pubs.bib

@article{ShiD13,
  author = {Yiwen Shi and
               Jennifer Dworak},
  title = {A Simulated Annealing Inspired Test Optimization Method
               for Enhanced Detection of Highly Critical Faults and Defects},
  journal = {J. Electronic Testing},
  volume = {29},
  number = {3},
  year = {2013},
  pages = {275-288},
  puburl = {http://dx.doi.org/10.1007/s10836-013-5357-0}
}
@inproceedings{ThorntonISMVL13,
  title = {Ternary Logic Network Justification Using Transfer Matrices},
  author = {Mitchell A Thornton and Jennifer Dworak},
  booktitle = {IEEE International Symposium on Multiple-Valued Logic},
  month = may,
  year = {2013},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl13b.pdf}
}
@article{ShiJET13,
  title = {A Simulated Annealing Inspired Test Optimization Method for Enhanced Detection of Highly Critical Faults and Defects},
  author = {Yiwen Shi and Jennifer Dworak},
  journal = {Journal of Electronic Testing},
  pages = {1--14},
  year = {2013},
  publisher = {Springer},
  puburl = {http://link.springer.com/content/pdf/10.1007/s10836-013-5357-0.pdf}
}
@article{DworakNASIB12,
  author = {Jennifer Dworak and
               Kundan Nepal and
               Nuno Alves and
               Yiwen Shi and
               Nicholas Imbriglia and
               R. Iris Bahar},
  title = {Using implications to choose tests through suspect fault
               identification},
  journal = {ACM Transactions on Design Automation of Electronic Systems},
  volume = {18},
  number = {1},
  year = {2012},
  pages = {14},
  puburl = {http://doi.acm.org/10.1145/2390191.2390205}
}
@article{AlpaslanKMHD12tcad,
  author = {Elif Alpaslan and
               Bram Kruseman and
               Ananta K. Majhi and
               Wilmar M. Heuvelman and
               Jennifer Dworak},
  title = {{N}{I}{M}-{X}: A {N}oise {I}ndex {M}odel-Based {X}-Filling Technique to
               Overcome the Power Supply Switching Noise Effects on Path
               Delay Test},
  journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
  volume = {31},
  number = {5},
  year = {2012},
  pages = {809-813},
  puburl = {http://dx.doi.org/10.1109/TCAD.2011.2179040},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesSIDNB11ets,
  author = {Nuno Alves and
               Y. Shi and
               N. Imbriglia and
               Jennifer Dworak and
               Kundan Nepal and
               R. Iris Bahar},
  title = {Dynamic Test Set Selection Using Implication-Based On-Chip
               Diagnosis},
  booktitle = {European Test Symposium},
  year = {2011},
  pages = {211},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ETS.2011.59},
  crossref = {2011ets},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011ets,
  title = {16th European Test Symposium (ETS 2011), May 23-27, 2011,
               Trondheim, Norway},
  booktitle = {European Test Symposium},
  publisher = {IEEE Computer Society},
  year = {2011},
  isbn = {978-0-7695-4433-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ShiKHD11itc,
  author = {Yiwen Shi and
               Kantapon Kaewtip and
               Wan-Chan Hu and
               Jennifer Dworak},
  title = {Partial state monitoring for fault detection estimation},
  booktitle = {ITC},
  year = {2011},
  pages = {1-10},
  puburl = {http://dx.doi.org/10.1109/TEST.2011.6139146},
  crossref = {2011itc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011itc,
  editor = {Bill Eklow and
               R. D. (Shawn) Blanton},
  title = {2011 IEEE International Test Conference, ITC 2011, Anaheim,
               CA, USA, September 20-22, 2011},
  booktitle = {ITC},
  publisher = {IEEE},
  year = {2011},
  isbn = {978-1-4577-0153-5},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6132473},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesSDBN11vts,
  author = {Nuno Alves and
               Yiwen Shi and
               Jennifer Dworak and
               R. Iris Bahar and
               Kundan Nepal},
  title = {Enhancing online error detection through area-efficient
               multi-site implications},
  booktitle = {VTS},
  year = {2011},
  pages = {241-246},
  puburl = {http://dx.doi.org/10.1109/VTS.2011.5783728},
  crossref = {2011vts},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011vts,
  title = {29th IEEE VLSI Test Symposium, VTS 2011, May 1-5, 2011,
               Dana Point, California, USA},
  booktitle = {VTS},
  publisher = {IEEE Computer Society},
  year = {2011},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{AlvesBNDB10tcad,
  author = {Nuno Alves and
               Alison Buben and
               Kundan Nepal and
               Jennifer Dworak and
               R. Iris Bahar},
  title = {A Cost Effective Approach for Online Error Detection Using
               Invariant Relationships},
  journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
  volume = {29},
  number = {5},
  year = {2010},
  pages = {788-801},
  puburl = {http://dx.doi.org/10.1109/TCAD.2010.2043590},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{AlpaslanHLCD10tcad,
  author = {Elif Alpaslan and
               Yu Huang and
               Xijiang Lin and
               Wu-Tung Cheng and
               Jennifer Dworak},
  title = {On Reducing Scan Shift Activity at RTL},
  journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
  volume = {29},
  number = {7},
  year = {2010},
  pages = {1110-1120},
  puburl = {http://dx.doi.org/10.1109/TCAD.2010.2049057},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlpaslanDKMHW10date,
  author = {Elif Alpaslan and
               Jennifer Dworak and
               Bram Kruseman and
               Ananta K. Majhi and
               Wilmar M. Heuvelman and
               Paul van de Wiel},
  title = {NIM- a noise index model to estimate delay discrepancies
               between silicon and simulation},
  booktitle = {DATE},
  year = {2010},
  pages = {1373-1376},
  puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5457025},
  crossref = {2010date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010date,
  title = {Design, Automation and Test in Europe, DATE 2010, Dresden,
               Germany, March 8-12, 2010},
  booktitle = {DATE},
  publisher = {IEEE},
  year = {2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesNDB10glvlsi,
  author = {Nuno Alves and
               Kundan Nepal and
               Jennifer Dworak and
               R. Iris Bahar},
  title = {Improving the testability and reliability of sequential
               circuits with invariant logic},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  year = {2010},
  pages = {131-134},
  puburl = {http://doi.acm.org/10.1145/1785481.1785513},
  crossref = {2010glvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010glvlsi,
  editor = {R. Iris Bahar and
               Fabrizio Lombardi and
               David Atienza and
               Erik Brunvand},
  title = {Proceedings of the 20th ACM Great Lakes Symposium on VLSI
               2009, Providence, Rhode Island, USA, May 16-18 2010},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  publisher = {ACM},
  year = {2010},
  isbn = {978-1-4503-0012-4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ShiHD10vts,
  author = {Yiwen Shi and
               Wan-Chan Hu and
               Jennifer Dworak},
  title = {Too many faults, too little time on creating test sets for
               enhanced detection of highly critical faults and defects},
  booktitle = {VTS},
  year = {2010},
  pages = {319-324},
  puburl = {http://dx.doi.org/10.1109/VTS.2010.5469545},
  crossref = {2010vts},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010vts,
  title = {28th IEEE VLSI Test Symposium, VTS 2010, April 19-22, 2010,
               Santa Cruz, California, USA},
  booktitle = {VTS},
  publisher = {IEEE Computer Society},
  year = {2010},
  isbn = {978-1-4244-6648-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesNDB09date,
  author = {Nuno Alves and
               Kundan Nepal and
               Jennifer Dworak and
               R. Iris Bahar},
  title = {Detecting errors using multi-cycle invariance information},
  booktitle = {DATE},
  year = {2009},
  pages = {791-796},
  puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=5090609{\&}arnumber=5090771{\&}count=326{\&}index=157},
  crossref = {2009date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009date,
  title = {Design, Automation and Test in Europe, DATE 2009, Nice,
               France, April 20-24, 2009},
  booktitle = {DATE},
  publisher = {IEEE},
  year = {2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesDBN09iccad,
  author = {Nuno Alves and
               Jennifer Dworak and
               R. Iris Bahar and
               Kundan Nepal},
  title = {Compacting test vector sets via strategic use of implications},
  booktitle = {ICCAD},
  year = {2009},
  pages = {83-88},
  puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5361309},
  crossref = {2009iccad},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009iccad,
  title = {2009 International Conference on Computer-Aided Design (ICCAD'09),
               November 2-5, 2009, San Jose, CA, USA},
  booktitle = {ICCAD},
  publisher = {IEEE},
  year = {2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ShiDD08dft,
  author = {Yiwen Shi and
               Kellie DiPalma and
               Jennifer Dworak},
  title = {Efficient Determination of Fault Criticality for Manufacturing
               Test Set Optimization},
  booktitle = {DFT},
  year = {2008},
  pages = {403-411},
  puburl = {http://dx.doi.org/10.1109/DFT.2008.48},
  crossref = {2008dft},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008dft,
  editor = {Cristiana Bolchini and
               Yong-Bin Kim and
               Dimitris Gizopoulos and
               Mohammad Tehranipoor},
  title = {23rd IEEE International Symposium on Defect and Fault-Tolerance
               in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA,
               USA},
  booktitle = {DFT},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NepalADB08itc,
  author = {Kundan Nepal and
               Nuno Alves and
               Jennifer Dworak and
               R. Iris Bahar},
  title = {Using Implications for Online Error Detection},
  booktitle = {ITC},
  year = {2008},
  pages = {1-10},
  puburl = {http://dx.doi.org/10.1109/TEST.2008.4700614},
  crossref = {2008itc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008itc,
  editor = {Douglas Young and
               Nur A. Touba},
  title = {2008 IEEE International Test Conference, ITC 2008, Santa
               Clara, California, USA, October 26-31, 2008},
  booktitle = {ITC},
  publisher = {IEEE},
  year = {2008},
  isbn = {978-1-4244-2403-0},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690905},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlpaslanHLCD08vts,
  author = {Elif Alpaslan and
               Yu Huang and
               Xijiang Lin and
               Wu-Tung Cheng and
               Jennifer Dworak},
  title = {Reducing Scan Shift Power at RTL},
  booktitle = {VTS},
  year = {2008},
  pages = {139-146},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/VTS.2008.36},
  crossref = {2008vts},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008vts,
  title = {26th IEEE VLSI Test Symposium (VTS 2008), April 27 - May
               1, 2008, San Diego, California, USA},
  booktitle = {VTS},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dworak07itc,
  author = {Jennifer Dworak},
  title = {Which defects are most critical? Optimizing test sets to
               minimize failures due to test escapes},
  booktitle = {ITC},
  year = {2007},
  pages = {1-10},
  puburl = {http://dx.doi.org/10.1109/TEST.2007.4437565},
  crossref = {2007itc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007itc,
  editor = {Jill Sibert and
               Janusz Rajski},
  title = {2007 IEEE International Test Conference, ITC 2007, Santa
               Clara, California, USA, October 21-26, 2007},
  booktitle = {ITC},
  publisher = {IEEE},
  year = {2007},
  isbn = {1-4244-1128-9},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4437545},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dworak07vts,
  author = {Jennifer Dworak},
  title = {An Analysis of Defect Detection for Weighted Random Patterns
               Generated with Observation/Excitation-Aware Partial Fault
               Targeting},
  booktitle = {VTS},
  year = {2007},
  pages = {205-210},
  puburl = {http://dx.doi.org/10.1109/VTS.2007.14},
  crossref = {2007vts},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007vts,
  title = {25th IEEE VLSI Test Symposium (VTS 2007), 6-10 May 2007,
               Berkeley, California, USA},
  booktitle = {VTS},
  publisher = {IEEE Computer Society},
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{StojanovicBDW06dac,
  author = {Vladimir Stojanovic and
               R. Iris Bahar and
               Jennifer Dworak and
               Richard Weiss},
  title = {A cost-effective implementation of an ECC-protected instruction
               queue for out-of-order microprocessors},
  booktitle = {DAC},
  year = {2006},
  pages = {705-708},
  puburl = {http://doi.acm.org/10.1145/1146909.1147087},
  crossref = {2006dac},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006dac,
  editor = {Ellen Sentovich},
  title = {Proceedings of the 43rd Design Automation Conference, DAC
               2006, San Francisco, CA, USA, July 24-28, 2006},
  booktitle = {DAC},
  publisher = {ACM},
  year = {2006},
  isbn = {1-59593-381-6},
  puburl = {http://dl.acm.org/citation.cfm?id=1146909},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dworak05mtv,
  author = {Jennifer Dworak},
  title = {An Investigation of Excitation Balance and Additional Mandatory
               Conditions for the Diagnosis of Fortuitously Detected Defects},
  booktitle = {MTV},
  year = {2005},
  pages = {48-54},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MTV.2005.6},
  crossref = {2005mtv},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005mtv,
  editor = {Magdy S. Abadir and
               Li-C. Wang},
  title = {Sixth International Workshop on Microprocessor Test and
               Verification (MTV 2005), Common Challenges and Solutions,
               3-4 November 2005, Austin, Texas, USA},
  booktitle = {MTV},
  publisher = {IEEE Computer Society},
  year = {2005},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakCWM04date,
  author = {Jennifer Dworak and
               Brad Cobb and
               James Wingfield and
               M. Ray Mercer},
  title = {Balanced Excitation and Its Effect on the Fortuitous Detection
               of Dynamic Defects},
  booktitle = {DATE},
  year = {2004},
  pages = {1066-1071},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2004.1269034},
  crossref = {2004date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004date,
  title = {2004 Design, Automation and Test in Europe Conference and
               Exposition (DATE 2004), 16-20 February 2004, Paris, France},
  booktitle = {DATE},
  publisher = {IEEE Computer Society},
  year = {2004},
  isbn = {0-7695-2085-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakWM04dft,
  author = {Jennifer Dworak and
               James Wingfield and
               M. Ray Mercer},
  title = {A Preliminary Investigation of Observation Diversity for
               Enhancing Fortuitous Detection of Defects},
  booktitle = {DFT},
  year = {2004},
  pages = {460-468},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DFT.2004.5},
