BibTeX records: Clark D. Thomborson

download as .bib file

@inproceedings{DBLP:conf/acisp/ThomborsonJ17,
  author       = {Clark D. Thomborson and
                  Marc Jeanmougin},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Stegogames},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {414--421},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_26},
  doi          = {10.1007/978-3-319-59870-3\_26},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ThomborsonJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/TuTT16,
  author       = {Yu{-}Cheng Tu and
                  Ewan D. Tempero and
                  Clark D. Thomborson},
  title        = {An experiment on the impact of transparency on the effectiveness of
                  requirements documents},
  journal      = {Empir. Softw. Eng.},
  volume       = {21},
  number       = {3},
  pages        = {1035--1066},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10664-015-9374-8},
  doi          = {10.1007/S10664-015-9374-8},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ese/TuTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Thomborson16,
  author       = {Clark D. Thomborson},
  title        = {Privacy patterns},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {656--663},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906953},
  doi          = {10.1109/PST.2016.7906953},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/Thomborson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Thomborson16,
  author       = {Clark D. Thomborson},
  title        = {Privacy Patterns},
  journal      = {CoRR},
  volume       = {abs/1612.01553},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.01553},
  eprinttype    = {arXiv},
  eprint       = {1612.01553},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Thomborson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KanzakiTMC15,
  author       = {Yuichiro Kanzaki and
                  Clark D. Thomborson and
                  Akito Monden and
                  Christian S. Collberg},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda and
                  Natalia Stakhanova},
  title        = {Pinpointing and Hiding Surprising Fragments in an Obfuscated Program},
  booktitle    = {Proceedings of the 5th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015},
  pages        = {8:1--8:9},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2843859.2843862},
  doi          = {10.1145/2843859.2843862},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KanzakiTMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Thomborson15,
  author       = {Clark D. Thomborson},
  title        = {Benchmarking Obfuscators of Functionality},
  journal      = {CoRR},
  volume       = {abs/1501.02885},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.02885},
  eprinttype    = {arXiv},
  eprint       = {1501.02885},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Thomborson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apres/TuTT14,
  author       = {Yu{-}Cheng Tu and
                  Ewan D. Tempero and
                  Clark D. Thomborson},
  editor       = {Didar Zowghi and
                  Zhi Jin},
  title        = {Evaluating Presentation of Requirements Documents: Results of an Experiment},
  booktitle    = {Requirements Engineering - First Asia Pacific Requirements Engineering
                  Symposium, {APRES} 2014, Auckland, New Zealand, April 28-29, 2014.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {432},
  pages        = {120--134},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43610-3\_10},
  doi          = {10.1007/978-3-662-43610-3\_10},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apres/TuTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEicci/JarupunpholT13,
  author       = {Pita Jarupunphol and
                  Clark D. Thomborson},
  title        = {The dhammic framework for understanding the cause of system project
                  failures from Buddhist insights},
  booktitle    = {{IEEE} 12th International Conference on Cognitive Informatics and
                  Cognitive Computing, ICCI*CC 2013, New York, NY, USA, July 16-18,
                  2013},
  pages        = {387--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCI-CC.2013.6622272},
  doi          = {10.1109/ICCI-CC.2013.6622272},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEicci/JarupunpholT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2013,
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol138.html},
  isbn         = {978-1-921770-23-4},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/YuWT0LV12,
  author       = {Zhiwei Yu and
                  Chaokun Wang and
                  Clark D. Thomborson and
                  Jianmin Wang and
                  Shiguo Lian and
                  Athanasios V. Vasilakos},
  title        = {Multimedia Applications and Security in MapReduce: Opportunities and
                  Challenges},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {17},
  pages        = {2083--2101},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1846},
  doi          = {10.1002/CPE.1846},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/YuWT0LV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/YuWTWLV12,
  author       = {Zhiwei Yu and
                  Chaokun Wang and
                  Clark D. Thomborson and
                  Jianmin Wang and
                  Shiguo Lian and
                  Athanasios V. Vasilakos},
  title        = {A novel watermarking method for software protection in the cloud},
  journal      = {Softw. Pract. Exp.},
  volume       = {42},
  number       = {4},
  pages        = {409--430},
  year         = {2012},
  url          = {https://doi.org/10.1002/spe.1088},
  doi          = {10.1002/SPE.1088},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/YuWTWLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icistm/Thomborson12,
  author       = {Clark D. Thomborson},
  editor       = {Sumeet Dua and
                  Aryya Gangopadhyay and
                  Parimala Thulasiraman and
                  Umberto Straccia and
                  Michael A. Shepherd and
                  Benno Stein},
  title        = {The Art and Science of Obfuscation},
  booktitle    = {Information Systems, Technology and Management - 6th International
                  Conference, {ICISTM} 2012, Grenoble, France, March 28-30, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {285},
