Thomas, Dean
123  Ergebnisse:
Personensuche X
?
1

A Hierarchical Classification Method Used to Classify Lives..:

, In: Lecture Notes in Computer Science; Multi-disciplinary Trends in Artificial Intelligence,
Suparwito, Hari ; Wong, Kok Wai ; Xie, Hong.. - p. 204-215 , 2019
 
?
2

QCDVis : a tool for the visualisation of quantum chromod..:

, In: Proceedings of the 33rd Spring Conference on Computer Graphics,
 
?
3

The Irregulars: Third-Party Cyber Actors and Digital Resist..:

, In: 2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon),
Smith, Margaret W. ; Dean, Thomas - p. 103-119 , 2023
 
?
4

Input Output Grammar Coverage in Fuzzing:

, In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM),
Fryer, Andrew ; Dean, Thomas ; Lachine, Brian - p. 937-943 , 2023
 
?
5

Advances in stand management and regeneration:

, In: Achieving sustainable management of boreal and temperate forests; Burleigh Dodds Series in Agricultural Science,
 
?
6

A Constraint-based intrusion detection system:

, In: Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems,
Hasan, MD Siam ; Dean, Thomas ; Imam, Fahim T.... - p. 1-10 , 2017
 
?
7

An empirical evaluation of a language-based security testin..:

, In: Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research,
 
?
8

A lightweight approach to state based security testing:

, In: Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research,
Zhang, Songtao ; Dean, Thomas ; Knight, Scott - p. 28-es , 2006
 
?
9

Bounded parameter Markov decision processes:

, In: Recent Advances in AI Planning; Lecture Notes in Computer Science,
Givan, Robert ; Leach, Sonia ; Dean, Thomas - p. 234-246 , 1997
 
?
10

Handling shared resources in a temporal data base managemen..:

, In: Proceedings of the third ACM-SIGOIS conference on Office information systems,
Dean, Thomas L. - p. 81-91 , 1986
 
?
11

The Disruptive Blockchain Security Threats and Threat Categ..:

, In: 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T),
 
?
12

Variability Identification and Representation for Automotiv..:

, In: Automotive Systems and Software Engineering,
 
?
13

Software Engineering by Source Transformation – Experience ..:

, In: 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM),
 
?
14

Generating a Real-Time Constraint Engine for Network Protoc..:

, In: Information Security Theory and Practice; Lecture Notes in Computer Science,
 
?
15

Near-miss model clone detection for simulink models:

, In: Proceedings of the 6th International Workshop on Software Clones,
 
1-15