  crossref = {2004dft},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004dft,
  title = {19th IEEE International Symposium on Defect and Fault-Tolerance
               in VLSI Systems (DFT 2004), 10-13 October 2004, Cannes,
               France, Proceedings},
  booktitle = {DFT},
  publisher = {IEEE Computer Society},
  year = {2004},
  isbn = {0-7695-2241-6},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakDWM04vts,
  author = {Jennifer Dworak and
               David Dorsey and
               Amy Wang and
               M. Ray Mercer},
  title = {Excitation, Observation, and ELF-MD: Optimization Criteria
               for High Quality Test Sets},
  booktitle = {VTS},
  year = {2004},
  pages = {9-15},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/VTEST.2004.1299219},
  crossref = {2004vts},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004vts,
  title = {22nd IEEE VLSI Test Symposium (VTS 2004), 25-29 April 2004,
               Napa Valley, CA, USA},
  booktitle = {VTS},
  publisher = {IEEE Computer Society},
  year = {2004},
  isbn = {0-7695-2134-7},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{WingfieldDM03dft,
  author = {James Wingfield and
               Jennifer Dworak and
               M. Ray Mercer},
  title = {Function-Based Dynamic Compaction and its Impact on Test
               Set Sizes},
  booktitle = {DFT},
  year = {2003},
  pages = {167-174},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DFTVS.2003.1250109},
  crossref = {2003dft},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003dft,
  title = {18th  IEEE International Symposium on Defect and Fault-Tolerance
               in VLSI Systems (DFT 2003), 3-5 November 2003, Boston, MA,
               USA, Proceedings},
  booktitle = {DFT},
  publisher = {IEEE Computer Society},
  year = {2003},
  isbn = {0-7695-2042-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiouWCDMKW02dac,
  author = {Jing-Jia Liou and
               Li-C. Wang and
               Kwang-Ting Cheng and
               Jennifer Dworak and
               M. Ray Mercer and
               Rohit Kapur and
               Thomas W. Williams},
  title = {Enhancing test efficiency for delay fault testing using
               multiple-clocked schemes},
  booktitle = {DAC},
  year = {2002},
  pages = {371-374},
  puburl = {http://doi.acm.org/10.1145/513918.514013},
  crossref = {2002dac},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002dac,
  title = {Proceedings of the 39th Design Automation Conference, DAC
               2002, New Orleans, LA, USA, June 10-14, 2002},
  booktitle = {DAC},
  publisher = {ACM},
  year = {2002},
  isbn = {1-58113-461-4},
  puburl = {http://dl.acm.org/citation.cfm?id=513918},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LeeCDGM02date,
  author = {Sooryong Lee and
               Brad Cobb and
               Jennifer Dworak and
               Michael R. Grimaila and
               M. Ray Mercer},
  title = {A New ATPG Algorithm to Limit Test Set Size and Achieve
               Multiple Detections of All Faults},
  booktitle = {DATE},
  year = {2002},
  pages = {94-99},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2002.998255},
  crossref = {2002date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002date,
  title = {2002 Design, Automation and Test in Europe Conference and
               Exposition (DATE 2002), 4-8 March 2002, Paris, France},
  booktitle = {DATE},
  publisher = {IEEE Computer Society},
  year = {2002},
  isbn = {0-7695-1471-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakWCLWM02dft,
  author = {Jennifer Dworak and
               James Wingfield and
               Brad Cobb and
               Sooryong Lee and
               Li-C. Wang and
               M. Ray Mercer},
  title = {Fortuitous Detection and its Impact on Test Set Sizes Using
               Stuck-at and Transition Faults},
  booktitle = {DFT},
  year = {2002},
  pages = {177-185},
  puburl = {http://www.computer.org/proceedings/dft/1831/18310177abs.htm},
  crossref = {2002dft},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002dft,
  title = {17th IEEE International Symposium on Defect and Fault-Tolerance
               in VLSI Systems (DFT 2002), 6-8 November 2002, Vancouver,
               BC, Canada, Proceedings},
  booktitle = {DFT},
  publisher = {IEEE Computer Society},
  year = {2002},
  isbn = {0-7695-1831-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiouWCDMKW02itc,
  author = {Jing-Jia Liou and
               Li-C. Wang and
               Kwang-Ting Cheng and
               Jennifer Dworak and
               M. Ray Mercer and
               Rohit Kapur and
               Thomas W. Williams},
  title = {Analysis of Delay Test Effectiveness with a Multiple-Clock
               Scheme},
  booktitle = {ITC},
  year = {2002},
  pages = {407-416},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/TEST.2002.1041786},
  crossref = {2002itc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002itc,
  title = {Proceedings IEEE International Test Conference 2002, Baltimore,
               MD, USA, October 7-10, 2002},
  publisher = {IEEE Computer Society},
  year = {2002},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{DworakWLGMBSW01dt,
  author = {Jennifer Dworak and
               Jason D. Wicker and
               Sooryong Lee and
               Michael R. Grimaila and
               M. Ray Mercer and
               Kenneth M. Butler and
               Bret Stewart and
               Li-C. Wang},
  title = {Defect-Oriented Testing and Defective-Part-Level Prediction},
  journal = {IEEE Design {\&} Test of Computers},
  volume = {18},
  number = {1},
  year = {2001},
  pages = {31-41},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/54.902820},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakGCWWM00ats,
  author = {Jennifer Dworak and
               Michael R. Grimaila and
               Brad Cobb and
               Ting-Chi Wang and
               Li-C. Wang and
               M. Ray Mercer},
  title = {On the superiority of DO-RE-ME/MPG-D over stuck-at-based
               defective part level prediction},
  booktitle = {Asian Test Symposium},
  year = {2000},
  pages = {151-},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ATS.2000.893618},
  crossref = {2000ats},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2000ats,
  title = {9th Asian Test Symposium (ATS 2000), 4-6 December 2000,
               Taipei, Taiwan},
  booktitle = {Asian Test Symposium},
  publisher = {IEEE Computer Society},
  year = {2000},
  isbn = {0-7695-0887-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakGLWM00itc,
  author = {Jennifer Dworak and
               Michael R. Grimaila and
               Sooryong Lee and
               Li-C. Wang and
               M. Ray Mercer},
  title = {Enhanced DO-RE-ME based defect level prediction using defect
               site aggregation-MPG-D},
  booktitle = {ITC},
  year = {2000},
  pages = {930-939},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/TEST.2000.894304},
  crossref = {2000itc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2000itc,
  title = {Proceedings IEEE International Test Conference 2000, Atlantic
               City, NJ, USA, October 2000},
  publisher = {IEEE Computer Society},
  year = {2000},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakGLWM99itc,
  author = {Jennifer Dworak and
               Michael R. Grimaila and
               Sooryong Lee and
               Li-C. Wang and
               M. Ray Mercer},
  title = {Modeling the probability of defect excitation for a commercial
               IC with implications for stuck-at fault-based ATPG strategies},
  booktitle = {ITC},
  year = {1999},
  pages = {1031-1037},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/TEST.1999.805836},
  crossref = {1999itc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1999itc,
  title = {Proceedings IEEE International Test Conference 1999, Atlantic
               City, NJ, USA, 27-30 September 1999},
  publisher = {IEEE Computer Society},
  year = {1999},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{GrimailaLDBSBHMPWM99vts,
  author = {Michael R. Grimaila and
               Sooryong Lee and
               Jennifer Dworak and
               Kenneth M. Butler and
               Bret Stewart and
               Hari Balachandran and
               Bryan Houchins and
               Vineet Mathur and
               Jaehong Park and
               Li-C. Wang and
               M. Ray Mercer},
  title = {REDO - Probabilistic Excitation and Deterministic Observation
               - First Commercial Experimen},
  booktitle = {VTS},
  year = {1999},
  pages = {268-274},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/VTEST.1999.766675},
  crossref = {1999vts},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1999vts,
  title = {17th  IEEE VLSI Test Symposium (VTS '99), 25-30 April 1999,
               San Diego, CA, USA},
  booktitle = {VTS},
  publisher = {IEEE Computer Society},
  year = {1999},
  isbn = {0-7695-0146-X},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Manikas12jcsc,
  author = {Theodore W. Manikas},
  title = {Integrated Circuit Channel Routing using a Pareto-Optimal
               Genetic Algorithm},
  journal = {Journal of Circuits, Systems, and Computers},
  volume = {21},
  number = {5},
  year = {2012},
  puburl = {http://dx.doi.org/10.1142/S0218126612500417},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasFT12ismvl,
  author = {Theodore W. Manikas and
               David Y. Feinstein and
               Mitchell A. Thornton},
  title = {Modeling Medical System Threats with Conditional Probabilities
               Using Multiple-Valued Logic Decision Diagrams},
  booktitle = {ISMVL},
  year = {2012},
  pages = {244-249},
  url = {http://lyle.smu.edu/~manikas/Pubs/Manikas_ISMVL_12.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2012.29},
  crossref = {2012ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012ismvl,
  editor = {D. Michael Miller and
               Vincent C. Gaudet},
  title = {42nd IEEE International Symposium on Multiple-Valued Logic,
               ISMVL 2012, Victoria, BC, Canada, May 14-16, 2012},
  booktitle = {ISMVL},
  publisher = {IEEE},
  year = {2012},
  isbn = {978-1-4673-0908-0},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6214742},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasTF11ismvl,
  author = {Theodore W. Manikas and
               Mitchell A. Thornton and
               David Y. Feinstein},
  title = {Using Multiple-Valued Logic Decision Diagrams to Model System
               Threat Probabilities},
  booktitle = {ISMVL},
  year = {2011},
  pages = {263-267},
  url = {http://lyle.smu.edu/~manikas/Pubs/Manikas-ISMVL-11.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2011.12},
  crossref = {2011ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011ismvl,
  editor = {Jaakko Astola and
               Radomir S. Stankovic},
  title = {41st IEEE International Symposium on Multiple-Valued Logic,
               ISMVL 2011, Tuusula, Finland, May 23-25, 2011},
  booktitle = {ISMVL},
  publisher = {IEEE},
  year = {2011},
  isbn = {978-0-7695-4405-2},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5952386},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{LoPrestiMK10te,
  author = {Peter LoPresti and
               Theodore W. Manikas and
               Jeff Kohlbeck},
  title = {An Electrical Engineering Summer Academy for Middle School
               and High School Students},
  journal = {IEEE Trans. Education},
  volume = {53},
  number = {1},
  year = {2010},
  pages = {18-25},
  url = {http://lyle.smu.edu/~manikas/Pubs/LoPresti-TE-10.pdf},
  puburl = {http://dx.doi.org/10.1109/TE.2009.2022400},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasT08ismvl,
  author = {Theodore W. Manikas and
               Dale Teeters},
  title = {Multiple-Valued Logic Memory System Design Using Nanoscale
               Electrochemical Cells},
  booktitle = {ISMVL},
  year = {2008},
  pages = {197-201},
  url = {http://lyle.smu.edu/~manikas/Pubs/Manikas-ISMVL-08.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2008.23},
  crossref = {2008ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008ismvl,
  title = {38th IEEE International Symposium on Multiple-Valued Logic
               (ISMVL 2008), 22-23 May 2008, Dallas, Texas, USA},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasK02iwls,
  author = {Theodore W. Manikas and
               Gerald R. Kane},
  title = {Partitioning Effects on Estimated Wire Length for Mixed
               Macro and Standard Cell Placement},
  booktitle = {IWLS},
  year = {2002},
  pages = {27-30},
  url = {http://lyle.smu.edu/~manikas/Pubs/Manikas-IWLS-02-final.pdf},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{VasekC13ecrime,
  author = {Marie Vasek and Tyler Moore},
  title = {Empirical Analysis of Factors Affecting Malware URL Detection},
  booktitle = {8th APWG eCrime Researchers Summit (eCrime)},
  year = {2013},
  month = {September}
}
@article{Moore13ijcip,
  title = {The promise and perils of digital currencies},
  author = {Tyler Moore},
  journal = {International Journal of Critical Infrastructure Protection},
  year = {2013},
  url = {http://dx.doi.org/10.1016/j.ijcip.2013.08.002}
}
@inproceedings{LeontiadisMC13,
  author = {Nektarios Leontiadis and
               Tyler Moore and
               Nicolas Christin},
  title = {Pick your poison: {P}ricing and inventories at unlicensed
               online pharmacies},
  booktitle = {ACM Conference on Electronic Commerce},
  year = {2013},
  pages = {621-638},
  puburl = {http://doi.acm.org/10.1145/2482540.2482610}
}
@inproceedings{MooreC13fc,
  author = {Tyler Moore and Nicolas Christin},
  title = {Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk},
  booktitle = {Financial Cryptography and Data Security},
  year = {2013},
  month = {April},
  url = {http://lyle.smu.edu/~tylerm/fc13.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc13pres.pdf},
  pages = {}
}
@inproceedings{PapaCM13ifip,
  author = {Steve Papa and William Casper and Tyler Moore},
  title = {Securing Wastewater Collection Systems from Accidental and Intentional Harm: a Cost-Benefit Analysis},
  booktitle = {7th IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection},
  year = {2013},
  month = {March},
  pages = {},
  url = {http://lyle.smu.edu/~tylerm/ifip13.pdf}
}
@inproceedings{MooreC12ecrime,
  author = {Tyler Moore and Richard Clayton},
  title = {Discovering Phishing Dropboxes Using Email Metadata},
  booktitle = {7th APWG eCrime Researchers Summit (eCrime), Las Croabas, PR},
  year = {2012},
  month = {October},
  pages = {},
  url = {http://lyle.smu.edu/~tylerm/ecrime12dropbox.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime12dropboxpres.pdf}
}
@inproceedings{BoehmeM12ecrime,
  author = {Rainer B{\"o}hme and Tyler Moore},
  title = {How Do Consumers React to Cybercrime?},
  booktitle = {APWG eCrime Researchers Summit (eCrime), Las Croabas, PR},
  year = {2012},
  month = {October},
  pages = {},
  url = {http://lyle.smu.edu/~tylerm/ecrime12eurobar.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime12eurobarpres.pdf}
}
@article{LandauM12firstmonday,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic tussles in federated identity management},
  journal = {First Monday},
  volume = {17},
  number = {10},
  year = {2012},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf}
}
