Sweep Algorithm for L{\_}1 and L{\_}{\textbackslash}infty Delaunay Triangulations}, journal = {Algorithmica}, volume = {6}, number = {2}, pages = {207--221}, year = {1991}, url = {https://doi.org/10.1007/BF01759042}, doi = {10.1007/BF01759042}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/ShuteDT91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigarch/ThomborsonW91, author = {Clark D. Thomborson and Belle W. Y. Wei}, title = {Systolic implementations of a move-to-front text compressor}, journal = {{SIGARCH} Comput. Archit. News}, volume = {19}, number = {1}, pages = {53--60}, year = {1991}, url = {https://doi.org/10.1145/121956.121962}, doi = {10.1145/121956.121962}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigarch/ThomborsonW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/ChanSTO91, author = {Pak K. Chan and Martine D. F. Schlag and Clark D. Thomborson and Vojin G. Oklobdzija}, title = {Delay optimization of carry-skip adders and block carry-lookahead adders}, booktitle = {10th {IEEE} Symposium on Computer Arithmetic, {ARITH} 1991, Grenoble, France, June 26-28, 1991}, pages = {154--164}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/ARITH.1991.145552}, doi = {10.1109/ARITH.1991.145552}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/arith/ChanSTO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/WeiT90, author = {Belle W. Y. Wei and Clark D. Thompson}, title = {Area-Time Optimal Adder Design}, journal = {{IEEE} Trans. Computers}, volume = {39}, number = {5}, pages = {666--675}, year = {1990}, url = {https://doi.org/10.1109/12.53579}, doi = {10.1109/12.53579}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/WeiT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KaklamanisKLMRRTT90, author = {Christos Kaklamanis and Anna R. Karlin and Frank Thomson Leighton and Victor Milenkovic and Prabhakar Raghavan and Satish Rao and Clark D. Thomborson and A. Tsantilas}, title = {Asymptotically Tight Bounds for Computing with Faulty Arrays of Processors (Extended Abstract)}, booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume {I}}, pages = {285--296}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/FSCS.1990.89547}, doi = {10.1109/FSCS.1990.89547}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KaklamanisKLMRRTT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/RogersT89, author = {Clyde Rogers and Clark D. Thomborson}, title = {Enhancements to Ziv-Lempel data compression}, booktitle = {Proceedings of the 13th Annual International Computer Software and Applications Conference, {COMPSAC} 1989, Orlando, FL, USA, 20-22 September, 1989}, pages = {324--330}, publisher = {{IEEE}}, year = {1989}, url = {https://doi.org/10.1109/CMPSAC.1989.65102}, doi = {10.1109/CMPSAC.1989.65102}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/compsac/RogersT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaa/ThomborsonW89, author = {Clark D. Thomborson and Belle W. Y. Wei}, editor = {Frank Thomson Leighton}, title = {Systolic Implementations of a Move-to-Front Text Compressor}, booktitle = {Proceedings of the {ACM} Symposium on Parallel Algorithms and Architectures, {SPAA} '89, Santa Fe, New Mexico, USA, June 18-21, 1989}, pages = {283--290}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/72935.72965}, doi = {10.1145/72935.72965}, timestamp = {Wed, 21 Nov 2018 12:27:44 +0100}, biburl = {https://dblp.org/rec/conf/spaa/ThomborsonW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/KarpLRTVV87, author = {Richard M. Karp and Frank Thomson Leighton and Ronald L. Rivest and Clark D. Thompson and Umesh V. Vazirani and Vijay V. Vazirani}, title = {Global Wire Routing in Two-Dimensional Arrays}, journal = {Algorithmica}, volume = {2}, pages = {113--129}, year = {1987}, url = {https://doi.org/10.1007/BF01840353}, doi = {10.1007/BF01840353}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/KarpLRTVV87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/DurisSTV87, author = {Pavol Duris and Ondrej S{\'{y}}kora and Clark D. Thompson and Imrich Vrto}, title = {A Minimum-Area Circuit for l-Selection}, journal = {Algorithmica}, volume = {2}, pages = {251--265}, year = {1987}, url = {https://doi.org/10.1007/BF01840362}, doi = {10.1007/BF01840362}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/DurisSTV87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorica/RaghavanT87, author = {Prabhakar Raghavan and Clark D. Thompson}, title = {Randomized rounding: a technique for provably good algorithms and algorithmic proofs}, journal = {Comb.