  pages        = {445--450},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29166-1\_43},
  doi          = {10.1007/978-3-642-29166-1\_43},
  timestamp    = {Wed, 30 Oct 2019 15:50:13 +0100},
  biburl       = {https://dblp.org/rec/conf/icistm/Thomborson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/YuTWWL12,
  author       = {Zhiwei Yu and
                  Clark D. Thomborson and
                  Chaokun Wang and
                  Jianmin Wang and
                  Rui Li},
  editor       = {Waleed W. Smari and
                  Vesna Zeljkovic},
  title        = {A cloud-based watermarking method for health data security},
  booktitle    = {2012 International Conference on High Performance Computing {\&}
                  Simulation, {HPCS} 2012, Madrid, Spain, July 2-6, 2012},
  pages        = {642--647},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/HPCSim.2012.6266986},
  doi          = {10.1109/HPCSIM.2012.6266986},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/YuTWWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2012,
  editor       = {Josef Pieprzyk and
                  Clark D. Thomborson},
  title        = {Tenth Australasian Information Security Conference, {AISC} 2012, Melbourne,
                  Australia, January 2012},
  series       = {{CRPIT}},
  volume       = {125},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/Vol125.html},
  isbn         = {978-1-921770-06-7},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/TuTT11,
  author       = {Yu{-}Cheng Tu and
                  Clark D. Thomborson and
                  Ewan D. Tempero},
  editor       = {Tran Dan Thu and
                  Karl R. P. H. Leung},
  title        = {Illusions and Perceptions of Transparency in Software Engineering},
  booktitle    = {18th Asia Pacific Software Engineering Conference, {APSEC} 2011, Ho
                  Chi Minh, Vietnam, December 5-8, 2011},
  pages        = {365--372},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/APSEC.2011.42},
  doi          = {10.1109/APSEC.2011.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/TuTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Thomborson10,
  author       = {Clark D. Thomborson},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Axiomatic and Behavioural Trust},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {352--366},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_26},
  doi          = {10.1007/978-3-642-13869-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Thomborson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/icsec/Thomborson10,
  author       = {Clark D. Thomborson},
  editor       = {Peter P. Stavroulakis and
                  Mark Stamp},
  title        = {A Framework for System Security},
  booktitle    = {Handbook of Information and Communication Security},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-04117-4\_1},
  doi          = {10.1007/978-3-642-04117-4\_1},
  timestamp    = {Mon, 13 Mar 2023 20:54:16 +0100},
  biburl       = {https://dblp.org/rec/reference/icsec/Thomborson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/Thomborson09,
  author       = {Clark D. Thomborson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Foundation for Systems Security},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {3},
  publisher    = {Australian Computer Society},
  year         = {2009},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/Thomborson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/NotoatmodjoT09,
  author       = {Gilbert Notoatmodjo and
                  Clark D. Thomborson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Passwords and Perceptions},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {71--78},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Notoatmodjo.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/NotoatmodjoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/TuT09,
  author       = {Yu{-}Cheng Tu and
                  Clark D. Thomborson},
  editor       = {Ljiljana Brankovic and
                  Willy Susilo},
  title        = {Preliminary Security Specification for New Zealand's igovt System},
  booktitle    = {Seventh Australasian Information Security Conference, {AISC} 2009,
                  Wellington, New Zealand, January 2009},
  series       = {{CRPIT}},
  volume       = {98},
  pages        = {79--88},
  publisher    = {Australian Computer Society},
  year         = {2009},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Tu.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/TuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/ZhangWTWC09,
  author       = {Changjiang Zhang and
                  Jianmin Wang and
                  Clark D. Thomborson and
                  Chaokun Wang and
                  Christian S. Collberg},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {A semi-dynamic multiple watermarking schemefor java applications},
  booktitle    = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  pages        = {59--72},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655048.1655058},
  doi          = {10.1145/1655048.1655058},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/ZhangWTWC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/Thomborson08,
  author       = {Clark D. Thomborson},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {A Model for New Zealand's Identity Verification Service},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_7},
  doi          = {10.1007/978-3-540-68979-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/Thomborson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/CollbergTT07,
  author       = {Christian S. Collberg and
                  Clark D. Thomborson and
                  Gregg M. Townsend},
  title        = {Dynamic graph-based software fingerprinting},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {29},
  number       = {6},
  pages        = {35},
  year         = {2007},
  url          = {https://doi.org/10.1145/1286821.1286826},
  doi          = {10.1145/1286821.1286826},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/CollbergTT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/DrapeMT07,
  author       = {Stephen Drape and
                  Anirban Majumdar and
                  Clark D. Thomborson},
  title        = {Slicing Aided Design of Obfuscating Transforms},
  booktitle    = {6th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia},