@inproceedings{EdwardsMSHF12nspw,
  author = {Benjamin Edwards and
               Tyler Moore and
               George Stelle and
               Steven A. Hofmeyr and
               Stephanie Forrest},
  title = {Beyond the Blacklist: Modeling Malware Spread and the Effect
               of Interventions},
  booktitle = {Proceedings of the New Security Paradigms Workshop,
               Bertinoro, Italy, September 19-21, 2012},
  year = {2012},
  publisher = {ACM},
  url = {http://lyle.smu.edu/~tylerm/nspw12.pdf}
}
@inproceedings{VasekM12cset,
  author = {Vasek, Marie and Moore, Tyler},
  title = {Do malware reports expedite cleanup? {A}n experimental study},
  booktitle = {Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test},
  series = {CSET'12},
  year = {2012},
  location = {Bellevue, WA},
  puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf},
  url = {http://lyle.smu.edu/~tylerm/cset12.pdf},
  presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{AndersonBBCELMS12weis,
  author = {Ross Anderson and
               Chris Barton and
               Rainer B{\"o}hme and
               Richard Clayton and
               Michael van Eeten and
               Michael Levi and
               Tyler Moore and
               Stefan Savage},
  title = {Measuring the Cost of Cybercrime},
  booktitle = {WEIS},
  year = {2012},
  url = {http://lyle.smu.edu/~tylerm/weis12.pdf},
  crossref = {2012weis},
  presurl = {http://lyle.smu.edu/~tylerm/weis12pres.pdf}
}
@proceedings{2012weis,
  title = {11th Annual Workshop on the Economics of Information Security,
               WEIS 2012, Berlin, Germany, 25-26 June, 2012},
  booktitle = {WEIS},
  year = {2012}
}
@incollection{MooreA12oxford,
  author = {Tyler Moore and
               Ross Anderson},
  title = {Internet Security},
  editor = {Martin Peitz and Joel Waldfogel},
  booktitle = {The Oxford Handbook of the Digital Economy},
  pages = {572-599},
  year = 2012,
  publisher = {Oxford University Press},
  puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21},
  url = {http://lyle.smu.edu/~tylerm/oxford12.pdf}
}
@inproceedings{MooreHC12fc,
  author = {Tyler Moore and
               Jie Han and
               Richard Clayton},
  title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield
               Investment Programs},
  booktitle = {Financial Cryptography},
  year = {2012},
  pages = {41-56},
  puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4},
  url = {http://lyle.smu.edu/~tylerm/fc12.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc12pres.pdf},
  crossref = {2012fc}
}
@proceedings{2012fc,
  editor = {Angelos D. Keromytis},
  title = {Financial Cryptography and Data Security - 16th International
               Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March
               2, 2012, Revised Selected Papers},
  booktitle = {Financial Cryptography},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7397},
  year = {2012},
  isbn = {978-3-642-32945-6},
  puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3}
}
@inproceedings{MooreLC11ccs,
  author = {Tyler Moore and
               Nektarios Leontiadis and
               Nicolas Christin},
  title = {Fashion crimes: trending-term exploitation on the web},
  booktitle = {ACM Conference on Computer and Communications Security},
  year = {2011},
  pages = {455-466},
  url = {http://lyle.smu.edu/~tylerm/ccs11.pdf},
  puburl = {http://doi.acm.org/10.1145/2046707.2046761},
  presurl = {http://lyle.smu.edu/~tylerm/ccs11pres.pdf},
  crossref = {2011ccs}
}
@proceedings{2011ccs,
  editor = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title = {Proceedings of the 18th ACM Conference on Computer and Communications
               Security, CCS 2011, Chicago, Illinois, USA, October 17-21,
               2011},
  booktitle = {ACM Conference on Computer and Communications Security},
  publisher = {ACM},
  year = {2011},
  isbn = {978-1-4503-0948-6}
}
@inproceedings{LeontiadisMC11uss,
  author = {Nektarios Leontiadis and
               Tyler Moore and
               Nicolas Christin},
  title = {Measuring and Analyzing Search-Redirection Attacks in the
               Illicit Online Prescription Drug Trade},
  booktitle = {USENIX Security Symposium},
  year = {2011},
  url = {http://lyle.smu.edu/~tylerm/usenix11.pdf},
  puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf},
  crossref = {2011uss}
}
@proceedings{2011uss,
  title = {20th USENIX Security Symposium, San Francisco, CA, USA,
               August 8-12, 2011, Proceedings},
  booktitle = {USENIX Security Symposium},
  publisher = {USENIX Association},
  year = {2011}
}
@inproceedings{HofmeyrMFES11weis,
  author = {Steven A. Hofmeyr and
               Tyler Moore and
               Stephanie Forrest and
               Benjamin Edwards and
               George Stelle},
  title = {Modeling Internet-Scale Policies for Cleaning up Malware},
  booktitle = {WEIS},
  year = {2011},
  url = {http://lyle.smu.edu/~tylerm/weis11model.pdf},
  puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf},
  crossref = {2011weis}
}
@proceedings{2011weis,
  title = {10th Annual Workshop on the Economics of Information Security,
               WEIS 2011, George Mason University, Fairfax, VA, USA, June
               14-15, 2011},
  booktitle = {WEIS},
  year = {2011}
}
@inproceedings{LandauM11weis,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic Tussles in Federated Identity Management},
  booktitle = {WEIS},
  year = {2011},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf},
  crossref = {2011weis}
}
@inproceedings{MooreC11fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Ethical Dilemmas in Take-Down Research},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {154-168},
  url = {http://lyle.smu.edu/~tylerm/wecsr11.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/wecsr11pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14},
  crossref = {2011wfc}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9}
}
@article{RePEc:idt:journl:cs8102,
  author = {Tyler Moore and Richard Clayton},
  title = {The Impact of Public Information on Phishing Attack and Defense},
  journal = {Communications \& Strategies},
  year = 2011,
  volume = {1},
  number = {81},
  pages = {45-68},
  month = {1st quart},
  keywords = {security economics; online crime; phishing; transparency},
  puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html},
  url = {http://lyle.smu.edu/~tylerm/cs81.pdf}
}
@article{Moore10ijcip,
  author = {Tyler Moore},
  title = {The economics of cybersecurity: Principles and policy options},
  journal = {International Journal of Critical Infrastructure Protection},
  volume = {3},
  number = {3-4},
  pages = {103 - 117},
  year = {2010},
  issn = {1874-5482},
  doi = {10.1016/j.ijcip.2010.10.002},
  puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429},
  url = {http://lyle.smu.edu/~tylerm/ijcip10.pdf}
}
@incollection{Moore10nas,
  author = {Tyler Moore},
  title = {The economics of cybersecurity: Principles and policy options},
  booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy},
  isbn = {9780309160353},
  puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3},
  year = {2010},
  publisher = {The National Academies Press}
}
@inproceedings{MooreFP10nspw,
  author = {Tyler Moore and
               Allan Friedman and
               Ariel D. Procaccia},
  title = {Would a 'cyber warrior' protect us: exploring trade-offs
               between attack and defense of information systems},
  booktitle = {NSPW},
  year = {2010},
  pages = {85-94},
  url = {http://lyle.smu.edu/~tylerm/nspw10.pdf},
  puburl = {http://doi.acm.org/10.1145/1900546.1900559},
  crossref = {2010nspw}
}
@proceedings{2010nspw,
  editor = {Angelos D. Keromytis and
               Sean Peisert and
               Richard Ford and
               Carrie Gates},
  title = {Proceedings of the New Security Paradigms Workshop,
               Concord, MA, USA, September 21-23, 2010},
  booktitle = {NSPW},
  publisher = {ACM},
  year = {2010},
  isbn = {978-1-4503-0415-3}
}
@article{BohmeM10ieeesp,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link},
  journal = {IEEE Security {\&} Privacy},
  volume = {8},
  number = {1},
  year = {2010},
  pages = {53-55},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51},
  url = {http://lyle.smu.edu/~tylerm/iwl-gordon.pdf}
}
@article{MoranM10ieeesp,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Secure Sharing Between Competitors},
  journal = {IEEE Security {\&} Privacy},
  volume = {8},
  number = {4},
  year = {2010},
  pages = {40-45},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138},
  url = {http://lyle.smu.edu/~tylerm/sp10phishmarket.pdf}
}
@inproceedings{MoranM10fc,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Securely Sharing Attack Data
               between Competitors},
  booktitle = {Financial Cryptography},
  year = {2010},
  pages = {222-237},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18},
  url = {http://lyle.smu.edu/~tylerm/fc10phishmarket.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc10phishmarketpres.pdf},
  crossref = {2010fc}
}
@inproceedings{MooreE10fc,
  author = {Tyler Moore and
               Benjamin Edelman},
  title = {Measuring the Perpetrators and Funders of Typosquatting},
  booktitle = {Financial Cryptography},
  year = {2010},
  pages = {175-191},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15},
  url = {http://lyle.smu.edu/~tylerm/fc10typo.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc10typopres.pdf},
  crossref = {2010fc}
}
@proceedings{2010fc,
  editor = {Radu Sion},
  title = {Financial Cryptography and Data Security, 14th International
               Conference, FC 2010, Tenerife, Canary Islands, January 25-28,
               2010, Revised Selected Papers},
  booktitle = {Financial Cryptography},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6052},
  year = {2010},
  isbn = {978-3-642-14576-6},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3}
}
@article{Moore09JEP,
  author = {Tyler Moore and Richard Clayton and  Ross Anderson},
  title = {The Economics of Online Crime},
  journal = {Journal of Economic Perspectives},
  volume = 23,
  number = 3,
  month = {Summer},
  year = 2009,
  pages = {3--20},
  puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3},
  url = {http://lyle.smu.edu/~tylerm/jep09.pdf}
}
@inproceedings{BohmeM09weis,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link - A Model of Adaptive Security
               Investment},
  booktitle = {WEIS},
  year = {2009},
  url = {http://lyle.smu.edu/~tylerm/weis09.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/weis09pres.pdf},
  puburl = {http://weis09.infosecon.net/files/152/index.html},
  crossref = {2009weis}
}
@proceedings{2009weis,
  title = {8th Annual Workshop on the Economics of Information Security,
               WEIS 2009, University College London, England, UK, June
               24-25, 2009},
  booktitle = {WEIS},
  year = {2009}
}
@inproceedings{MooreCS09leet,
  author = {Moore, Tyler and Clayton, Richard and Stern, Henry},
  title = {Temporal correlations between spam and phishing websites},
  booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more},
  series = {LEET'09},
  year = {2009},
  location = {Boston, MA},
  puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites},
  url = {http://lyle.smu.edu/~tylerm/leet09.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/leet09pres.pdf},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{MooreC09fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evil Searching: Compromise and Recompromise of Internet
               Hosts for Phishing},
  booktitle = {Financial Cryptography},
  year = {2009},
  pages = {256-272},
  puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16},
  url = {http://lyle.smu.edu/~tylerm/fc09.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc09pres.pdf},
  crossref = {2009fc}
}
@proceedings{2009fc,
  editor = {Roger Dingledine and
               Philippe Golle},
  title = {Financial Cryptography and Data Security, 13th International
               Conference, FC 2009, Accra Beach, Barbados, February 23-26,
               2009. Revised Selected Papers},
  booktitle = {Financial Cryptography},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5628},
  year = {2009},
  puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4}
}
@inproceedings{MooreC08ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {The Consequence of Non-Cooperation in the Fight Against Phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2008},
  pages = {1-14},
  puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968},
  url = {http://lyle.smu.edu/~tylerm/ecrime08.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime08pres.pdf},
  publisher = {IEEE}
}
@incollection{MooreC08weis,
  author = {Tyler Moore and
               Richard Clayton},
  title = {The Impact of Incentives on Notice and Take-down},
  editor = {M.E. Johnson},
  booktitle = {Managing Information Risk and the Economics of Security},
  pages = {199-223},
  year = 2009,
  publisher = {Springer},
  puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_10},
  url = {http://lyle.smu.edu/~tylerm/weis08takedown.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/weis08takedownpres.pdf},
  isbn = {978-0-387-09761-9}
}
@incollection{AndersonBCM08weis,
  author = {Ross Anderson and
               Rainer B{\"o}hme and
               Richard Clayton and
               Tyler Moore},
  title = {Security Economics and {E}uropean Policy},
  editor = {M.E. Johnson},
  booktitle = {Managing Information Risk and the Economics of Security},
  doi = {10.1007/978-0-387-09762-6_3},
  puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_3},
  url = {http://lyle.smu.edu/~tylerm/weis08enisa.pdf},
  publisher = {Springer},
  pages = {55-80},
  isbn = {978-0-387-09761-9},
  year = 2009
}
@inproceedings{AndersonBCM08isse,
  author = {Ross Anderson and
               Rainer B{\"o}hme and
               Richard Clayton and
               Tyler Moore},
  title = {Security Economics and {E}uropean Policy},
  booktitle = {ISSE},
  year = {2008},
  pages = {57-76},
  puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6},
  crossref = {2008isse}
}
@proceedings{2008isse,
  editor = {Norbert Pohlmann and
               Helmut Reimer and
               Wolfgang Schneider},
  title = {ISSE 2008 - Securing Electronic Busines Processes, Highlights
               of the Information Security Solutions Europe 2008 Conference,
               7-9 October 2008, Madrid, Spain},
  booktitle = {ISSE},
  publisher = {Vieweg+Teubner},
  year = {2009},
  isbn = {978-3-8348-0660-4},
  puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6}
}
@inproceedings{MooreC08fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites},
  booktitle = {Financial Cryptography},
  year = {2008},
  pages = {16-30},
  puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2},
  url = {http://lyle.smu.edu/~tylerm/fc08.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc08pres.pdf},
  crossref = {2008fc}
}
@proceedings{2008fc,
  editor = {Gene Tsudik},
  title = {Financial Cryptography and Data Security, 12th International
               Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008,
               Revised Selected Papers},
  booktitle = {Financial Cryptography},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5143},
  year = {2008},
  isbn = {978-3-540-85229-2}
}
@inproceedings{AndersonM07crypto,
  author = {Ross Anderson and
               Tyler Moore},
