Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Christopher Thompson
@article{DBLP:journals/corr/abs-2301-06799, author = {Md. Sadik Awal and Christopher Thompson and Md. Tauhidur Rahman}, title = {Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities}, journal = {CoRR}, volume = {abs/2301.06799}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.06799}, doi = {10.48550/ARXIV.2301.06799}, eprinttype = {arXiv}, eprint = {2301.06799}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-06799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/robotics/DworakowskiTPN21, author = {Daniel Dworakowski and Christopher Thompson and Michael Pham{-}Hung and Goldie Nejat}, title = {A Robot Architecture Using ContextSLAM to Find Products in Unknown Crowded Retail Environments}, journal = {Robotics}, volume = {10}, number = {4}, pages = {110}, year = {2021}, url = {https://doi.org/10.3390/robotics10040110}, doi = {10.3390/ROBOTICS10040110}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/robotics/DworakowskiTPN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jccee/GehlotZQT0U19, author = {Hemant Gehlot and Xianyuan Zhan and Xinwu Qian and Christopher Thompson and Milind Kulkarni and Satish V. Ukkusuri}, title = {{A-RESCUE} 2.0: {A} High-Fidelity, Parallel, Agent-Based Evacuation Simulator}, journal = {J. Comput. Civ. Eng.}, volume = {33}, number = {2}, year = {2019}, url = {https://doi.org/10.1061/(asce)cp.1943-5487.0000802}, doi = {10.1061/(ASCE)CP.1943-5487.0000802}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jccee/GehlotZQT0U19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ThompsonSSWSF19, author = {Christopher Thompson and Martin Shelton and Emily Stark and Max Walker and Emily Schechter and Adrienne Porter Felt}, editor = {Nadia Heninger and Patrick Traynor}, title = {The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {1715--1732}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/thompson}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ThompsonSSWSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aes/HackerDOMTRY17, author = {Thomas J. Hacker and Shirley Dyke and Ali Irmak Ozdagli and Gemez Marshall and Christopher Thompson and Brian Rohler and Chul Min Yeum}, title = {A Researcher-oriented Automated Data Ingestion Tool for rapid data Processing, Visualization and Preservation}, journal = {Adv. Eng. Softw.}, volume = {114}, pages = {134--143}, year = {2017}, url = {https://doi.org/10.1016/j.advengsoft.2017.06.019}, doi = {10.1016/J.ADVENGSOFT.2017.06.019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aes/HackerDOMTRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/KnorrT17, author = {Edwin M. Knorr and Christopher Thompson}, editor = {Michael E. Caspersen and Stephen H. Edwards and Tiffany Barnes and Daniel D. Garcia}, title = {In-Lab Programming Tests in a Data Structures Course in {C} for Non-Specialists}, booktitle = {Proceedings of the 2017 {ACM} {SIGCSE} Technical Symposium on Computer Science Education, {SIGCSE} 2017, Seattle, WA, USA, March 8-11, 2017}, pages = {339--344}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3017680.3017766}, doi = {10.1145/3017680.3017766}, timestamp = {Tue, 23 Mar 2021 10:54:19 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/KnorrT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wccce/KnorrT16, author = {Edwin M. Knorr and Christopher Thompson}, editor = {Surinder Dhanjal and Faheem Ahmed}, title = {Engagement and Sustainability in a Data Structures Course in {C} for Non-Specialists}, booktitle = {Proceedings of the 21st Western Canadian Conference on Computing Education, {WCCCE} '16, Kamloops, BC, Canada, May 6-7, 2016}, pages = {2:1--2:6}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2910925.2910936}, doi = {10.1145/2910925.2910936}, timestamp = {Tue, 06 Nov 2018 16:59:06 +0100}, biburl = {https://dblp.org/rec/conf/wccce/KnorrT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ThompsonIY16, author = {Christopher Thompson and Joshua Introne and Clint Young}, title = {Determining Health Utilities through Data Mining of Social Media}, journal = {CoRR}, volume = {abs/1608.03938}, year = {2016}, url = {http://arxiv.org/abs/1608.03938}, eprinttype = {arXiv}, eprint = {1608.03938}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ThompsonIY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/BeekmanT13, author = {Jethro Beekman and Christopher Thompson}, editor = {Jon Oberheide and William K. Robertson}, title = {Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android}, booktitle = {7th {USENIX} Workshop on Offensive Technologies, {WOOT} '13, Washington, D.C., USA, August 13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/woot13/workshop-program/presentation/beekman}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/BeekmanT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/GrassoMT00, author = {Antonietta Grasso and Jean{-}Luc Meunier and Christopher Thompson}, title = {Augmenting Recommender Systems by Embedding Interfaces into Practices}, booktitle = {33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, {USA}}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/HICSS.2000.926699}, doi = {10.1109/HICSS.2000.926699}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/GrassoMT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.