  pages        = {1019--1024},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIS.2007.167},
  doi          = {10.1109/ICIS.2007.167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/DrapeMT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MajumdarDT07,
  author       = {Anirban Majumdar and
                  Stephen Drape and
                  Clark D. Thomborson},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Metrics-based Evaluation of Slicing Obfuscations},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {472--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.50},
  doi          = {10.1109/IAS.2007.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MajumdarDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MajumdarDT07,
  author       = {Anirban Majumdar and
                  Stephen Drape and
                  Clark D. Thomborson},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Slicing obfuscations: design, correctness, and evaluation},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314290},
  doi          = {10.1145/1314276.1314290},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MajumdarDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DrapeTM07,
  author       = {Stephen Drape and
                  Clark D. Thomborson and
                  Anirban Majumdar},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Specifying Imperative Data Obfuscations},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_20},
  doi          = {10.1007/978-3-540-75496-1\_20},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DrapeTM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/MajumdarT06,
  author       = {Anirban Majumdar and
                  Clark D. Thomborson},
  editor       = {Vladimir Estivill{-}Castro and
                  Gillian Dobbie},
  title        = {Manufacturing opaque predicates in distributed systems for code obfuscation},
  booktitle    = {Computer Science 2006, Twenty-Nineth Australasian Computer Science
                  Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19
                  2006},
  series       = {{CRPIT}},
  volume       = {48},
  pages        = {187--196},
  publisher    = {Australian Computer Society},
  year         = {2006},
  url          = {https://dl.acm.org/citation.cfm?id=1151721},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/MajumdarT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BarrettT06,
  author       = {Matt Barrett and
                  Clark D. Thomborson},
  title        = {Frameworks Built on the Trusted Platform Module},
  booktitle    = {30th Annual International Computer Software and Applications Conference,
                  {COMPSAC} 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume
                  2},
  pages        = {59--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/COMPSAC.2006.132},
  doi          = {10.1109/COMPSAC.2006.132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/BarrettT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grc/ZhuTW06,
  author       = {William Zhu and
                  Clark D. Thomborson and
                  Fei{-}Yue Wang},
  title        = {Obfuscate arrays by homomorphic functions},
  booktitle    = {2006 {IEEE} International Conference on Granular Computing, GrC 2006,
                  Atlanta, Georgia, USA, May 10-12, 2006},
  pages        = {770--773},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GRC.2006.1635914},
  doi          = {10.1109/GRC.2006.1635914},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grc/ZhuTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MajumdarTD06,
  author       = {Anirban Majumdar and
                  Clark D. Thomborson and
                  Stephen Drape},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {A Survey of Control-Flow Obfuscations},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {353--356},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_26},
  doi          = {10.1007/11961635\_26},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MajumdarTD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/ZhuT06,
  author       = {William Zhu and
                  Clark D. Thomborson},
  editor       = {Sviatoslav Voloshynovskiy and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Extraction in software watermarking},
  booktitle    = {Proceedings of the 8th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2006, Geneva, Switzerland, September 26-27, 2006},
  pages        = {175--181},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161366.1161398},
  doi          = {10.1145/1161366.1161398},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/ZhuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisi/ZhuTW06,
  author       = {William Zhu and
                  Clark D. Thomborson and
                  Fei{-}Yue Wang},
  editor       = {Hsinchun Chen and
                  Fei{-}Yue Wang and
                  Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang},
  title        = {Applications of Homomorphic Functions to Software Obfuscation},
  booktitle    = {Intelligence and Security Informatics, International Workshop, {WISI}
                  2006, Singapore, April 9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3917},
  pages        = {152--153},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734628\_18},
  doi          = {10.1007/11734628\_18},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisi/ZhuTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MondenMT05,
  author       = {Akito Monden and
                  Antoine Monsifrot and
                  Clark D. Thomborson},
  title        = {Tamper-Resistant Software System Based on a Finite State Machine},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {112--122},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_112\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MondenMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drmtics/ZhuT05,
  author       = {William Zhu and
                  Clark D. Thomborson},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Algorithms to Watermark Software Through Register Allocation},
  booktitle    = {Digital Rights Management: Technologies, Issues, Challenges and Systems,
                  First International Conference, {DRMTICS} 2005, Sydney, Australia,
                  October 31 - November 2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3919},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11787952\_14},