  title = {Information Security Economics - and Beyond},
  booktitle = {CRYPTO},
  year = {2007},
  pages = {68-91},
  puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5},
  url = {http://lyle.smu.edu/~tylerm/crypto07.pdf},
  crossref = {2007crypto}
}
@proceedings{2007crypto,
  editor = {Alfred Menezes},
  title = {Advances in Cryptology - CRYPTO 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23,
               2007, Proceedings},
  booktitle = {CRYPTO},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4622},
  year = {2007},
  isbn = {978-3-540-74142-8}
}
@incollection{AndersonMNO07,
  author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment},
  title = {Incentives and Information Security},
  editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.},
  pages = {633-649},
  booktitle = {Algorithmic Game Theory},
  year = {2007},
  isbn = {0521872820},
  publisher = {Cambridge University Press},
  address = {New York, NY, USA}
}
@inproceedings{MooreC07ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Examining the impact of website take-down on phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2007},
  pages = {1-13},
  puburl = {http://doi.acm.org/10.1145/1299015.1299016},
  url = {http://lyle.smu.edu/~tylerm/ecrime07.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime07pres.pdf},
  crossref = {2007ecrime}
}
@proceedings{2007ecrime,
  editor = {Lorrie Faith Cranor},
  title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual
               eCrime Researchers Summit 2007,  Pittsburgh, Pennsylvania,
               USA, October 4-5, 2007},
  booktitle = {eCrime Researchers Summit},
  publisher = {ACM},
  series = {ACM International Conference Proceeding Series},
  volume = {269},
  year = {2007}
}
@article{AndersonM06science,
  author = {Anderson, Ross and Moore, Tyler},
  title = {The Economics of Information Security},
  journal = {Science},
  volume = {314},
  number = {5799},
  pages = {610-613},
  year = {2006},
  doi = {10.1126/science.1130992},
  puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf},
  url = {http://lyle.smu.edu/~tylerm/science-econ.pdf}
}
@inproceedings{MooreRCPAH08secon,
  author = {Tyler Moore and
               Maxim Raya and
               Jolyon Clulow and
               Panagiotis Papadimitratos and
               Ross Anderson and
               Jean-Pierre Hubaux},
  title = {Fast Exclusion of Errant Devices from Vehicular Networks},
  booktitle = {SECON},
  year = {2008},
  pages = {135-143},
  puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26},
  url = {http://lyle.smu.edu/~tylerm/secon.pdf},
  crossref = {2008secon}
}
@proceedings{2008secon,
  title = {Proceedings of the Fifth Annual IEEE Communications Society
               Conference on Sensor, Mesh and Ad Hoc Communications and
               Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San
               Francisco International Airport, California, USA},
  booktitle = {SECON},
  publisher = {IEEE},
  year = {2008}
}
@inproceedings{MooreCNA07esas,
  author = {Tyler Moore and
               Jolyon Clulow and
               Shishir Nagaraja and
               Ross Anderson},
  title = {New Strategies for Revocation in Ad-Hoc Networks},
  booktitle = {ESAS},
  year = {2007},
  pages = {232-246},
  puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17},
  url = {http://lyle.smu.edu/~tylerm/esas07.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/esas07-pres.pdf},
  crossref = {2007esas}
}
@proceedings{2007esas,
  editor = {Frank Stajano and
               Catherine Meadows and
               Srdjan Capkun and
               Tyler Moore},
  title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th
               European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,
               Proceedings},
  booktitle = {ESAS},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4572},
  year = {2007},
  isbn = {978-3-540-73274-7}
}
@inproceedings{MooreC07sec,
  author = {Tyler Moore and
               Jolyon Clulow},
  title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution
               Schemes in Sensor Networks},
  booktitle = {SEC},
  year = {2007},
  pages = {157-168},
  puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14},
  url = {http://lyle.smu.edu/~tylerm/ifipsec2007-path.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ifipsec-pres.pdf},
  crossref = {2007sec}
}
@proceedings{2007sec,
  editor = {Hein S. Venter and
               Mariki M. Eloff and
               Les Labuschagne and
               Jan H. P. Eloff and
               Rossouw von Solms},
  title = {New Approaches for Security, Privacy and Trust in Complex
               Environments, Proceedings of the IFIP TC-11 22nd International
               Information Security Conference (SEC 2007), 14-16 May 2007,
               Sandton, South Africa},
  booktitle = {SEC},
  publisher = {Springer},
  series = {IFIP},
  volume = {232},
  year = {2007},
  isbn = {978-0-387-72366-2}
}
@article{ClulowM06sigops,
  author = {Jolyon Clulow and
               Tyler Moore},
  title = {Suicide for the common good: a new strategy for credential
               revocation in self-organizing systems},
  journal = {Operating Systems Review},
  volume = {40},
  number = {3},
  year = {2006},
  pages = {18-21},
  puburl = {http://doi.acm.org/10.1145/1151374.1151381}
}
@inproceedings{ClulowHKM06esas,
  author = {Jolyon Clulow and
               Gerhard P. Hancke and
               Markus G. Kuhn and
               Tyler Moore},
  title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless
               Networks},
  booktitle = {ESAS},
  year = {2006},
  pages = {83-97},
  puburl = {http://dx.doi.org/10.1007/11964254_9},
  url = {http://lyle.smu.edu/~tylerm/esas2006-distance.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/esas-pres.pdf},
  crossref = {2006esas}
}
@proceedings{2006esas,
  editor = {Levente Butty{\'a}n and
               Virgil D. Gligor and
               Dirk Westhoff},
  title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third
               European Workshop, ESAS 2006, Hamburg, Germany, September
               20-21, 2006, Revised Selected Papers},
  booktitle = {ESAS},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4357},
  year = {2006},
  isbn = {978-3-540-69172-3}
}
@inproceedings{Moore06percom,
  author = {Tyler Moore},
  title = {A Collusion Attack on Pairwise Key Predistribution Schemes
               for Distributed Sensor Networks},
  booktitle = {PerCom Workshops},
  year = {2006},
  pages = {251-255},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3},
  url = {http://lyle.smu.edu/~tylerm/persec06-moore.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/persec06-moore-pres.pdf},
  crossref = {2006wpercom}
}
@proceedings{2006wpercom,
  title = {4th IEEE Conference on Pervasive Computing and Communications
               Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa,
               Italy},
  booktitle = {PerCom Workshops},
  publisher = {IEEE Computer Society},
  year = {2006},
  isbn = {0-7695-2520-2}
}
@article{CankayaNC13csi,
  author = {Ebru C. Cankaya and
               Suku Nair and
               Hakki C. Cankaya},
  title = {Applying error correction codes to achieve security and
               dependability},
  journal = {Computer Standards {\&} Interfaces},
  volume = {35},
  number = {1},
  year = {2013},
  pages = {78-86},
  puburl = {http://dx.doi.org/10.1016/j.csi.2012.06.009}
}
@inproceedings{PapaCN11host,
  author = {Stephen M. Papa and
               William D. Casper and
               Suku Nair},
  title = {Placement of trust anchors in embedded computer systems},
  booktitle = {HOST},
  year = {2011},
  pages = {111-116},
  puburl = {http://dx.doi.org/10.1109/HST.2011.5955006},
  crossref = {2011host},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011host,
  title = {HOST 2011, Proceedings of the 2011 IEEE International Symposium
               on Hardware-Oriented Security and Trust (HOST), 5-6 June
               2011, San Diego, California, USA},
  booktitle = {HOST},
  publisher = {IEEE Computer Society},
  year = {2011},
  isbn = {978-1-4577-1059-9},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5946040},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairAA11iwcmc,
  author = {Suku Nair and
               Subil Abraham and
               Omar Al-Ibrahim},
  title = {Security architecture for resource-limited environments},
  booktitle = {IWCMC},
  year = {2011},
  pages = {412-417},
  puburl = {http://dx.doi.org/10.1109/IWCMC.2011.5982569},
  crossref = {2011iwcmc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011iwcmc,
  title = {Proceedings of the 7th International Wireless Communications
               and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey,
               4-8 July, 2011},
  booktitle = {IWCMC},
  publisher = {IEEE},
  year = {2011},
  isbn = {978-1-4244-9539-9},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5963770},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Al-IbrahimN11iwcmc,
  author = {Omar Al-Ibrahim and
               Suku Nair},
  title = {Cyber-physical security using system-level PUFs},
  booktitle = {IWCMC},
  year = {2011},
  pages = {1672-1676},
  puburl = {http://dx.doi.org/10.1109/IWCMC.2011.5982786},
  crossref = {2011iwcmc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{krier2011cloaking,
  title = {Cloaking {R}{F}{I}{D} tags},
  author = {Paul Krier and Sai Seshabhattar and Daniel Engels and Suku Nair},
  booktitle = {Consumer Communications and Networking Conference},
  pages = {1036--1040},
  month = jan,
  year = {2011},
  organization = {IEEE},
  puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5766323}
}
@proceedings{2011iwcmc,
  title = {Proceedings of the 7th International Wireless Communications
               and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey,
               4-8 July, 2011},
  booktitle = {IWCMC},
  publisher = {IEEE},
  year = {2011},
  isbn = {978-1-4244-9539-9},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5963770},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{MorrisN10wicomm,
  author = {Thomas H. Morris and
               V. S. S. Nair},
  title = {Private computing on public platforms: portable application
               security},
  journal = {Wireless Communications and Mobile Computing},
  volume = {10},
  number = {7},
  year = {2010},
  pages = {942-958},
  puburl = {http://dx.doi.org/10.1002/wcm.804},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Abu-NimehN10wicomm,
  author = {Saeed Abu-Nimeh and
               Suku Nair},
  title = {Circumventing security toolbars and phishing filters {\it via}
               rogue wireless access points},
  journal = {Wireless Communications and Mobile Computing},
  volume = {10},
  number = {8},
  year = {2010},
  pages = {1128-1139},
  puburl = {http://dx.doi.org/10.1002/wcm.829},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KrierSPEN10mass,
  author = {Paul Krier and
               Sai Seshabhattar and
               Jason Pereira and
               Daniel W. Engels and
               Suku Nair},
  title = {Lightweight key agreement with key chaining},
  booktitle = {MASS},
  year = {2010},
  pages = {594-599},
  puburl = {http://dx.doi.org/10.1109/MASS.2010.5663878},
  crossref = {2010mass},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010mass,
  title = {IEEE 7th International Conference on Mobile Adhoc and Sensor
               Systems, MASS 2010, 8-12 November 2010, San Francisco, CA,
               USA},
  booktitle = {MASS},
  publisher = {IEEE},
  year = {2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNWN09icc,
  author = {Saeed Abu-Nimeh and
               Dario Nappa and
               Xinlei Wang and
               Suku Nair},
  title = {Distributed Phishing Detection by Applying Variable Selection
               Using Bayesian Additive Regression Trees},
  booktitle = {ICC},
  year = {2009},
  pages = {1-5},
  puburl = {http://dx.doi.org/10.1109/ICC.2009.5198931},
  crossref = {2009icc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009icc,
  title = {Proceedings of IEEE International Conference on Communications,
               ICC 2009, Dresden, Germany, 14-18 June 2009},
  booktitle = {ICC},
  publisher = {IEEE},
  year = {2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN09percom,
  author = {Thomas H. Morris and
               V. S. S. Nair},
  title = {Encryption Key Protection for Private Computing on Public
               Platforms},
  booktitle = {PerCom Workshops},
  year = {2009},
  pages = {1-6},
  puburl = {http://dx.doi.org/10.1109/PERCOM.2009.4912897},
  crossref = {2009wpercom},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009wpercom,
  title = {Seventh Annual IEEE International Conference on Pervasive
               Computing and Communications - Workshops (PerCom Workshops
               2009), 9-13 March 2009, Galveston, TX, USA},
  booktitle = {PerCom Workshops},
  publisher = {IEEE Computer Society},
  year = {2009},
  isbn = {978-1-4244-3304-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairNMCA08cn,
  author = {Padmaraj M. V. Nair and
               Suku Nair and
               Marco F. Marchetti and
               Girish Chiruvolu and
               Maher Ali},
  title = {Bandwidth sensitive fast failure recovery scheme for Metro
               Ethernet},
  journal = {Computer Networks},
  volume = {52},
  number = {8},
  year = {2008},
  pages = {1603-1616},
  puburl = {http://dx.doi.org/10.1016/j.comnet.2008.02.002},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN08IEEEares,
  author = {Thomas H. Morris and
               V. S. S. Nair},
  title = {Privacy Protected ELF for Private Computing on Public Platforms},
  booktitle = {ARES},
  year = {2008},
  pages = {452-457},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ARES.2008.160},
  crossref = {2008IEEEares},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008IEEEares,
  title = {Proceedings of the The Third International Conference on
               Availability, Reliability and Security, ARES 2008, March
               4-7, 2008, Technical University of Catalonia, Barcelona
               , Spain},
  booktitle = {ARES},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNWN08IEEEares,
  author = {Saeed Abu-Nimeh and
               Dario Nappa and
               Xinlei Wang and
               Suku Nair},
  title = {Bayesian Additive Regression Trees-Based Spam Detection
               for Enhanced Email Privacy},
  booktitle = {ARES},
  year = {2008},
  pages = {1044-1051},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ARES.2008.136},
  crossref = {2008IEEEares},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008IEEEares,
  title = {Proceedings of the The Third International Conference on
               Availability, Reliability and Security, ARES 2008, March
               4-7, 2008, Technical University of Catalonia, Barcelona
               , Spain},
  booktitle = {ARES},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehN08globecom,
  author = {Saeed Abu-Nimeh and
               Suku Nair},
  title = {Bypassing Security Toolbars and Phishing Filters via DNS
               Poisoning},
  booktitle = {GLOBECOM},
  year = {2008},
  pages = {2001-2006},
  puburl = {http://dx.doi.org/10.1109/GLOCOM.2008.ECP.386},
  crossref = {2008globecom},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008globecom,
  title = {Proceedings of the Global Communications Conference, 2008.
               GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December
               2008},
  booktitle = {GLOBECOM},
  publisher = {IEEE},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN08globecom,
  author = {Thomas H. Morris and
               V. S. S. Nair},
  title = {Secure Context Switch for Private Computing on Public Platforms},
  booktitle = {GLOBECOM},
  year = {2008},
  pages = {2159-2163},
  puburl = {http://dx.doi.org/10.1109/GLOCOM.2008.ECP.416},
  crossref = {2008globecom},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008globecom,
  title = {Proceedings of the Global Communications Conference, 2008.
               GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December
               2008},
  booktitle = {GLOBECOM},
  publisher = {IEEE},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNWN07ecrime,
  author = {Saeed Abu-Nimeh and
               Dario Nappa and
               Xinlei Wang and
               Suku Nair},
  title = {A comparison of machine learning techniques for phishing
               detection},
  booktitle = {eCrime Researchers Summit},
  year = {2007},
  pages = {60-69},
  puburl = {http://doi.acm.org/10.1145/1299015.1299021},
  crossref = {2007ecrime},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ecrime,
  editor = {Lorrie Faith Cranor},
  title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual
               eCrime Researchers Summit 2007,  Pittsburgh, Pennsylvania,
               USA, October 4-5, 2007},
  booktitle = {eCrime Researchers Summit},
  publisher = {ACM},
  series = {ACM International Conference Proceeding Series},
  volume = {269},
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007hase,
  title = {Tenth IEEE International Symposium on High Assurance Systems
               Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas,
               USA},
  booktitle = {HASE},
  publisher = {IEEE Computer Society},
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN07ipps,
  author = {Thomas H. Morris and
               V. S. S. Nair},
  title = {PCPP: On Remote Host Assessment via Naive Bayesian Classification},
  booktitle = {IPDPS},
  year = {2007},
  pages = {1-8},
  puburl = {http://dx.doi.org/10.1109/IPDPS.2007.370619},
  crossref = {2007ipps},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ipps,
  title = {21th International Parallel and Distributed Processing Symposium
               (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach,
               California, USA},
  booktitle = {IPDPS},
  publisher = {IEEE},
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNM06aiccsa,
  author = {Saeed Abu-Nimeh and
               Suku Nair and
               Marco F. Marchetti},
  title = {An Experimental and Industrial Experience: Avoiding Denial
               of Service via Memory Profiling},
  booktitle = {AICCSA},
  year = {2006},
  pages = {151-158},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205083},
  crossref = {2006aiccsa},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
  title = {2006 IEEE/ACS International Conference on Computer Systems
               and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
               UAE},
  booktitle = {AICCSA},
  publisher = {IEEE},
  year = {2006},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNM06aaiccsa,
  author = {Saeed Abu-Nimeh and
               Suku Nair and
               Marco F. Marchetti},
  title = {Avoiding Denial of Service via Stress Testing},
  booktitle = {AICCSA},
  year = {2006},
  pages = {300-307},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205105},
  crossref = {2006aiccsa},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
  title = {2006 IEEE/ACS International Conference on Computer Systems
               and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
               UAE},
  booktitle = {AICCSA},
  publisher = {IEEE},
  year = {2006},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DeprezPN06aiccsa,
  author = {George Deprez and
               M. Padmaraj and
               Suku Nair},
  title = {Distributed fault management protocol for Heterogeneous
               Networks},
  booktitle = {AICCSA},
  year = {2006},
  pages = {744-747},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205173},
  crossref = {2006aiccsa},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
  title = {2006 IEEE/ACS International Conference on Computer Systems
               and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
               UAE},
  booktitle = {AICCSA},
  publisher = {IEEE},
  year = {2006},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AliCGPNM06aiccsa,
  author = {Maher Ali and
               Girish Chiruvolu and
               An Ge and
               M. Padmaraj and
               Suku Nair and
               Marco F. Marchetti},
  title = {Differentiated Survivability in Ethernet-Based MAN/WAN},
  booktitle = {AICCSA},
  year = {2006},
  pages = {906-910},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205196},
  crossref = {2006aiccsa},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
  title = {2006 IEEE/ACS International Conference on Computer Systems
               and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
               UAE},
  booktitle = {AICCSA},
  publisher = {IEEE},
  year = {2006},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairNMCA06icn,
  author = {Padmaraj M. V. Nair and
               Suku Nair and
               Marco F. Marchetti and
               Girish Chiruvolu and
               Maher Ali},
  title = {Distributed Restoration Method for Metro Ethernet},
  booktitle = {ICN/ICONS/MCL},
  year = {2006},
  pages = {94},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ICNICONSMCL.2006.80},
  crossref = {2006icn},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006icn,
  title = {Fifth International Conference on Networking and the International
               Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April
               2006, Mauritius},
  booktitle = {ICN/ICONS/MCL},
  publisher = {IEEE Computer Society},
  year = {2006},
  isbn = {0-7695-2552-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{PadmarajNMCA05icw,
  author = {M. Padmaraj and
               Suku Nair and
               Marco F. Marchetti and
               Girish Chiruvolu and
               Maher Ali},
  title = {Traffic Engineering in Enterprise Ethernet with Multiple
               Spanning Tree Regions},
  booktitle = {ICW/ICHSN/ICMCS/SENET},
  year = {2005},
  pages = {261-266},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ICW.2005.78},
  crossref = {2005icw},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005icw,
  title = {Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET
               2005), 14-17 August 2005, Montreal, Canada},
  booktitle = {ICW/ICHSN/ICMCS/SENET},
  publisher = {IEEE Computer Society},
  year = {2005},
  isbn = {0-7695-2422-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{CankayaN99cn,
  author = {Hakki C. Cankaya and
               V. S. S. Nair},
  title = {Improved survivability analysis for SONET SHRs},
  journal = {Computer Networks},
  volume = {31},
  number = {23-24},
  year = {1999},
  pages = {2505-2528},
  puburl = {http://dx.doi.org/10.1016/S1389-1286(99)00118-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{AlkhalifaNKA99tpds,
  author = {Zeyad Alkhalifa and
               V. S. S. Nair and
               Narayanan Krishnamurthy and
               Jacob A. Abraham},
  title = {Design and Evaluation of System-Level Checks for On-Line
               Control Flow Error Detection},
  journal = {IEEE Trans. Parallel Distrib. Syst.},
  volume = {10},
  number = {6},
  year = {1999},
  pages = {627-641},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/71.774911},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CankayaN98icccn,
  author = {Hakki C. Cankaya and
               V. S. S. Nair},
  title = {Hierarchical Approach to Performance Analysis of Self-Healing
               SONET Networks},
  booktitle = {ICCCN},
  year = {1998},
  pages = {362-369},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ICCCN.1998.998797},
  crossref = {1998icccn},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1998icccn,
  title = {Proceedings of the International Conference On Computer
               Communications and Networks (ICCCN 1998),  October 12-15,
               1998, Lafayette, Louisiana, USA},
  booktitle = {ICCCN},
  publisher = {IEEE},
  year = {1998},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CankayaN98sigcomm,
  author = {Hakki C. Cankaya and
               V. S. S. Nair},
  title = {Accelerated Reliability Analysis for Self-Healing SONET
               Networks},
  booktitle = {SIGCOMM},
  year = {1998},
  pages = {268-277},
  puburl = {http://doi.acm.org/10.1145/285237.285288},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{PillaiN97infsof,
  author = {Krichnakumar Pillai and
               V. S. S. Nair},
  title = {Statistical analysis of nonstationary software metrics},
  journal = {Information {\&} Software Technology},
  volume = {39},
  number = {5},
  year = {1997},
  pages = {363-373},
  puburl = {http://dx.doi.org/10.1016/S0950-5849(96)00002-X},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{KimN97jss,
  author = {Hyun C. Kim and
               V. S. S. Nair},
  title = {Software fault tolerance for distributed object based computing},
  journal = {Journal of Systems and Software},
  volume = {39},
  number = {2},
  year = {1997},
  pages = {103-117},
  puburl = {http://dx.doi.org/10.1016/S0164-1212(96)00167-7},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{PillaiN97tse,
  author = {Krichnakumar Pillai and
               V. S. S. Nair},
  title = {A Model for Software Development Effort and Cost Estimation},
  journal = {IEEE Trans. Software Eng.},
  volume = {23},
  number = {8},
  year = {1997},
  pages = {485-497},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/32.624305},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlkhalifaN97hase,
  author = {Zeyad Alkhalifa and
               V. S. S. Nair},
  title = {Design of a Portable Control-Flow Checking Technique},
  booktitle = {HASE},
  year = {1997},
  pages = {120-123},
  puburl = {http://dlib2.computer.org/conferen/hase/7971/pdf/79710120.pdf},
  crossref = {1997hase},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1997hase,
  title = {2nd High-Assurance Systems Engineering Workshop (HASE '97),
               August 11-12, 1997, Washington, DC, USA, Proceedings},
  booktitle = {HASE},
  publisher = {IEEE Computer Society},
  year = {1997},
  isbn = {0-8186-7971-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairAB96tc,
  author = {V. S. S. Nair and
               Jacob A. Abraham and
               Prithviraj Banerjee},
  title = {Efficient Techniques for the Analysis of Algorithm-Based
               Fault Tolerance (ABFT) Schemes},
  journal = {IEEE Trans. Computers},
  volume = {45},
  number = {4},
  year = {1996},
  pages = {499-503},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/12.494110},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KimN95compsac,
  author = {Hyun C. Kim and
               V. S. S. Nair},
  title = {Application layer software fault tolerance for distributed
               object-oriented systems},
  booktitle = {COMPSAC},
  year = {1995},
  pages = {199-204},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/CMPSAC.1995.524780},
  crossref = {1995compsac},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1995compsac,
  title = {19th International Computer Software and Applications Conference
               (COMPSAC'95), August 9-11, 1995, Dallas, Texas, USA},
  booktitle = {COMPSAC},
  publisher = {IEEE Computer Society},
  year = {1995},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{X95acompsac,
  author = {V. S. S. Nair},
  title = {Software Fault Tolerance: Has it Arrived Yet?},
  booktitle = {COMPSAC},
  year = {1995},
  pages = {390},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/COMPSAC.1995.10009},
  crossref = {1995compsac},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1995compsac,
  title = {19th International Computer Software and Applications Conference
               (COMPSAC'95), August 9-11, 1995, Dallas, Texas, USA},
  booktitle = {COMPSAC},
  publisher = {IEEE Computer Society},
  year = {1995},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ErbasTN94paapp,
  author = {Cengiz Erbas and
               Murat M. Tanik and
               V. S. S. Nair},
  title = {Parallel Memory Allocation and Data Alignment in Simd Machines},
  journal = {Parallel Algorithms Appl.},
  volume = {4},
  number = {1-2},
  year = {1994},
  pages = {139-151},
  puburl = {http://dx.doi.org/10.1080/10637199408915460},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ErbasTN93spdp,
  author = {Cengiz Erbas and
               Murat M. Tanik and
               V. S. S. Nair},
  title = {A Circulant Matrix Based Approach to Storage Schemes for
               Parallel Memory Systems},
  booktitle = {SPDP},
  year = {1993},
  pages = {92-99},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairHA92tc,
  author = {V. S. S. Nair and
               Yatin Vasant Hoskote and
               Jacob A. Abraham},
  title = {Probabilistic Evaluation of On-Line Checks in Fault-Tolerant
               Multiprocessor Systems},
  journal = {IEEE Trans. Computers},
  volume = {41},
  number = {5},
  year = {1992},
  pages = {532-541},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/12.142679},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairA90tc,
  author = {V. S. S. Nair and
               Jacob A. Abraham},
  title = {Real-Number Codes for Bault-Tolerant Matrix Operations On
               Processor Arrays},
  journal = {IEEE Trans. Computers},
  volume = {39},
  number = {4},
  year = {1990},
  pages = {426-435},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/12.54836},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{BanerjeeRSNRBA90tc,
  author = {Prithviraj Banerjee and
               Joseph T. Rahmeh and
               Craig B. Stunkel and
               V. S. S. Nair and
               Kaushik Roy and
               Vijay Balasubramanian and
               Jacob A. Abraham},
  title = {Algorithm-Based Fault Tolerance on a Hypercube Multiprocessor},
  journal = {IEEE Trans. Computers},
  volume = {39},
  number = {9},
  year = {1990},
  pages = {1132-1145},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/12.57055},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairA90ftcs,
  author = {Suku Nair and
               Jacob A. Abraham},
  title = {Hierarchical design and analysis of fault-tolerant multiprocessor
               systems using concurrent error detection},
  booktitle = {FTCS},
  year = {1990},
  pages = {130-137},
  puburl = {http://dx.doi.org/10.1109/FTCS.1990.89348},
  crossref = {1990ftcs},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1990ftcs,
  title = {Proceedings of the 20th International Symposium on Fault-Tolerant
               Computing, FTCS 1990, Newcastle Upon Tyne, UK, 26-28 June,
