chris mcdonald
chris mcdonald
在 uwa.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Establishing trust in pure ad-hoc networks
AA Pirzada, C McDonald
Proceedings of the 27th Australasian conference on Computer science-Volume …, 2004
5842004
Performance comparison of trust-based reactive routing protocols
AA Pirzada, C McDonald, A Datta
IEEE transactions on mobile computing 5 (6), 695-710, 2006
2232006
Kerberos assisted authentication in mobile ad-hoc networks
AA Pirzada, C McDonald
Proceedings of the 27th Australasian conference on Computer science-Volume …, 2004
1702004
Trust establishment in pure ad-hoc networks
AA Pirzada, C McDonald
Wireless Personal Communications 37 (1-2), 139-168, 2006
1642006
Corpus-independent generic keyphrase extraction using word embedding vectors
R Wang, W Liu, C McDonald
Software Engineering Research Conference 39, 1-8, 2014
872014
Propagating trust in ad-hoc networks for reliable routing
AA Pirzada, A Datta, C McDonald
International Workshop on Wireless Ad-Hoc Networks, 2004., 58-62, 2004
782004
Trust-based routing for ad-hoc wireless networks
AA Pirzada, A Datta, C McDonald
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
772004
Trusted greedy perimeter stateless routing
AA Pirzada, C McDonald
2007 15th IEEE International Conference on Networks, 206-211, 2007
732007
A critique of mobility models for wireless network simulation
B Pazand, C McDonald
6th IEEE/ACIS International Conference on Computer and Information Science …, 2007
712007
Secure routing with the AODV protocol
AA Pirzada, C McDonald
2005 Asia-Pacific Conference on Communications, 57-61, 2005
642005
Circumventing sinkholes and wormholes in wireless sensor networks
AA Pirzada, C McDonald
IWWAN’05: Proceedings of International Workshop on Wireless Ad-hoc Networks 71, 2005
622005
Incorporating trust and reputation in the DSR protocol for dependable routing
AA Pirzada, A Datta, C McDonald
Computer Communications 29 (15), 2806-2821, 2006
612006
MAP: A scalable monitoring system for dependable 802.11 wireless networks
Y Sheng, G Chen, H Yin, K Tan, U Deshpande, B Vance, D Kotz, ...
IEEE Wireless Communications 15 (5), 10-18, 2008
592008
Using word embeddings to enhance keyword identification for scientific publications
R Wang, W Liu, C McDonald
Australasian Database Conference, 257-268, 2015
502015
Compiler error messages considered unhelpful: The landscape of text-based programming error message research
BA Becker, P Denny, R Pettit, D Bouchard, DJ Bouvier, B Harrington, ...
Proceedings of the working group reports on innovation and technology in …, 2019
462019
A network specification language and execution environment for undergraduate teaching
C McDonald
ACM SIGCSE Bulletin 23 (1), 25-34, 1991
401991
Featureless domain-specific term extraction with minimal labelled data
R Wang, W Liu, C McDonald
Proceedings of the Australasian Language Technology Association Workshop …, 2016
382016
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks.
AA Pirzada, C McDonald
Int. J. Netw. Secur. 3 (2), 191-202, 2006
342006
Periocular region-based person identification in the visible, infrared and hyperspectral imagery
M Uzair, A Mahmood, A Mian, C McDonald
Neurocomputing 149, 854-867, 2015
332015
Program visualization and explanation for novice C programmers
MH Egan, C McDonald
Proceedings of the Sixteenth Australasian Computing Education Conference …, 2014
272014
系统目前无法执行此操作,请稍后再试。
文章 1–20