  doi          = {10.1007/11787952\_14},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drmtics/ZhuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhuTW05,
  author       = {William Zhu and
                  Clark D. Thomborson and
                  Fei{-}Yue Wang},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {A Survey of Software Watermarking},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {454--458},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_42},
  doi          = {10.1007/11427995\_42},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/ZhuTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhuT05,
  author       = {William Zhu and
                  Clark D. Thomborson},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {On the {QP} Algorithm in Software Watermarking},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {646--647},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_89},
  doi          = {10.1007/11427995\_89},
  timestamp    = {Fri, 14 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/ZhuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MajumdarT05,
  author       = {Anirban Majumdar and
                  Clark D. Thomborson},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {On the Use of Opaque Predicates in Mobile Agent Code Obfuscation},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {648--649},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_90},
  doi          = {10.1007/11427995\_90},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/MajumdarT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/MajumdarT05,
  author       = {Anirban Majumdar and
                  Clark D. Thomborson},
  editor       = {Rajiv Khosla and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Securing Mobile Agents Control Flow Using Opaque Predicates},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 9th
                  International Conference, {KES} 2005, Melbourne, Australia, September
                  14-16, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3683},
  pages        = {1065--1071},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11553939\_149},
  doi          = {10.1007/11553939\_149},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/MajumdarT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/MondenMT04,
  author       = {Akito Monden and
                  Antoine Monsifrot and
                  Clark D. Thomborson},
  editor       = {James M. Hogan and
                  Paul Montague and
                  Martin K. Purvis and
                  Chris Steketee},
  title        = {A Framework for Obfuscated Interpretation},
  booktitle    = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information
                  Security Workshop (AISW2004), the Australasian Workshop on Data Mining
                  and Web Intelligence (DMWI2004), and the Australasian Workshop on
                  Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand,
                  January 2004},
  series       = {{CRPIT}},
  volume       = {32},
  pages        = {7--16},
  publisher    = {Australian Computer Society},
  year         = {2004},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Monden.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/MondenMT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/ThomborsonNSH04,
  author       = {Clark D. Thomborson and
                  Jasvir Nagra and
                  Ram Somaraju and
                  Charles He},
  editor       = {James M. Hogan and
                  Paul Montague and
                  Martin K. Purvis and
                  Chris Steketee},
  title        = {Tamper-proo ng Software Watermarks},
  booktitle    = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information
                  Security Workshop (AISW2004), the Australasian Workshop on Data Mining
                  and Web Intelligence (DMWI2004), and the Australasian Workshop on
                  Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand,
                  January 2004},
  series       = {{CRPIT}},
  volume       = {32},
  pages        = {27--36},
  publisher    = {Australian Computer Society},
  year         = {2004},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Thomborson.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/ThomborsonNSH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11/ColarikTJ04,
  author       = {Andrew M. Colarik and
                  Clark D. Thomborson and
                  Lech J. Janczewski},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Update/Patch Management Systems: {A} Protocol Taxonomy with Security
                  Implications},
  booktitle    = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  pages        = {67--80},
  publisher    = {Kluwer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8145-6\_5},
  doi          = {10.1007/1-4020-8145-6\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11/ColarikTJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NagraT04,
  author       = {Jasvir Nagra and
                  Clark D. Thomborson},
  editor       = {Jessica J. Fridrich},
  title        = {Threading Software Watermarks},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_15},
  doi          = {10.1007/978-3-540-30114-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NagraT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CarterFT03,
  author       = {Larry Carter and
                  Jeanne Ferrante and
                  Clark D. Thomborson},
  editor       = {Alex Aiken and
                  Greg Morrisett},
  title        = {Folklore confirmed: reducible flow graphs are exponentially larger},
  booktitle    = {Conference Record of {POPL} 2003: The 30th {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, New Orleans, Louisisana, USA,
                  January 15-17, 2003},
  pages        = {106--114},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/604131.604141},
  doi          = {10.1145/604131.604141},
  timestamp    = {Fri, 25 Jun 2021 17:17:37 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/CarterFT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wg/CollbergKCT03,
  author       = {Christian S. Collberg and
                  Stephen G. Kobourov and
                  Edward Carter and
                  Clark D. Thomborson},
  editor       = {Hans L. Bodlaender},