               1990},
  booktitle = {FTCS},
  publisher = {IEEE Computer Society},
  year = {1990},
  isbn = {0-8186-2051-X},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=292},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairA88ftcs,
  author = {Suku Nair and
               Jacob A. Abraham},
  title = {General linear codes for fault-tolerant matrix operations
               on processor arrays},
  booktitle = {FTCS},
  year = {1988},
  pages = {180-185},
  puburl = {http://dx.doi.org/10.1109/FTCS.1988.5317},
  crossref = {1988ftcs},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1988ftcs,
  title = {Proceedings of the Eighteenth International Symposium on
               Fault-Tolerant Computing, FTCS 1988, Tokyo, Japan, 27-30
               June, 1988},
  booktitle = {FTCS},
  publisher = {IEEE Computer Society},
  year = {1988},
  isbn = {0-8186-0867-6},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=210},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BanerjeeRSNRA88ftcs,
  author = {Prithviraj Banerjee and
               Joseph T. Rahmeh and
               Craig B. Stunkel and
               V. S. S. Nair and
               Kaushik Roy and
               Jacob A. Abraham},
  title = {An evaluation of system-level fault tolerance on the Intel
               hypercube multiprocessor},
  booktitle = {FTCS},
  year = {1988},
  pages = {362-367},
  puburl = {http://dx.doi.org/10.1109/FTCS.1988.5344},
  crossref = {1988ftcs},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1988ftcs,
  title = {Proceedings of the Eighteenth International Symposium on
               Fault-Tolerant Computing, FTCS 1988, Tokyo, Japan, 27-30
               June, 1988},
  booktitle = {FTCS},
  publisher = {IEEE Computer Society},
  year = {1988},
  isbn = {0-8186-0867-6},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=210},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{moore13mwscas,
  title = {Low Power Floating-Point Multiplication 
and Squaring Units with Shared Circuitry},
  author = {Jason Moore and Mitchell A. Thornton and David W. Matula},
  booktitle = {{IEEE} Midwest Symposium on Circuits and Systems (MWSCAS)},
  month = aug,
  year = 2013,
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/mwscas13.pdf}
}
@inproceedings{thornton13fie,
  title = {Embedded and Real-time Systems Classes in Traditional and Distance Format},
  booktitle = {Frontiers in Education Conference (FIE)},
  month = oct,
  year = {2013},
  author = {Mitchell A. Thornton and Theodore W. Manikas Manikas and Phillip A. Laplante},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/fie13.pdf}
}
@inproceedings{ThorntonISMVL13-3,
  title = {Spectral Response of Ternary Logic Netlists},
  author = {Mitchell A. Thornton and Theodore W. Manikas},
  booktitle = {IEEE International Symposium on Multiple-Valued Logic},
  month = may,
  year = {2013},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl13c.pdf}
}
@inproceedings{ManikasRMW13,
  title = {Mission Planning Analysis using Decision Diagrams},
  author = {Theodore W. Manikas and Mitchell A. Thornton and Frederick R. Chang},
  booktitle = {Workshop on Applications of the Reed-Muller Expansion in Circuit Design},
  month = may,
  year = {2013}
}
@inproceedings{ThorntonISMVL13-2,
  title = {A Transfer Function Model for Ternary Switching Logic Circuits},
  author = {Mitchell A. Thornton},
  booktitle = {IEEE International Symposium on Multiple-Valued Logic},
  month = may,
  year = {2013},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl13a.pdf}
}
@inproceedings{ImpagliazzoCDMTW12,
  author = {John Impagliazzo and
               Susan Conry and
               Eric Durant and
               Andrew D. McGettrick and
               Mitchell A. Thornton and
               Timothy Wilson},
  title = {Computer engineering review task force report},
  booktitle = {SIGCSE},
  month = feb,
  year = {2012},
  pages = {401-402},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/sigcse12.pdf},
  puburl = {http://doi.acm.org/10.1145/2157136.2157256},
  crossref = {sigcse12},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{sigcse12,
  editor = {Laurie A. Smith King and
               David R. Musicant and
               Tracy Camp and
               Paul T. Tymann},
  title = {43rd ACM technical symposium on Computer
               science education},
  booktitle = {SIGCSE},
  publisher = {ACM},
  year = {2012},
  isbn = {978-1-4503-1098-7},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Thornton12cse,
  author = {Mitchell A. Thornton},
  title = {Professional Licensure for Software Engineers: An Update},
  journal = {Computing in Science and Engineering},
  volume = {14},
  number = {5},
  year = {2012},
  pages = {85-87},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/cise12.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MCSE.2012.104},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{FeinsteinT12mvl,
  author = {David Y. Feinstein and
               Mitchell A. Thornton},
  title = {Reversible Logic Synthesis Based on Decision Diagram Variable
               Ordering},
  journal = {Multiple-Valued Logic and Soft Computing},
  volume = {19},
  number = {4},
  year = {2012},
  pages = {325-339},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/jmvl12.pdf},
  puburl = {http://www.oldcitypublishing.com/MVLSC/MVLSCabstracts/MVLSC19.4abstracts/MVLSCv19n4p325-339Feinstein.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseST12async,
  author = {Robert B. Reese and
               Scott C. Smith and
               Mitchell A. Thornton},
  title = {Uncle - An {R}{T}{L} Approach to Asynchronous Design},
  booktitle = {ASYNC},
  year = {2012},
  pages = {65-72},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/async12.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ASYNC.2012.14},
  crossref = {2012async}
}
@proceedings{2012async,
  editor = {Jens Spars{\o} and
               Montek Singh and
               Pascal Vivet},
  title = {18th IEEE International Symposium on Asynchronous Circuits
               and Systems},
  booktitle = {ASYNC},
  publisher = {IEEE Computer Society},
  month = may,
  year = {2012},
  isbn = {978-1-4673-1360-5},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6242773}
}
@inproceedings{MenonT12ismvl,
  author = {Rohit P. Menon and
               Mitchell A. Thornton},
  title = {Global Multiple-Valued Clock Approach for High-Performance
               Multi-phase Clock Integrated Circuits},
  booktitle = {ISMVL},
  year = {2012},
  pages = {19-24},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl12b.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2012.30},
  crossref = {2012ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012ismvl,
  editor = {D. Michael Miller and
               Vincent C. Gaudet},
  title = {42nd IEEE International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE},
  year = {2012},
  isbn = {978-1-4673-0908-0},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6214742}
}
@inproceedings{FeinsteinT12ismvl,
  author = {David Y. Feinstein and
               Mitchell A. Thornton},
  title = {Using the Asynchronous Paradigm for Reversible Sequential
               Circuit Implementation},
  booktitle = {ISMVL},
  year = {2012},
  pages = {305-310},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl12a.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2012.33},
  crossref = {2012ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinT11ismvl,
  author = {David Y. Feinstein and
               Mitchell A. Thornton},
  title = {On the Skipped Variables of Quantum Multiple-Valued Decision
               Diagrams},
  booktitle = {ISMVL},
  year = {2011},
  pages = {164-169},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl11b.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2011.22},
  crossref = {2011ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011ismvl,
  editor = {Jaakko Astola and
               Radomir S. Stankovic},
  title = {41st IEEE International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE},
  month = may,
  year = {2011},
  isbn = {978-0-7695-4405-2},
  puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5952386}
}
@incollection{Thornton11crypt,
  author = {Mitchell A. Thornton},
  title = {Keystroke Dynamics},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  publisher = {Springer},
  year = {2011},
  pages = {688-691},
  url = {http://lyle.smu.edu/},
  puburl = {http://dx.doi.org/10.1007/978-1-4419-5906-5_783},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{2010Lisynthesis,
  author = {Lun Li and
               Mitchell A. Thornton},
  title = {Digital System Verification: A Combined Formal Methods and
               Simulation Framework},
  booktitle = {Digital System Verification: A Combined Formal Methods and
               Simulation Framework},
  publisher = {Morgan {\&} Claypool Publishers},
  series = {Synthesis Lectures on Digital Circuits and Systems},
  year = {2010},
  puburl = {http://dx.doi.org/10.2200/S00257ED1V01Y201002DCS027},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{BarrettT10cse,
  author = {Steven F. Barrett and
               Mitchell A. Thornton},
  title = {To {P}{E} or not to {P}{E}: the Sequel},
  journal = {Computing in Science and Engineering},
  volume = {12},
  number = {4},
  year = {2010},
  pages = {62-65},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/cise10.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MCSE.2010.90},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DatlaT10ismvl,
  author = {Satyendra R. Datla and
               Mitchell A. Thornton},
  title = {Quaternary Voltage-Mode Logic Cells and Fixed-Point Multiplication
               Circuits},
  booktitle = {ISMVL},
  year = {2010},
  pages = {128-133},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl10.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2010.32},
  crossref = {2010ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010ismvl,
  title = {40th IEEE International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  month = may,
  year = {2010},
  isbn = {978-0-7695-4024-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{FeinsteinTM09mvl,
  author = {David Y. Feinstein and
               Mitchell A. Thornton and
               D. Michael Miller},
  title = {Minimization of Quantum Multiple-valued Decision Diagrams
               Using Data Structure Metrics},
  journal = {Multiple-Valued Logic and Soft Computing},
  volume = {15},
  number = {4},
  year = {2009},
  pages = {361-377},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/jmvl09.pdf},
  puburl = {http://www.oldcitypublishing.com/MVLSC/MVLSCabstracts/MVLSC15.4abstracts/MVLSCv15n4p361-377Feinstein.html}
}
@article{Fit-FloreaLTM09tc,
  author = {Alex Fit-Florea and
               Lun Li and
               Mitchell A. Thornton and
               David W. Matula},
  title = {A Discrete Logarithm Number System for Integer Arithmetic
               Modulo 2$^{\mbox{k}}$: Algorithms and Lookup Structures},
  journal = {IEEE Trans. Computers},
  volume = {58},
  number = {2},
  year = {2009},
  pages = {163-174},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/tcomp09.pdf},
  puburl = {http://dx.doi.org/10.1109/TC.2008.204},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DatlaTM09asap,
  author = {Satyendra R. Datla and
               Mitchell A. Thornton and
               David W. Matula},
  title = {A Low Power High Performance Radix-4 Approximate Squaring
               Circuit},
  booktitle = {ASAP},
  year = {2009},
  pages = {91-97},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/asap09.pdf},
  puburl = {http://dx.doi.org/10.1109/ASAP.2009.35},
  crossref = {2009asap},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009asap,
  title = {20th IEEE International Conference on Application-Specific
               Systems, Architectures and Processors, ASAP 2009, July 7-9,
               2009, Boston, MA, USA},
  booktitle = {ASAP},
  publisher = {IEEE},
  year = {2009},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinT09ismvl,
  author = {David Y. Feinstein and
               Mitchell A. Thornton},
  title = {On the Guidance of Reversible Logic Synthesis by Dynamic
               Variable Reordering},
  booktitle = {ISMVL},
  year = {2009},
  pages = {132-138},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl09a.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2009.31},
  crossref = {2009ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009ismvl,
  title = {ISMVL 2009, 39th International Symposium on Multiple-Valued
               Logic, 21-23 May 2009, Naha, Okinawaw, Japan},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2009},
  isbn = {978-0-7695-3607-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DatlaTHH09ismvl,
  author = {Satyendra R. Datla and
               Mitchell A. Thornton and
               Luther Hendrix and
               Dave Henderson},
  title = {Quaternary Addition Circuits Based on {S}{U}{S}{L}{O}{C} Voltage-Mode
               Cells and Modeling with SystemVerilog},
  booktitle = {ISMVL},
  year = {2009},
  pages = {256-261},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl09b.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2009.66},
  crossref = {2009ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009ismvl,
  title = {ISMVL 2009, 39th International Symposium on Multiple-Valued
               Logic, 21-23 May 2009, Naha, Okinawaw, Japan},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2009},
  isbn = {978-0-7695-3607-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{2007Millersynthesis,
  author = {D. Michael Miller and
               Mitchell A. Thornton},
  title = {Multiple Valued Logic: Concepts and Representations},
  booktitle = {Multiple Valued Logic},
  publisher = {Morgan {\&} Claypool Publishers},
  series = {Synthesis Lectures on Digital Circuits and Systems},
  year = {2007},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://www.morganclaypool.com/doi/abs/10.2200/S00065ED1V01Y200709DCS012},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{LawlerHST08ijbis,
  author = {Chad M. Lawler and
               Michael A. Harper and
               Stephen A. Szygenda and
               Mitchell A. Thornton},
  title = {Components of disaster-tolerant computing: {A}nalysis of disaster
               recovery, {I}{T} application downtime and executive visibility},
  journal = {IJBIS},
  volume = {3},
  number = {3},
  year = {2008},
  pages = {317-331},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ijbis08.pdf},
  puburl = {http://dx.doi.org/10.1504/IJBIS.2008.017288},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinTM08date,
  author = {David Y. Feinstein and
               Mitchell A. Thornton and
               D. Michael Miller},
  title = {Partially Redundant Logic Detection Using Symbolic Equivalence
               Checking in Reversible and Irreversible Logic Circuits},
  booktitle = {DATE},
  year = {2008},
  pages = {1378-1381},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/date08.pdf},