}, volume = {7}, number = {4}, pages = {365--374}, year = {1987}, url = {https://doi.org/10.1007/BF02579324}, doi = {10.1007/BF02579324}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorica/RaghavanT87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paa/ThomborsonDS87, author = {Clark D. Thomborson and Linda L. Deneen and Gary M. Shute}, editor = {Andreas Alexander Albrecht and Hermann Jung and Kurt Mehlhorn}, title = {Computing a Rectilinear Steiner Minimal Tree in n\({}^{\mbox{O(sqrt(n))}}\) Time}, booktitle = {Parallel Algorithms and Architectures, International Workshop, Suhl, GDR, May 25-30, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {269}, pages = {176--183}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-18099-0\_44}, doi = {10.1007/3-540-18099-0\_44}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/paa/ThomborsonDS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Thompson86, author = {Clark D. Thompson}, title = {Military Direction of Academic {CS} Research (Viewpoint)}, journal = {Commun. {ACM}}, volume = {29}, number = {7}, pages = {583--585}, year = {1986}, url = {https://doi.org/10.1145/6138.6139}, doi = {10.1145/6138.6139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Thompson86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/NgTR86, author = {Antony P.{-}C. Ng and Clark D. Thompson and Prabhakar Raghavan}, editor = {Don Thomas}, title = {A language for describing rectilinear Steiner tree configurations}, booktitle = {Proceedings of the 23rd {ACM/IEEE} Design Automation Conference. Las Vegas, NV, USA, June, 1986}, pages = {659--662}, publisher = {{IEEE} Computer Society Press}, year = {1986}, url = {https://doi.org/10.1145/318013.318132}, doi = {10.1145/318013.318132}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/NgTR86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Thompson85, author = {Clark D. Thompson}, title = {{VLSI} Design With Multiple Active Layers}, journal = {Inf. Process. Lett.}, volume = {21}, number = {3}, pages = {109--111}, year = {1985}, url = {https://doi.org/10.1016/0020-0190(85)90013-4}, doi = {10.1016/0020-0190(85)90013-4}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Thompson85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DurisSVT85, author = {Pavol Duris and Ondrej S{\'{y}}kora and Imrich Vrto and Clark D. Thompson}, title = {Tight Chip Area Lower Bounds for Discrete Fourier and Walsh-Hadamard Transformations}, journal = {Inf. Process. Lett.}, volume = {21}, number = {5}, pages = {245--247}, year = {1985}, url = {https://doi.org/10.1016/0020-0190(85)90092-4}, doi = {10.1016/0020-0190(85)90092-4}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DurisSVT85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/RaghavanT85, author = {Prabhakar Raghavan and Clark D. Thompson}, editor = {Robert Sedgewick}, title = {Provably Good Routing in Graphs: Regular Arrays}, booktitle = {Proceedings of the 17th Annual {ACM} Symposium on Theory of Computing, May 6-8, 1985, Providence, Rhode Island, {USA}}, pages = {79--87}, publisher = {{ACM}}, year = {1985}, url = {https://doi.org/10.1145/22145.22154}, doi = {10.1145/22145.22154}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/RaghavanT85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/CareyT84, author = {Michael J. Carey and Clark D. Thompson}, title = {An Efficient Implementation of Search Trees on (\emph{lg N} + 1) Processors}, journal = {{IEEE} Trans. Computers}, volume = {33}, number = {11}, pages = {1038--1041}, year = {1984}, url = {https://doi.org/10.1109/TC.1984.1676379}, doi = {10.1109/TC.1984.1676379}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/CareyT84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Thompson83, author = {Clark D. Thompson}, title = {Fourier Transforms in {VLSI}}, journal = {{IEEE} Trans. Computers}, volume = {32}, number = {11}, pages = {1047--1057}, year = {1983}, url = {https://doi.org/10.1109/TC.1983.1676155}, doi = {10.1109/TC.1983.1676155}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Thompson83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Thompson83a, author = {Clark D. Thompson}, title = {The {VLSI} Complexity of Sorting}, journal = {{IEEE} Trans. Computers}, volume = {32}, number = {12}, pages = {1171--1184}, year = {1983}, url = {https://doi.org/10.1109/TC.1983.1676178}, doi = {10.1109/TC.1983.1676178}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Thompson83a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KarpLRTVV83, author = {Richard M. Karp and Frank Thomson Leighton and Ronald L. Rivest and Clark D. Thompson and Umesh V. Vazirani and Vijay V. Vazirani}, title = {Global Wire Routing in Two-Dimensional Arrays (Extended Abstract)}, booktitle = {24th Annual Symposium on Foundations of Computer Science, Tucson, Arizona, USA, 7-9 November 1983}, pages = {453--459}, publisher = {{IEEE} Computer Society}, year = {1983}, url = {https://doi.org/10.1109/SFCS.1983.23}, doi = {10.1109/SFCS.1983.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KarpLRTVV83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wg/Thompson83, author = {Clark D. Thomborson}, editor = {Manfred Nagl and J{\"{u}}rgen Perl}, title = {On the Energy-Time-Area Cost of a Memory Access}, booktitle = {Proceedings of the {WG} '83, International Workshop on Graphtheoretic Concepts in Computer Science, June 16-18, 1983, Haus Ohrbeck, near Osnabr{\"{u}}ck, Germany}, pages = {354--369}, publisher = {Universit{\"{a}}tsverlag Rudolf Trauner, Linz}, year = {1983}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wg/Thompson83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Thompson18, author = {Clark D. Thomborson}, title = {A Complexity Theory for {VLSI}}, school = {Carnegie Mellon University, {USA}}, year = {1980}, url = {https://doi.org/10.1184/r1/6714269.v1}, doi = {10.1184/R1/6714269.V1}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Thompson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Thompson79, author = {Clark D. Thompson}, editor = {Michael J. Fischer and Richard A. DeMillo and Nancy A. Lynch and Walter A. Burkhard and Alfred V. Aho}, title = {Area-Time Complexity for {VLSI}}, booktitle = {Proceedings of the 11h Annual {ACM} Symposium on Theory of Computing, April 30 - May 2, 1979, Atlanta, Georgia, {USA}}, pages = {81--88}, publisher = {{ACM}}, year = {1979}, url = {https://doi.org/10.1145/800135.804401}, doi = {10.1145/800135.804401}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Thompson79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BentleyKST78, author = {Jon Louis Bentley and H. T. Kung and Mario Schkolnick and Clark D. Thompson}, title = {On the Average Number of Maxima in a Set of Vectors and Applications}, journal = {J. {ACM}}, volume = {25}, number = {4}, pages = {536--543}, year = {1978}, url = {https://doi.org/10.1145/322092.322095}, doi = {10.1145/322092.322095}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/BentleyKST78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Thompson78, author = {Clark D. Thompson}, title = {Generalized Connection Networks for Parallel Processor Intercommunication}, journal = {{IEEE} Trans. Computers}, volume = {27}, number = {12}, pages = {1119--1125}, year = {1978}, url = {https://doi.org/10.1109/TC.1978.1675014}, doi = {10.1109/TC.1978.1675014}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Thompson78.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ThompsonK77, author = {Clark D. Thompson and H. T. Kung}, title = {Sorting on a Mesh-Connected Parallel Computer}, journal = {Commun. {ACM}}, volume = {20}, number = {4}, pages = {263--271}, year = {1977}, url = {https://doi.org/10.1145/359461.359481}, doi = {10.1145/359461.359481}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/ThompsonK77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ThompsonK76, author = {Clark D. Thompson and H. T. Kung}, editor = {Ashok K. Chandra and Detlef Wotschke and Emily P. Friedman and Michael A. Harrison}, title = {Sorting on a Mesh-Connected Parallel Computer}, booktitle = {Proceedings of the 8th Annual {ACM} Symposium on Theory of Computing, May 3-5, 1976, Hershey, Pennsylvania, {USA}}, pages = {58--64}, publisher = {{ACM}}, year = {1976}, url = {https://doi.org/10.1145/800113.803632}, doi = {10.1145/800113.803632}, timestamp = {Tue, 28 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/ThompsonK76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.