  title        = {Graph-Based Approaches to Software Watermarking},
  booktitle    = {Graph-Theoretic Concepts in Computer Science, 29th International Workshop,
                  {WG} 2003, Elspeet, The Netherlands, June 19-21, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2880},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39890-5\_14},
  doi          = {10.1007/978-3-540-39890-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wg/CollbergKCT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/CollbergT02,
  author       = {Christian S. Collberg and
                  Clark D. Thomborson},
  title        = {Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software
                  Protection},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {28},
  number       = {8},
  pages        = {735--746},
  year         = {2002},
  url          = {https://doi.org/10.1109/TSE.2002.1027797},
  doi          = {10.1109/TSE.2002.1027797},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/CollbergT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/NagraTC02,
  author       = {Jasvir Nagra and
                  Clark D. Thomborson and
                  Christian S. Collberg},
  editor       = {Michael J. Oudshoorn},
  title        = {A Functional Taxonomy for Software Watermarking},
  booktitle    = {Computer Science 2002, Twenty-Fifth Australasian Computer Science
                  Conference (ACSC2002), Monash University, Melbourne, Victoria, Australia,
                  January/February 2002},
  series       = {{CRPIT}},
  volume       = {4},
  pages        = {177--186},
  publisher    = {Australian Computer Society},
  year         = {2002},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV4Nagra.html},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsc/NagraTC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CollbergT99,
  author       = {Christian S. Collberg and
                  Clark D. Thomborson},
  editor       = {Andrew W. Appel and
                  Alex Aiken},
  title        = {Software Watermarking: Models and Dynamic Embeddings},
  booktitle    = {{POPL} '99, Proceedings of the 26th {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, San Antonio, TX, USA, January
                  20-22, 1999},
  pages        = {311--324},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/292540.292569},
  doi          = {10.1145/292540.292569},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/CollbergT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Thomborson98,
  author       = {Clark D. Thomborson},
  title        = {The Economics of Large-Memory Computations},
  journal      = {Inf. Process. Lett.},
  volume       = {66},
  number       = {5},
  pages        = {263--268},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00063-5},
  doi          = {10.1016/S0020-0190(98)00063-5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Thomborson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/LiT98,
  author       = {Enyou Li and
                  Clark D. Thomborson},
  title        = {Data cache parameter measurements},
  booktitle    = {International Conference on Computer Design: {VLSI} in Computers and
                  Processors, {ICCD} 1998, Proceedings, 5-7 October, 1998, Austin, TX,
                  {USA}},
  pages        = {376--383},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICCD.1998.727077},
  doi          = {10.1109/ICCD.1998.727077},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/LiT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccl/CollbergTL98,
  author       = {Christian S. Collberg and
                  Clark D. Thomborson and
                  Douglas Low},
  title        = {Breaking Abstractions and Unstructuring Data Structures},
  booktitle    = {Proceedings of the 1998 International Conference on Computer Languages,
                  {ICCL} 1998, Chicago, IL, USA, May 14-16, 1998},
  pages        = {28--38},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICCL.1998.674154},
  doi          = {10.1109/ICCL.1998.674154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccl/CollbergTL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/CollbergTL98,
  author       = {Christian S. Collberg and
                  Clark D. Thomborson and
                  Douglas Low},
  editor       = {David B. MacQueen and
                  Luca Cardelli},
  title        = {Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs},
  booktitle    = {{POPL} '98, Proceedings of the 25th {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, San Diego, CA, USA, January
                  19-21, 1998},
  pages        = {184--196},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/268946.268962},
  doi          = {10.1145/268946.268962},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/CollbergTL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rsa/DeneenST94,
  author       = {Linda L. Deneen and
                  Gary M. Shute and
                  Clark D. Thomborson},
  title        = {A Probaby Fast, Provably Optimal Algorithm for Rectilinear Steiner
                  Trees},
  journal      = {Random Struct. Algorithms},
  volume       = {5},
  number       = {4},
  pages        = {535--558},
  year         = {1994},
  url          = {https://doi.org/10.1002/rsa.3240050405},
  doi          = {10.1002/RSA.3240050405},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rsa/DeneenST94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Thomborson93,
  author       = {Clark D. Thomborson},
  title        = {Does Your Workstation Computation Belong on a Vector Supercomputer?},
  journal      = {Commun. {ACM}},
  volume       = {36},
  number       = {11},
  pages        = {41--49},
  year         = {1993},
  url          = {https://doi.org/10.1145/163359.163363},
  doi          = {10.1145/163359.163363},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Thomborson93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/Thomborson93,
  author       = {Clark D. Thomborson},
  title        = {Why are fewer females obtaining bachelor's degrees in computer science?},
  journal      = {{SIGACT} News},
  volume       = {24},
  number       = {3},
  pages        = {114--116},
  year         = {1993},
  url          = {https://doi.org/10.1145/166589.166593},
  doi          = {10.1145/166589.166593},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/Thomborson93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/ThomborsonS93,