  puburl = {http://dx.doi.org/10.1109/DATE.2008.4484932},
  crossref = {2008date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008date,
  title = {Design, Automation and Test in Europe, DATE 2008, Munich,
               Germany, March 10-14, 2008},
  booktitle = {DATE},
  publisher = {IEEE},
  year = {2008},
  isbn = {978-3-9810801-3-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinTM08ismvl,
  author = {David Y. Feinstein and
               Mitchell A. Thornton and
               D. Michael Miller},
  title = {On the Data Structure Metrics of Quantum Multiple-Valued
               Decision Diagrams},
  booktitle = {ISMVL},
  year = {2008},
  pages = {138-143},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl08b.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2008.28},
  crossref = {2008ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008ismvl,
  title = {38th IEEE International Symposium on Multiple-Valued Logic
               (ISMVL 2008), 22-23 May 2008, Dallas, Texas, USA},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonMSM08ismvl,
  author = {Mitchell A. Thornton and
               David W. Matula and
               Laura Spenner and
               D. Michael Miller},
  title = {Quantum Logic Implementation of Unary Arithmetic Operations},
  booktitle = {ISMVL},
  year = {2008},
  pages = {202-207},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl08a.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2008.27},
  crossref = {2008ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008ismvl,
  title = {38th IEEE International Symposium on Multiple-Valued Logic
               (ISMVL 2008), 22-23 May 2008, Dallas, Texas, USA},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2008},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{MillerFT07mvl,
  author = {D. Michael Miller and
               David Y. Feinstein and
               Mitchell A. Thornton},
  title = {QMDD Minimization Using Sifting for Variable Reordering},
  journal = {Multiple-Valued Logic and Soft Computing},
  volume = {13},
  number = {4-6},
  year = {2007},
  pages = {537-552},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/jmvl07.pdf},
  puburl = {http://www.oldcitypublishing.com/MVLSC/MVLSCabstracts/MVLSC13.4-6abstracts/MVLSCv13n4-6p537-552Miller.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiCT07fdl,
  author = {Lun Li and
               Frank P. Coyle and
               Mitchell A. Thornton},
  title = {{U}{M}{L} to {S}ystem{V}erilog Synthesisfor Embedded System Models
with Support for Assertion Generation},
  booktitle = {FDL},
  year = {2007},
  pages = {261-267},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/fdl07.pdf},
  puburl = {http://www.ecsi-association.org/ecsi/main.asp?l1=library{\&}fn=def{\&}id=267},
  crossref = {2007fdl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007fdl,
  title = {Forum on specification and Design Languages},
  booktitle = {FDL},
  publisher = {ECSI},
  month = sep,
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinNT07hase,
  author = {David Y. Feinstein and
               V. S. S. Nair and
               Mitchell A. Thornton},
  title = {Advances in Quantum Computing Fault Tolerance and Testing},
  booktitle = {HASE},
  year = {2007},
  pages = {369-370},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/hase07.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/HASE.2007.16},
  crossref = {2007hase},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007hase,
  title = {10th IEEE International Symposium on High Assurance Systems
               Engineering},
  booktitle = {HASE},
  publisher = {IEEE Computer Society},
  month = nov,
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LawlerHT07ipccc,
  author = {Chad M. Lawler and
               Michael A. Harper and
               Mitchell A. Thornton},
  title = {Components and Analysis of Disaster Tolerant Computing},
  booktitle = {IPCCC},
  year = {2007},
  pages = {380-386},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ijbis08.pdf},
  puburl = {http://dx.doi.org/10.1109/PCCC.2007.358917},
  crossref = {2007ipccc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ipccc,
  title = {26th IEEE International Performance Computing
               and Communications Conference},
  booktitle = {IPCCC},
  publisher = {IEEE Computer Society},
  month = apr,
  year = {2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MillerFT07ismvl,
  author = {D. Michael Miller and
               David Y. Feinstein and
               Mitchell A. Thornton},
  title = {Variable Reordering and Sifting for {Q}{M}{D}{D}},
  booktitle = {ISMVL},
  year = {2007},
  pages = {10},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl07a.pdf},
  puburl = {http://dx.doi.org/10.1109/ISMVL.2007.59},
  crossref = {2007ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ismvl,
  title = {37th International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  month = may,
  year = {2007},
  isbn = {978-0-7695-2831-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AmouiGTD07ismvl,
  author = {Mahsan Amoui and
               Daniel Gro{\ss}e and
               Mitchell A. Thornton and
               Rolf Drechsler},
  title = {Evaluation of Toggle Coverage for {M}{V}{L} Circuits Specified
               in the {S}ystem{V}erilog {H}{D}{L}},
  booktitle = {ISMVL},
  year = {2007},
  pages = {50},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl07b.pdf},
  puburl = {http://dx.doi.org/10.1109/ISMVL.2007.19},
  crossref = {2007ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{2006Reesesynthesis,
  author = {Robert B. Reese and
               Mitchell A. Thornton},
  title = {Introduction to Logic Synthesis using Verilog HDL},
  booktitle = {Introduction to Logic Synthesis using Verilog HDL},
  publisher = {Morgan {\&} Claypool Publishers},
  series = {Synthesis Lectures on Digital Circuits and Systems},
  year = {2006},
  puburl = {http://dx.doi.org/10.2200/S00060ED1V01Y200610DCS006},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiFTM06asap,
  author = {Lun Li and
               Alex Fit-Florea and
               Mitchell A. Thornton and
               David W. Matula},
  title = {Performance Evaluation of a Novel Direct Table Lookup Method
               and Architecture with Application to 16-bit Integer Functions},
  booktitle = {ASAP},
  year = {2006},
  pages = {99-104},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/asap06.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ASAP.2006.52},
  crossref = {2006asap},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006asap,
  title = {2006 IEEE International Conference on Application-Specific
               Systems, Architecture and Processors},
  booktitle = {ASAP},
  publisher = {IEEE Computer Society},
  month = sep,
  year = {2006},
  isbn = {0-7695-2682-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiTM06glvlsi,
  author = {Lun Li and
               Mitchell A. Thornton and
               David W. Matula},
  title = {A digit serial algorithm for the integer power operation},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  year = {2006},
  pages = {302-307},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/glsvlsi06.pdf},
  puburl = {http://doi.acm.org/10.1145/1127908.1127978},
  crossref = {2006glvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006glvlsi,
  editor = {Gang Qu and
               Yehea I. Ismail and
               Narayanan Vijaykrishnan and
               Hai Zhou},
  title = {16th ACM Great Lakes Symposium on VLSI},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  publisher = {ACM},
  year = {2006},
  isbn = {1-59593-347-6},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MillerT06ismvl,
  author = {D. Michael Miller and
               Mitchell A. Thornton},
  title = {{Q}{M}{D}{D}: A Decision Diagram Structure for Reversible and Quantum
               Circuits},
  booktitle = {ISMVL},
  year = {2006},
  pages = {30},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl06a.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2006.35},
  crossref = {2006ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiTP06ismvl,
  author = {Lun Li and
               Mitchell A. Thornton and
               Marek A. Perkowski},
  title = {A Quantum {C}{A}{D} Accelerator Based on {G}rover's Algorithm for
               Finding the Minimum Fixed Polarity {R}eed-{M}uller Form},
  booktitle = {ISMVL},
  year = {2006},
  pages = {33},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl06b.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2006.8},
  crossref = {2006ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006ismvl,
  title = {36th IEEE International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2006},
  isbn = {0-7695-2532-6},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ReeseTT05tc,
  author = {Robert B. Reese and
               Mitchell A. Thornton and
               Cherrice Traver},
  title = {A Coarse-Grain Phased Logic {C}{P}{U}},
  journal = {IEEE Trans. Computers},
  volume = {54},
  number = {7},
  year = {2005},
  pages = {788-799},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/toc05.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/TC.2005.105},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ReeseTTH05tcad,
  author = {Robert B. Reese and
               Mitchell A. Thornton and
               Cherrice Traver and
               David Hemmendinger},
  title = {Early evaluation for performance enhancement in phased logic},
  journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
  volume = {24},
  number = {4},
  year = {2005},
  pages = {532-550},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/tcad05.pdf},
  puburl = {http://dx.doi.org/10.1109/TCAD.2005.844084},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MatulaFT05arith,
  author = {David W. Matula and
               Alex Fit-Florea and
               Mitchell Aaron Thornton},
  title = {Table Lookup Structures for Multiplicative Inverses Modulo
               2$^{\mbox{k}}$},
  booktitle = {IEEE Symposium on Computer Arithmetic},
  year = {2005},
  pages = {156-163},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/arith05.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ARITH.2005.43},
  crossref = {2005arith},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005arith,
  title = {17th IEEE Symposium on Computer Arithmetic},
  booktitle = {ARITH-17},
  publisher = {IEEE Computer Society},
  year = {2005},
  isbn = {0-7695-2366-8},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Thornton05ismvl,
  author = {Mitchell A. Thornton},
  title = {The {K}arhunen-{L}o{\`e}ve Transform of Discrete {M}{V}{L} Functions},
  booktitle = {ISMVL},
  year = {2005},
  pages = {194-199},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl05.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2005.48},
  crossref = {2005ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005ismvl,
  title = {35th IEEE International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  month = may,
  year = {2005},
  isbn = {0-7695-2336-6},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiFTM05isvlsi,
  author = {Lun Li and
               Alex Fit-Florea and
               Mitchell A. Thornton and
               David W. Matula},
  title = {Hardware Implementation of an Additive Bit-Serial Algorithm
               for the Discrete Logarithm Modulo 2$^{\mbox{k}}$},
  booktitle = {ISVLSI},
  year = {2005},
  pages = {130-135},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi05.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2005.35},
  crossref = {2005isvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005isvlsi,
  title = {2005 IEEE Computer Society Annual Symposium on VLSI},
  booktitle = {ISVLSI},
  publisher = {IEEE Computer Society},
  year = {2005},
  isbn = {0-7695-2365-X},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CoyleT05itcc,
  author = {Frank P. Coyle and
               Mitchell A. Thornton},
  title = {A Framework and Process for Curricular Integration and Innovation
               Using Project Based Interdisciplinary Teams},
  booktitle = {ITCC},
  year = {2005},
  pages = {432-435},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/itcc05.pdf},
  puburl = {http://dx.doi.org/10.1109/ITCC.2005.9},
  crossref = {2005-1itcc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005-1itcc,
  title = {International Symposium on Information Technology: Coding
               and Computing},
  booktitle = {ITCC},
  publisher = {IEEE Computer Society},
  month = apr,
  year = {2005},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FazelLTRT04glvlsi,
  author = {Kenneth Fazel and
               Lun Li and
               Mitchell A. Thornton and
               Robert B. Reese and
               Cherrice Traver},
  title = {Performance enhancement in phased logic circuits using automatic
               slack-matching buffer insertion},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  year = {2004},
  pages = {413-416},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/glsvlsi04.pdf},
  puburl = {http://doi.acm.org/10.1145/988952.989051},
  crossref = {2004glvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004glvlsi,
  editor = {David Garrett and
               John Lach and
               Charles A. Zukowski},
  title = {14th ACM Great Lakes Symposium on VLSI},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  publisher = {ACM},
  year = {2004},
  isbn = {1-58113-853-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MarczynskiTS04iscas,
  author = {Ralph Marczynski and
               Mitchell A. Thornton and
               Stephen A. Szygenda},
  title = {Test vector generation and classification using FSM traversals},
  booktitle = {ISCAS},
  year = {2004},
  pages = {309-312},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/iscas04.pdf},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiTS04isvlsi,
  author = {Lun Li and
               Mitchell A. Thornton and
               Stephen A. Szygenda},
  title = {A Genetic Approach for Conjunction Scheduling in Symbolic
               Equivalence Checking},
  booktitle = {ISVLSI},
  year = {2004},
  pages = {32-38},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi04.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2004.1339505},
  crossref = {2004isvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004isvlsi,
  title = {2004 IEEE Computer Society Annual Symposium on VLSI},
  booktitle = {ISVLSI},
  publisher = {IEEE Computer Society},
  year = {2004},
  isbn = {0-7695-2097-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Thornton03ppl,
  author = {Mitchell A. Thornton},
  title = {Performance Evaluation of a Parallel Decoupled Data Driven
               Multiprocessor},
  journal = {Parallel Processing Letters},
  volume = {13},
  number = {3},
  year = {2003},
  pages = {497-507},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/pplet.pdf},
  puburl = {http://dx.doi.org/10.1142/S0129626403001458},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseTT03async,
  author = {Robert B. Reese and
               Mitchell A. Thornton and
               Cherrice Traver},
  title = {A Coarse-Grain Phased Logic {C}{P}{U}},
  booktitle = {ASYNC},
  year = {2003},
  pages = {2-13},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/async03.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ASYNC.2003.1199161},
  crossref = {2003async},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003async,
  title = {9th International Symposium on Advanced Research in Asynchronous
               Circuits and Systems},
  booktitle = {ASYNC},
  publisher = {IEEE Computer Society},
  year = {2003},
  isbn = {0-7695-1898-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FazelTR03date,
  author = {Kenneth Fazel and
               Mitchell A. Thornton and
               Robert B. Reese},
  title = {{P}{L}{F}ire: A Visualization Tool for Asynchronous Phased Logic
               Designs},
  booktitle = {DATE},
  year = {2003},
  pages = {11096-11097},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/date03.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2003.10062},
  crossref = {2003date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003date,
  title = {2003 Design, Automation and Test in Europe Conference and
               Exposition},
  booktitle = {DATE},
  publisher = {IEEE Computer Society},
  year = {2003},
  isbn = {0-7695-1870-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Thornton03ismvl,
  author = {Mitchell A. Thornton},
  title = {Spectral Transforms of Mixed-radix {M}{V}{L} Functions},
  booktitle = {ISMVL},
  month = may,
  year = {2003},
  pages = {329-333},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl03.pdf},
  puburl = {http://computer.org/proceedings/ismvl/1918/19180329abs.htm},
  crossref = {2003ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003ismvl,
  title = {33rd IEEE International Symposium on Multiple-Valued Logic
               (ISMVL 2003), 16-19 May 2003, Tokyo, Japan},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2003},
  isbn = {0-7695-1918-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseTT03isvlsi,
  author = {Robert B. Reese and
               Mitchell A. Thornton and
               Cherrice Traver},
  title = {A Fine-Grain Phased Logic CPU},
  booktitle = {ISVLSI},
  month = feb,
  year = {2003},
  pages = {70-79},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi03.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2003.1183355},
  crossref = {2003isvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003isvlsi,
  title = {2003 IEEE Computer Society Annual Symposium on VLSI},
  booktitle = {ISVLSI},
  publisher = {IEEE Computer Society},
  year = {2003},
  isbn = {0-7695-1904-0},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonFRT02date,
  author = {Mitchell A. Thornton and
               Kenneth Fazel and
               Robert B. Reese and
               Cherrice Traver},
  title = {Generalized Early Evaluation in Self-Timed Circuits},
  booktitle = {DATE},
  year = {2002},
  pages = {255-259},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/date02.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2002.998281},
  crossref = {2002date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002date,
  title = {2002 Design, Automation and Test in Europe Conference and
               Exposition},
  booktitle = {DATE},
  publisher = {IEEE Computer Society},
  year = {2002},
  isbn = {0-7695-1471-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{TownsendTDM02glvlsi,
  author = {Whitney J. Townsend and
               Mitchell A. Thornton and
               Rolf Drechsler and
               D. Michael Miller},
  title = {Computing walsh, arithmetic, and reed-muller spectral decision
               diagrams using graph transformations},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  year = {2002},
  pages = {178-183},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/glvlsi02.pdf},
  puburl = {http://doi.acm.org/10.1145/505306.505344},
  crossref = {2002glvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002glvlsi,
  editor = {Kanad Ghose and
               Patrick H. Madden and
               Vivek De and
               Peter M. Kogge},
  title = {Proceedings of the 12th ACM Great Lakes Symposium on VLSI},
  booktitle = {ACM Great Lakes Symposium on VLSI},
  publisher = {ACM},
  year = {2002},
  isbn = {1-58113-462-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KerttuLTD02iscas,
  author = {Mikael Kerttu and
               Per Lindgren and
               Mitchell A. Thornton and
               Rolf Drechsler},
  title = {Switching activity estimation of finite state machines for
               low power synthesis},
  booktitle = {ISCAS},
  year = {2002},
  pages = {65-68},
  url = {http://engr.smu.edu/~mitch/ftp_dir/pubs/iscas02.ps},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISCAS.2002.1010389},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonMT02ismvl,
  author = {Mitchell A. Thornton and
               D. Michael Miller and
               Whitney J. Townsend},
  title = {Chrestenson Spectrum Computation Using Cayley Color Graphs},
  booktitle = {ISMVL},
  year = {2002},
  pages = {123-129},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl02.pdf},
  puburl = {http://computer.org/proceedings/ismvl/1462/14620123abs.htm},
  crossref = {2002ismvl},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002ismvl,
  title = {32nd IEEE International Symposium on Multiple-Valued Logic},
  booktitle = {ISMVL},
  publisher = {IEEE Computer Society},
  year = {2002},
  isbn = {0-7695-1462-6},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonDM02isvlsi,
  author = {Mitchell A. Thornton and
               Rolf Drechsler and
               D. Michael Miller},
  title = {Multi-Output Timed Shannon Circuits},
  booktitle = {ISVLSI},
  year = {2002},
  pages = {47-52},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi02a.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2002.1016873},
  crossref = {2002isvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002isvlsi,
  title = {2002 IEEE Computer Society Annual Symposium on VLSI},
  booktitle = {ISVLSI},
  publisher = {IEEE Computer Society},
  year = {2002},
  isbn = {0-7695-1486-3},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BruceTSKL02isvlsi,
  author = {J. W. Bruce and
               Mitchell A. Thornton and
               L. Shivakumaraiah and
               P. S. Kokate and
               X. Li},
  title = {Efficient Adder Circuits Based on a Conservative Reversible
               Logic Gate},
  booktitle = {ISVLSI},
  year = {2002},
  pages = {83-88},
  url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi02b.pdf},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2002.1016879},
  crossref = {2002isvlsi},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002isvlsi,
  title = {2002 IEEE Computer Society Annual Symposium on VLSI},
  booktitle = {ISVLSI},
  publisher = {IEEE Computer Society},
  year = {2002},
  isbn = {0-7695-1486-3},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KerttuLDT02iwls,
  author = {Mikael Kerttu and
               Per Lindgren and
               Rolf Drechsler and
               Mitchell A. Thornton},
  title = {Low Power Optimization Techniques for BDD Mapped Finite
               State Machines},
  booktitle = {IWLS},
  year = {2002},
  pages = {143-148},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{TownsendTL02iwls,
  author = {Whitney J. Townsend and
               Mitchell A. Thornton and
               Parag K. Lala},
  title = {On-line Error Detection in a Carry-free Adder},
  booktitle = {IWLS},
  year = {2002},
  pages = {251-254},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{0006031daglib,
  author = {Mitchell Aaron Thornton and
               Rolf Drechsler and
               D. Michael Miller},
  title = {Spectral techniques in {V}{L}{S}{I} {C}{A}{D}},
  publisher = {Kluwer},
  year = {2001},
  isbn = {978-0-7923-7433-6},
  pages = {I-XIII, 1-250},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LindgrenKTD01aspdac,
  author = {Per Lindgren and
               Mikael Kerttu and
               Mitchell A. Thornton and
               Rolf Drechsler},
  title = {Low power optimization technique for BDD mapped circuits},
  booktitle = {ASP-DAC},
  year = {2001},
  pages = {615-621},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.acm.org/10.1145/370155.370564},
  crossref = {2001aspdac},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2001aspdac,
  title = {Proceedings of ASP-DAC 2001, Asia and South Pacific Design
               Automation Conference 2001, January 30-February 2, 2001,
               Yokohama, Japan},
  booktitle = {ASP-DAC},
  publisher = {ACM},
  year = {2001},
  isbn = {0-7803-6634-4},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonD01date,
  author = {Mitchell A. Thornton and
               Rolf Drechsler},
  title = {Spectral decision diagrams using graph transformations},
  booktitle = {DATE},
  year = {2001},
  pages = {713-719},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.acm.org/10.1145/367072.367860},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseTT01iccd,
  author = {Robert B. Reese and
               Mitchell A. Thornton and
               Cherrice Traver},
  title = {Arithmetic Logic Circuits Using Self-Timed Bit Level Dataflow
               and Early Evaluation},
  booktitle = {ICCD},
  year = {2001},
  pages = {18-23},
  crossref = {2001iccd},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2001iccd,
  title = {19th International Conference on Computer Design (ICCD 2001),
               VLSI in Computers and Processors, 23-26 September 2001,
               Austin, TX, USA, Proceedings},
  booktitle = {ICCD},
  publisher = {IEEE Computer Society},
  year = {2001},
  isbn = {0-7695-1200-3},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ZuzekDT00integration,
  author = {A. Zuzek and
               Rolf Drechsler and
               Mitchell A. Thornton},
  title = {Boolean function representation and spectral characterization
               using AND/OR graphs},
  journal = {Integration},
  volume = {29},
  number = {2},
  year = {2000},
  pages = {101-116},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://dx.doi.org/10.1016/S0167-9260(00)00003-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DrechslerTW00ismvl,
  author = {Rolf Drechsler and
               Mitchell A. Thornton and
               David Wessels},
  title = {MDD-Based Synthesis of Multi-Valued Logic Networks},
  booktitle = {ISMVL},
  year = {2000},
  pages = {41-46},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://computer.org/proceedings/ismvl/0692/06920041abs.htm},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DrechslerT00ismvl,
  author = {Rolf Drechsler and
               Mitchell A. Thornton},
  title = {Computation of Spectral Information from Logic Netlists},
  booktitle = {ISMVL},
  year = {2000},
  pages = {53-58},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://computer.org/proceedings/ismvl/0692/06920053abs.htm},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonDG00ismvl,
  author = {Mitchell A. Thornton and
               Rolf Drechsler and
               Wolfgang G{\"u}nther},
  title = {A Method for Approximate Equivalence Checking},
  booktitle = {ISMVL},
  year = {2000},
  pages = {447-452},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://computer.org/proceedings/ismvl/0692/06920447abs.htm},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{SamdaniT00mascots,
  author = {Q. G. Samdani and
               Mitchell A. Thornton},
  title = {Cache Resident Data Locality Analysis},
  booktitle = {MASCOTS},
  year = {2000},
  pages = {539-},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://computer.org/proceedings/mascots/0728/07280539abs.htm},
  crossref = {2000mascots},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2000mascots,
  title = {MASCOTS 2000, Proceedings of the 8th International Symposium
               on Modeling, Analysis and Simulation of Computer and Telecommunication
               Systems, 29 August - 1 September 2000, San Francisco, California,
               USA},
  booktitle = {MASCOTS},
  publisher = {IEEE Computer Society},
  year = {2000},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ThorntonN99todaes,
  author = {Mitchell A. Thornton and
               V. S. S. Nair},
  title = {Behavioral synthesis of combinational logic using spectral-based
               heuristics},
  journal = {ACM Trans. Design Autom. Electr. Syst.},
  volume = {4},
  number = {2},
  year = {1999},
  pages = {219-230},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.acm.org/10.1145/307988.308000},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonWDD99date,
  author = {Mitchell A. Thornton and
               J. P. Williams and
               Rolf Drechsler and
               Nicole Drechsler},
  title = {Variable Reordering for Shared Binary Decision Diagrams
               Using Output Probabilities},
  booktitle = {DATE},
  year = {1999},
  pages = {758-759},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.1999.761217},
  crossref = {1999date},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1999date,
  title = {1999 Design, Automation and Test in Europe (DATE '99), 9-12
               March 1999, Munich, Germany},
  booktitle = {DATE},
  publisher = {IEEE Computer Society},
  year = {1999},
  isbn = {0-7695-0078-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Thornton97tc,
  author = {Mitchell A. Thornton},
  title = {Signed Binary Addition Circuitry with Inherent Even Parity
               Outputs},
  journal = {IEEE Trans. Computers},
  volume = {46},
  number = {7},
  year = {1997},
  pages = {811-816},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/12.599901},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonA97hicss,
  author = {Mitchell A. Thornton and
               D. L. Andrews},
  title = {Graph Analysis and Transformation Techniques for Runtime
               Minimization in Multi-Threaded Architectures},
  booktitle = {HICSS (1)},
  year = {1997},
  pages = {566-575},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/HICSS.1997.667356},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ThorntonN95tcad,
  author = {Mitchell A. Thornton and
               V. S. S. Nair},
  title = {Efficient calculation of spectral coefficients and their
               applications},
  journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
  volume = {14},
  number = {11},
  year = {1995},
  pages = {1328-1341},
  url = {http://lyle.smu.edu/},
  presurl = {http://lyle.smu.edu/},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/43.469660},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CasperSAM12,
  author = {William Casper and Stephen Papa},
  title = {A Multi-Disciplined Security Engineering Education Approach},
  booktitle = {Conference on Security and Management ({S}{A}{M})},
  year = {2012},
  month = {July},
  pages = {},
  puburl = {http://elrond.informatik.tu-freiberg.de/papers/WorldComp2012/SAM9724.pdf}
}