  author       = {Clark D. Thomborson and
                  Yi Sun},
  title        = {Optimizing carry lookahead adders for semicustom {CMOS}},
  booktitle    = {Third Great Lakes Symposium on Design Automation of High Performance
                  {VLSI} Systems, Kalamazoo, MI, USA, March 5-6, 1993},
  pages        = {119--122},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/GLSV.1993.224466},
  doi          = {10.1109/GLSV.1993.224466},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/ThomborsonS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/micro/Thomborson92,
  author       = {Clark D. Thomborson},
  title        = {The V.42bis standard for data-compressing modems},
  journal      = {{IEEE} Micro},
  volume       = {12},
  number       = {5},
  pages        = {41--53},
  year         = {1992},
  url          = {https://doi.org/10.1109/40.166712},
  doi          = {10.1109/40.166712},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/micro/Thomborson92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ChanSTO92,
  author       = {Pak K. Chan and
                  Martine D. F. Schlag and
                  Clark D. Thomborson and
                  Vojin G. Oklobdzija},
  title        = {Delay Optimization of Carry-Skip Adders and Block Carry-Lookahead
                  Adders Using Multidimensional Dynamic Programming},
  journal      = {{IEEE} Trans. Computers},
  volume       = {41},
  number       = {8},
  pages        = {920--930},
  year         = {1992},
  url          = {https://doi.org/10.1109/12.156534},
  doi          = {10.1109/12.156534},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ChanSTO92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/ThomborsonAC92,
  author       = {Clark D. Thomborson and
                  Bowen Alpern and
                  Larry Carter},
  editor       = {Nathaniel Dean and
                  Gregory E. Shannon},
  title        = {Rectilinear Steiner Tree Minimization on a Workstation},
  booktitle    = {Computational Support for Discrete Mathematics, Proceedings of a {DIMACS}
                  Workshop, Piscataway, New Jersey, USA, March 12-14, 1992},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {15},
  pages        = {119--136},
  publisher    = {{DIMACS/AMS}},
  year         = {1992},
  url          = {https://doi.org/10.1090/dimacs/015/10},
  doi          = {10.1090/DIMACS/015/10},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/ThomborsonAC92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/RaghavanT91,
  author       = {Prabhakar Raghavan and
                  Clark D. Thompson},
  title        = {Multiterminal Global Routing: {A} Deterministic Approximation Scheme},
  journal      = {Algorithmica},
  volume       = {6},
  number       = {1},
  pages        = {73--82},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF01759035},
  doi          = {10.1007/BF01759035},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/RaghavanT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/ShuteDT91,
  author       = {Gary M. Shute and
                  Linda L. Deneen and
                  Clark D. Thomborson},
  title        = {An O(n log n) Plane-Sweep Algorithm for L{\_}1 and L{\_}{\textbackslash}infty
                  Delaunay Triangulations},
  journal      = {Algorithmica},
  volume       = {6},
  number       = {2},
  pages        = {207--221},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF01759042},
  doi          = {10.1007/BF01759042},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/ShuteDT91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigarch/ThomborsonW91,
  author       = {Clark D. Thomborson and
                  Belle W. Y. Wei},
  title        = {Systolic implementations of a move-to-front text compressor},
  journal      = {{SIGARCH} Comput. Archit. News},
  volume       = {19},
  number       = {1},
  pages        = {53--60},
  year         = {1991},
  url          = {https://doi.org/10.1145/121956.121962},
  doi          = {10.1145/121956.121962},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigarch/ThomborsonW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/ChanSTO91,
  author       = {Pak K. Chan and
                  Martine D. F. Schlag and
                  Clark D. Thomborson and
                  Vojin G. Oklobdzija},
  title        = {Delay optimization of carry-skip adders and block carry-lookahead
                  adders},
  booktitle    = {10th {IEEE} Symposium on Computer Arithmetic, {ARITH} 1991, Grenoble,
                  France, June 26-28, 1991},
  pages        = {154--164},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/ARITH.1991.145552},
  doi          = {10.1109/ARITH.1991.145552},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/arith/ChanSTO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WeiT90,
  author       = {Belle W. Y. Wei and
                  Clark D. Thompson},
  title        = {Area-Time Optimal Adder Design},
  journal      = {{IEEE} Trans. Computers},
  volume       = {39},
  number       = {5},
  pages        = {666--675},
  year         = {1990},
  url          = {https://doi.org/10.1109/12.53579},
  doi          = {10.1109/12.53579},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WeiT90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KaklamanisKLMRRTT90,
  author       = {Christos Kaklamanis and
                  Anna R. Karlin and
                  Frank Thomson Leighton and
                  Victor Milenkovic and
                  Prabhakar Raghavan and
                  Satish Rao and
                  Clark D. Thomborson and
                  A. Tsantilas},
  title        = {Asymptotically Tight Bounds for Computing with Faulty Arrays of Processors
                  (Extended Abstract)},
  booktitle    = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
                  Missouri, USA, October 22-24, 1990, Volume {I}},
  pages        = {285--296},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/FSCS.1990.89547},
  doi          = {10.1109/FSCS.1990.89547},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KaklamanisKLMRRTT90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/RogersT89,
  author       = {Clyde Rogers and
                  Clark D. Thomborson},
  title        = {Enhancements to Ziv-Lempel data compression},
  booktitle    = {Proceedings of the 13th Annual International Computer Software and
                  Applications Conference, {COMPSAC} 1989, Orlando, FL, USA, 20-22 September,
                  1989},
  pages        = {324--330},
  publisher    = {{IEEE}},
  year         = {1989},
  url          = {https://doi.org/10.1109/CMPSAC.1989.65102},
  doi          = {10.1109/CMPSAC.1989.65102},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/RogersT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaa/ThomborsonW89,
  author       = {Clark D. Thomborson and
                  Belle W. Y. Wei},
  editor       = {Frank Thomson Leighton},
  title        = {Systolic Implementations of a Move-to-Front Text Compressor},
  booktitle    = {Proceedings of the {ACM} Symposium on Parallel Algorithms and Architectures,
                  {SPAA} '89, Santa Fe, New Mexico, USA, June 18-21, 1989},
  pages        = {283--290},
  publisher    = {{ACM}},
  year         = {1989},
  url          = {https://doi.org/10.1145/72935.72965},
  doi          = {10.1145/72935.72965},
  timestamp    = {Wed, 21 Nov 2018 12:27:44 +0100},
  biburl       = {https://dblp.org/rec/conf/spaa/ThomborsonW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/KarpLRTVV87,
  author       = {Richard M. Karp and
                  Frank Thomson Leighton and
                  Ronald L. Rivest and
                  Clark D. Thompson and
                  Umesh V. Vazirani and
                  Vijay V. Vazirani},
  title        = {Global Wire Routing in Two-Dimensional Arrays},
  journal      = {Algorithmica},
  volume       = {2},
  pages        = {113--129},
  year         = {1987},
  url          = {https://doi.org/10.1007/BF01840353},
  doi          = {10.1007/BF01840353},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/KarpLRTVV87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/DurisSTV87,
  author       = {Pavol Duris and
                  Ondrej S{\'{y}}kora and
                  Clark D. Thompson and
                  Imrich Vrto},
  title        = {A Minimum-Area Circuit for l-Selection},
  journal      = {Algorithmica},
  volume       = {2},
  pages        = {251--265},
  year         = {1987},
  url          = {https://doi.org/10.1007/BF01840362},
  doi          = {10.1007/BF01840362},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/DurisSTV87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorica/RaghavanT87,
  author       = {Prabhakar Raghavan and
                  Clark D. Thompson},
  title        = {Randomized rounding: a technique for provably good algorithms and
                  algorithmic proofs},
  journal      = {Comb.},
  volume       = {7},
  number       = {4},
  pages        = {365--374},
  year         = {1987},
  url          = {https://doi.org/10.1007/BF02579324},
  doi          = {10.1007/BF02579324},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorica/RaghavanT87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paa/ThomborsonDS87,
  author       = {Clark D. Thomborson and
                  Linda L. Deneen and
                  Gary M. Shute},
  editor       = {Andreas Alexander Albrecht and
                  Hermann Jung and
                  Kurt Mehlhorn},
  title        = {Computing a Rectilinear Steiner Minimal Tree in n\({}^{\mbox{O(sqrt(n))}}\)
                  Time},
  booktitle    = {Parallel Algorithms and Architectures, International Workshop, Suhl,
                  GDR, May 25-30, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {269},
  pages        = {176--183},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-18099-0\_44},
  doi          = {10.1007/3-540-18099-0\_44},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/paa/ThomborsonDS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Thompson86,
  author       = {Clark D. Thompson},
  title        = {Military Direction of Academic {CS} Research (Viewpoint)},
  journal      = {Commun. {ACM}},
  volume       = {29},
  number       = {7},
  pages        = {583--585},
  year         = {1986},
  url          = {https://doi.org/10.1145/6138.6139},
  doi          = {10.1145/6138.6139},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Thompson86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/NgTR86,
  author       = {Antony P.{-}C. Ng and
                  Clark D. Thompson and
                  Prabhakar Raghavan},
  editor       = {Don Thomas},
  title        = {A language for describing rectilinear Steiner tree configurations},
  booktitle    = {Proceedings of the 23rd {ACM/IEEE} Design Automation Conference. Las
                  Vegas, NV, USA, June, 1986},
  pages        = {659--662},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1986},
  url          = {https://doi.org/10.1145/318013.318132},
  doi          = {10.1145/318013.318132},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/NgTR86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Thompson85,
  author       = {Clark D. Thompson},
  title        = {{VLSI} Design With Multiple Active Layers},
  journal      = {Inf. Process. Lett.},
  volume       = {21},
  number       = {3},
  pages        = {109--111},
  year         = {1985},
  url          = {https://doi.org/10.1016/0020-0190(85)90013-4},
  doi          = {10.1016/0020-0190(85)90013-4},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Thompson85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DurisSVT85,
  author       = {Pavol Duris and
                  Ondrej S{\'{y}}kora and
                  Imrich Vrto and
                  Clark D. Thompson},
  title        = {Tight Chip Area Lower Bounds for Discrete Fourier and Walsh-Hadamard
                  Transformations},
  journal      = {Inf. Process. Lett.},
  volume       = {21},
  number       = {5},
  pages        = {245--247},
  year         = {1985},
  url          = {https://doi.org/10.1016/0020-0190(85)90092-4},
  doi          = {10.1016/0020-0190(85)90092-4},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DurisSVT85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/RaghavanT85,
  author       = {Prabhakar Raghavan and
                  Clark D. Thompson},
  editor       = {Robert Sedgewick},
  title        = {Provably Good Routing in Graphs: Regular Arrays},
  booktitle    = {Proceedings of the 17th Annual {ACM} Symposium on Theory of Computing,
                  May 6-8, 1985, Providence, Rhode Island, {USA}},
  pages        = {79--87},
  publisher    = {{ACM}},
  year         = {1985},
  url          = {https://doi.org/10.1145/22145.22154},
  doi          = {10.1145/22145.22154},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/RaghavanT85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/CareyT84,
  author       = {Michael J. Carey and
                  Clark D. Thompson},
  title        = {An Efficient Implementation of Search Trees on (\emph{lg N} + 1) Processors},
  journal      = {{IEEE} Trans. Computers},
  volume       = {33},
  number       = {11},
  pages        = {1038--1041},
  year         = {1984},
  url          = {https://doi.org/10.1109/TC.1984.1676379},
  doi          = {10.1109/TC.1984.1676379},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/CareyT84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Thompson83,
  author       = {Clark D. Thompson},
  title        = {Fourier Transforms in {VLSI}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {32},
  number       = {11},
  pages        = {1047--1057},
  year         = {1983},
  url          = {https://doi.org/10.1109/TC.1983.1676155},
  doi          = {10.1109/TC.1983.1676155},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Thompson83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Thompson83a,
  author       = {Clark D. Thompson},
  title        = {The {VLSI} Complexity of Sorting},
  journal      = {{IEEE} Trans. Computers},
  volume       = {32},
  number       = {12},
  pages        = {1171--1184},
  year         = {1983},
  url          = {https://doi.org/10.1109/TC.1983.1676178},
  doi          = {10.1109/TC.1983.1676178},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Thompson83a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KarpLRTVV83,
  author       = {Richard M. Karp and
                  Frank Thomson Leighton and
                  Ronald L. Rivest and
                  Clark D. Thompson and
                  Umesh V. Vazirani and
                  Vijay V. Vazirani},
  title        = {Global Wire Routing in Two-Dimensional Arrays (Extended Abstract)},
  booktitle    = {24th Annual Symposium on Foundations of Computer Science, Tucson,
                  Arizona, USA, 7-9 November 1983},
  pages        = {453--459},
  publisher    = {{IEEE} Computer Society},
  year         = {1983},
  url          = {https://doi.org/10.1109/SFCS.1983.23},
  doi          = {10.1109/SFCS.1983.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KarpLRTVV83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wg/Thompson83,
  author       = {Clark D. Thomborson},
  editor       = {Manfred Nagl and
                  J{\"{u}}rgen Perl},
  title        = {On the Energy-Time-Area Cost of a Memory Access},
  booktitle    = {Proceedings of the {WG} '83, International Workshop on Graphtheoretic
                  Concepts in Computer Science, June 16-18, 1983, Haus Ohrbeck, near
                  Osnabr{\"{u}}ck, Germany},
  pages        = {354--369},
  publisher    = {Universit{\"{a}}tsverlag Rudolf Trauner, Linz},
  year         = {1983},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wg/Thompson83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Thompson18,
  author       = {Clark D. Thomborson},
  title        = {A Complexity Theory for {VLSI}},
  school       = {Carnegie Mellon University, {USA}},
  year         = {1980},
  url          = {https://doi.org/10.1184/r1/6714269.v1},
  doi          = {10.1184/R1/6714269.V1},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Thompson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Thompson79,
  author       = {Clark D. Thompson},
  editor       = {Michael J. Fischer and
                  Richard A. DeMillo and
                  Nancy A. Lynch and
                  Walter A. Burkhard and
                  Alfred V. Aho},
  title        = {Area-Time Complexity for {VLSI}},
  booktitle    = {Proceedings of the 11h Annual {ACM} Symposium on Theory of Computing,
                  April 30 - May 2, 1979, Atlanta, Georgia, {USA}},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {1979},
  url          = {https://doi.org/10.1145/800135.804401},
  doi          = {10.1145/800135.804401},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Thompson79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/BentleyKST78,
  author       = {Jon Louis Bentley and
                  H. T. Kung and
                  Mario Schkolnick and
                  Clark D. Thompson},
  title        = {On the Average Number of Maxima in a Set of Vectors and Applications},
  journal      = {J. {ACM}},
  volume       = {25},
  number       = {4},
  pages        = {536--543},
  year         = {1978},
  url          = {https://doi.org/10.1145/322092.322095},
  doi          = {10.1145/322092.322095},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/BentleyKST78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Thompson78,
  author       = {Clark D. Thompson},
  title        = {Generalized Connection Networks for Parallel Processor Intercommunication},
  journal      = {{IEEE} Trans. Computers},
  volume       = {27},
  number       = {12},
  pages        = {1119--1125},
  year         = {1978},
  url          = {https://doi.org/10.1109/TC.1978.1675014},
  doi          = {10.1109/TC.1978.1675014},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Thompson78.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/ThompsonK77,
  author       = {Clark D. Thompson and
                  H. T. Kung},
  title        = {Sorting on a Mesh-Connected Parallel Computer},
  journal      = {Commun. {ACM}},
  volume       = {20},
  number       = {4},
  pages        = {263--271},
  year         = {1977},
  url          = {https://doi.org/10.1145/359461.359481},
  doi          = {10.1145/359461.359481},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/ThompsonK77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ThompsonK76,
  author       = {Clark D. Thompson and
                  H. T. Kung},
  editor       = {Ashok K. Chandra and
                  Detlef Wotschke and
                  Emily P. Friedman and
                  Michael A. Harrison},
  title        = {Sorting on a Mesh-Connected Parallel Computer},
  booktitle    = {Proceedings of the 8th Annual {ACM} Symposium on Theory of Computing,
                  May 3-5, 1976, Hershey, Pennsylvania, {USA}},
  pages        = {58--64},
  publisher    = {{ACM}},
  year         = {1976},
  url          = {https://doi.org/10.1145/800113.803632},
  doi          = {10.1145/800113.803632},
  timestamp    = {Tue, 28 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/ThompsonK76.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics