pubs.bib
@article{ShiD13,
author = {Yiwen Shi and
Jennifer Dworak},
title = {A Simulated Annealing Inspired Test Optimization Method
for Enhanced Detection of Highly Critical Faults and Defects},
journal = {J. Electronic Testing},
volume = {29},
number = {3},
year = {2013},
pages = {275-288},
puburl = {http://dx.doi.org/10.1007/s10836-013-5357-0}
}
@inproceedings{ThorntonISMVL13,
title = {Ternary Logic Network Justification Using Transfer Matrices},
author = {Mitchell A Thornton and Jennifer Dworak},
booktitle = {IEEE International Symposium on Multiple-Valued Logic},
month = may,
year = {2013},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl13b.pdf}
}
@article{ShiJET13,
title = {A Simulated Annealing Inspired Test Optimization Method for Enhanced Detection of Highly Critical Faults and Defects},
author = {Yiwen Shi and Jennifer Dworak},
journal = {Journal of Electronic Testing},
pages = {1--14},
year = {2013},
publisher = {Springer},
puburl = {http://link.springer.com/content/pdf/10.1007/s10836-013-5357-0.pdf}
}
@article{DworakNASIB12,
author = {Jennifer Dworak and
Kundan Nepal and
Nuno Alves and
Yiwen Shi and
Nicholas Imbriglia and
R. Iris Bahar},
title = {Using implications to choose tests through suspect fault
identification},
journal = {ACM Transactions on Design Automation of Electronic Systems},
volume = {18},
number = {1},
year = {2012},
pages = {14},
puburl = {http://doi.acm.org/10.1145/2390191.2390205}
}
@article{AlpaslanKMHD12tcad,
author = {Elif Alpaslan and
Bram Kruseman and
Ananta K. Majhi and
Wilmar M. Heuvelman and
Jennifer Dworak},
title = {{N}{I}{M}-{X}: A {N}oise {I}ndex {M}odel-Based {X}-Filling Technique to
Overcome the Power Supply Switching Noise Effects on Path
Delay Test},
journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
volume = {31},
number = {5},
year = {2012},
pages = {809-813},
puburl = {http://dx.doi.org/10.1109/TCAD.2011.2179040},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesSIDNB11ets,
author = {Nuno Alves and
Y. Shi and
N. Imbriglia and
Jennifer Dworak and
Kundan Nepal and
R. Iris Bahar},
title = {Dynamic Test Set Selection Using Implication-Based On-Chip
Diagnosis},
booktitle = {European Test Symposium},
year = {2011},
pages = {211},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ETS.2011.59},
crossref = {2011ets},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011ets,
title = {16th European Test Symposium (ETS 2011), May 23-27, 2011,
Trondheim, Norway},
booktitle = {European Test Symposium},
publisher = {IEEE Computer Society},
year = {2011},
isbn = {978-0-7695-4433-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ShiKHD11itc,
author = {Yiwen Shi and
Kantapon Kaewtip and
Wan-Chan Hu and
Jennifer Dworak},
title = {Partial state monitoring for fault detection estimation},
booktitle = {ITC},
year = {2011},
pages = {1-10},
puburl = {http://dx.doi.org/10.1109/TEST.2011.6139146},
crossref = {2011itc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011itc,
editor = {Bill Eklow and
R. D. (Shawn) Blanton},
title = {2011 IEEE International Test Conference, ITC 2011, Anaheim,
CA, USA, September 20-22, 2011},
booktitle = {ITC},
publisher = {IEEE},
year = {2011},
isbn = {978-1-4577-0153-5},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6132473},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesSDBN11vts,
author = {Nuno Alves and
Yiwen Shi and
Jennifer Dworak and
R. Iris Bahar and
Kundan Nepal},
title = {Enhancing online error detection through area-efficient
multi-site implications},
booktitle = {VTS},
year = {2011},
pages = {241-246},
puburl = {http://dx.doi.org/10.1109/VTS.2011.5783728},
crossref = {2011vts},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011vts,
title = {29th IEEE VLSI Test Symposium, VTS 2011, May 1-5, 2011,
Dana Point, California, USA},
booktitle = {VTS},
publisher = {IEEE Computer Society},
year = {2011},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{AlvesBNDB10tcad,
author = {Nuno Alves and
Alison Buben and
Kundan Nepal and
Jennifer Dworak and
R. Iris Bahar},
title = {A Cost Effective Approach for Online Error Detection Using
Invariant Relationships},
journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
volume = {29},
number = {5},
year = {2010},
pages = {788-801},
puburl = {http://dx.doi.org/10.1109/TCAD.2010.2043590},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{AlpaslanHLCD10tcad,
author = {Elif Alpaslan and
Yu Huang and
Xijiang Lin and
Wu-Tung Cheng and
Jennifer Dworak},
title = {On Reducing Scan Shift Activity at RTL},
journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
volume = {29},
number = {7},
year = {2010},
pages = {1110-1120},
puburl = {http://dx.doi.org/10.1109/TCAD.2010.2049057},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlpaslanDKMHW10date,
author = {Elif Alpaslan and
Jennifer Dworak and
Bram Kruseman and
Ananta K. Majhi and
Wilmar M. Heuvelman and
Paul van de Wiel},
title = {NIM- a noise index model to estimate delay discrepancies
between silicon and simulation},
booktitle = {DATE},
year = {2010},
pages = {1373-1376},
puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5457025},
crossref = {2010date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010date,
title = {Design, Automation and Test in Europe, DATE 2010, Dresden,
Germany, March 8-12, 2010},
booktitle = {DATE},
publisher = {IEEE},
year = {2010},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesNDB10glvlsi,
author = {Nuno Alves and
Kundan Nepal and
Jennifer Dworak and
R. Iris Bahar},
title = {Improving the testability and reliability of sequential
circuits with invariant logic},
booktitle = {ACM Great Lakes Symposium on VLSI},
year = {2010},
pages = {131-134},
puburl = {http://doi.acm.org/10.1145/1785481.1785513},
crossref = {2010glvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010glvlsi,
editor = {R. Iris Bahar and
Fabrizio Lombardi and
David Atienza and
Erik Brunvand},
title = {Proceedings of the 20th ACM Great Lakes Symposium on VLSI
2009, Providence, Rhode Island, USA, May 16-18 2010},
booktitle = {ACM Great Lakes Symposium on VLSI},
publisher = {ACM},
year = {2010},
isbn = {978-1-4503-0012-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ShiHD10vts,
author = {Yiwen Shi and
Wan-Chan Hu and
Jennifer Dworak},
title = {Too many faults, too little time on creating test sets for
enhanced detection of highly critical faults and defects},
booktitle = {VTS},
year = {2010},
pages = {319-324},
puburl = {http://dx.doi.org/10.1109/VTS.2010.5469545},
crossref = {2010vts},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010vts,
title = {28th IEEE VLSI Test Symposium, VTS 2010, April 19-22, 2010,
Santa Cruz, California, USA},
booktitle = {VTS},
publisher = {IEEE Computer Society},
year = {2010},
isbn = {978-1-4244-6648-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesNDB09date,
author = {Nuno Alves and
Kundan Nepal and
Jennifer Dworak and
R. Iris Bahar},
title = {Detecting errors using multi-cycle invariance information},
booktitle = {DATE},
year = {2009},
pages = {791-796},
puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=5090609{\&}arnumber=5090771{\&}count=326{\&}index=157},
crossref = {2009date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009date,
title = {Design, Automation and Test in Europe, DATE 2009, Nice,
France, April 20-24, 2009},
booktitle = {DATE},
publisher = {IEEE},
year = {2009},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlvesDBN09iccad,
author = {Nuno Alves and
Jennifer Dworak and
R. Iris Bahar and
Kundan Nepal},
title = {Compacting test vector sets via strategic use of implications},
booktitle = {ICCAD},
year = {2009},
pages = {83-88},
puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5361309},
crossref = {2009iccad},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009iccad,
title = {2009 International Conference on Computer-Aided Design (ICCAD'09),
November 2-5, 2009, San Jose, CA, USA},
booktitle = {ICCAD},
publisher = {IEEE},
year = {2009},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ShiDD08dft,
author = {Yiwen Shi and
Kellie DiPalma and
Jennifer Dworak},
title = {Efficient Determination of Fault Criticality for Manufacturing
Test Set Optimization},
booktitle = {DFT},
year = {2008},
pages = {403-411},
puburl = {http://dx.doi.org/10.1109/DFT.2008.48},
crossref = {2008dft},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008dft,
editor = {Cristiana Bolchini and
Yong-Bin Kim and
Dimitris Gizopoulos and
Mohammad Tehranipoor},
title = {23rd IEEE International Symposium on Defect and Fault-Tolerance
in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA,
USA},
booktitle = {DFT},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NepalADB08itc,
author = {Kundan Nepal and
Nuno Alves and
Jennifer Dworak and
R. Iris Bahar},
title = {Using Implications for Online Error Detection},
booktitle = {ITC},
year = {2008},
pages = {1-10},
puburl = {http://dx.doi.org/10.1109/TEST.2008.4700614},
crossref = {2008itc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008itc,
editor = {Douglas Young and
Nur A. Touba},
title = {2008 IEEE International Test Conference, ITC 2008, Santa
Clara, California, USA, October 26-31, 2008},
booktitle = {ITC},
publisher = {IEEE},
year = {2008},
isbn = {978-1-4244-2403-0},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690905},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlpaslanHLCD08vts,
author = {Elif Alpaslan and
Yu Huang and
Xijiang Lin and
Wu-Tung Cheng and
Jennifer Dworak},
title = {Reducing Scan Shift Power at RTL},
booktitle = {VTS},
year = {2008},
pages = {139-146},
puburl = {http://doi.ieeecomputersociety.org/10.1109/VTS.2008.36},
crossref = {2008vts},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008vts,
title = {26th IEEE VLSI Test Symposium (VTS 2008), April 27 - May
1, 2008, San Diego, California, USA},
booktitle = {VTS},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dworak07itc,
author = {Jennifer Dworak},
title = {Which defects are most critical? Optimizing test sets to
minimize failures due to test escapes},
booktitle = {ITC},
year = {2007},
pages = {1-10},
puburl = {http://dx.doi.org/10.1109/TEST.2007.4437565},
crossref = {2007itc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007itc,
editor = {Jill Sibert and
Janusz Rajski},
title = {2007 IEEE International Test Conference, ITC 2007, Santa
Clara, California, USA, October 21-26, 2007},
booktitle = {ITC},
publisher = {IEEE},
year = {2007},
isbn = {1-4244-1128-9},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4437545},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dworak07vts,
author = {Jennifer Dworak},
title = {An Analysis of Defect Detection for Weighted Random Patterns
Generated with Observation/Excitation-Aware Partial Fault
Targeting},
booktitle = {VTS},
year = {2007},
pages = {205-210},
puburl = {http://dx.doi.org/10.1109/VTS.2007.14},
crossref = {2007vts},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007vts,
title = {25th IEEE VLSI Test Symposium (VTS 2007), 6-10 May 2007,
Berkeley, California, USA},
booktitle = {VTS},
publisher = {IEEE Computer Society},
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{StojanovicBDW06dac,
author = {Vladimir Stojanovic and
R. Iris Bahar and
Jennifer Dworak and
Richard Weiss},
title = {A cost-effective implementation of an ECC-protected instruction
queue for out-of-order microprocessors},
booktitle = {DAC},
year = {2006},
pages = {705-708},
puburl = {http://doi.acm.org/10.1145/1146909.1147087},
crossref = {2006dac},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006dac,
editor = {Ellen Sentovich},
title = {Proceedings of the 43rd Design Automation Conference, DAC
2006, San Francisco, CA, USA, July 24-28, 2006},
booktitle = {DAC},
publisher = {ACM},
year = {2006},
isbn = {1-59593-381-6},
puburl = {http://dl.acm.org/citation.cfm?id=1146909},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dworak05mtv,
author = {Jennifer Dworak},
title = {An Investigation of Excitation Balance and Additional Mandatory
Conditions for the Diagnosis of Fortuitously Detected Defects},
booktitle = {MTV},
year = {2005},
pages = {48-54},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MTV.2005.6},
crossref = {2005mtv},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005mtv,
editor = {Magdy S. Abadir and
Li-C. Wang},
title = {Sixth International Workshop on Microprocessor Test and
Verification (MTV 2005), Common Challenges and Solutions,
3-4 November 2005, Austin, Texas, USA},
booktitle = {MTV},
publisher = {IEEE Computer Society},
year = {2005},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakCWM04date,
author = {Jennifer Dworak and
Brad Cobb and
James Wingfield and
M. Ray Mercer},
title = {Balanced Excitation and Its Effect on the Fortuitous Detection
of Dynamic Defects},
booktitle = {DATE},
year = {2004},
pages = {1066-1071},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2004.1269034},
crossref = {2004date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004date,
title = {2004 Design, Automation and Test in Europe Conference and
Exposition (DATE 2004), 16-20 February 2004, Paris, France},
booktitle = {DATE},
publisher = {IEEE Computer Society},
year = {2004},
isbn = {0-7695-2085-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakWM04dft,
author = {Jennifer Dworak and
James Wingfield and
M. Ray Mercer},
title = {A Preliminary Investigation of Observation Diversity for
Enhancing Fortuitous Detection of Defects},
booktitle = {DFT},
year = {2004},
pages = {460-468},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DFT.2004.5},
crossref = {2004dft},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004dft,
title = {19th IEEE International Symposium on Defect and Fault-Tolerance
in VLSI Systems (DFT 2004), 10-13 October 2004, Cannes,
France, Proceedings},
booktitle = {DFT},
publisher = {IEEE Computer Society},
year = {2004},
isbn = {0-7695-2241-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakDWM04vts,
author = {Jennifer Dworak and
David Dorsey and
Amy Wang and
M. Ray Mercer},
title = {Excitation, Observation, and ELF-MD: Optimization Criteria
for High Quality Test Sets},
booktitle = {VTS},
year = {2004},
pages = {9-15},
puburl = {http://doi.ieeecomputersociety.org/10.1109/VTEST.2004.1299219},
crossref = {2004vts},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004vts,
title = {22nd IEEE VLSI Test Symposium (VTS 2004), 25-29 April 2004,
Napa Valley, CA, USA},
booktitle = {VTS},
publisher = {IEEE Computer Society},
year = {2004},
isbn = {0-7695-2134-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{WingfieldDM03dft,
author = {James Wingfield and
Jennifer Dworak and
M. Ray Mercer},
title = {Function-Based Dynamic Compaction and its Impact on Test
Set Sizes},
booktitle = {DFT},
year = {2003},
pages = {167-174},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DFTVS.2003.1250109},
crossref = {2003dft},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003dft,
title = {18th IEEE International Symposium on Defect and Fault-Tolerance
in VLSI Systems (DFT 2003), 3-5 November 2003, Boston, MA,
USA, Proceedings},
booktitle = {DFT},
publisher = {IEEE Computer Society},
year = {2003},
isbn = {0-7695-2042-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiouWCDMKW02dac,
author = {Jing-Jia Liou and
Li-C. Wang and
Kwang-Ting Cheng and
Jennifer Dworak and
M. Ray Mercer and
Rohit Kapur and
Thomas W. Williams},
title = {Enhancing test efficiency for delay fault testing using
multiple-clocked schemes},
booktitle = {DAC},
year = {2002},
pages = {371-374},
puburl = {http://doi.acm.org/10.1145/513918.514013},
crossref = {2002dac},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002dac,
title = {Proceedings of the 39th Design Automation Conference, DAC
2002, New Orleans, LA, USA, June 10-14, 2002},
booktitle = {DAC},
publisher = {ACM},
year = {2002},
isbn = {1-58113-461-4},
puburl = {http://dl.acm.org/citation.cfm?id=513918},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LeeCDGM02date,
author = {Sooryong Lee and
Brad Cobb and
Jennifer Dworak and
Michael R. Grimaila and
M. Ray Mercer},
title = {A New ATPG Algorithm to Limit Test Set Size and Achieve
Multiple Detections of All Faults},
booktitle = {DATE},
year = {2002},
pages = {94-99},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2002.998255},
crossref = {2002date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002date,
title = {2002 Design, Automation and Test in Europe Conference and
Exposition (DATE 2002), 4-8 March 2002, Paris, France},
booktitle = {DATE},
publisher = {IEEE Computer Society},
year = {2002},
isbn = {0-7695-1471-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakWCLWM02dft,
author = {Jennifer Dworak and
James Wingfield and
Brad Cobb and
Sooryong Lee and
Li-C. Wang and
M. Ray Mercer},
title = {Fortuitous Detection and its Impact on Test Set Sizes Using
Stuck-at and Transition Faults},
booktitle = {DFT},
year = {2002},
pages = {177-185},
puburl = {http://www.computer.org/proceedings/dft/1831/18310177abs.htm},
crossref = {2002dft},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002dft,
title = {17th IEEE International Symposium on Defect and Fault-Tolerance
in VLSI Systems (DFT 2002), 6-8 November 2002, Vancouver,
BC, Canada, Proceedings},
booktitle = {DFT},
publisher = {IEEE Computer Society},
year = {2002},
isbn = {0-7695-1831-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiouWCDMKW02itc,
author = {Jing-Jia Liou and
Li-C. Wang and
Kwang-Ting Cheng and
Jennifer Dworak and
M. Ray Mercer and
Rohit Kapur and
Thomas W. Williams},
title = {Analysis of Delay Test Effectiveness with a Multiple-Clock
Scheme},
booktitle = {ITC},
year = {2002},
pages = {407-416},
puburl = {http://doi.ieeecomputersociety.org/10.1109/TEST.2002.1041786},
crossref = {2002itc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002itc,
title = {Proceedings IEEE International Test Conference 2002, Baltimore,
MD, USA, October 7-10, 2002},
publisher = {IEEE Computer Society},
year = {2002},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{DworakWLGMBSW01dt,
author = {Jennifer Dworak and
Jason D. Wicker and
Sooryong Lee and
Michael R. Grimaila and
M. Ray Mercer and
Kenneth M. Butler and
Bret Stewart and
Li-C. Wang},
title = {Defect-Oriented Testing and Defective-Part-Level Prediction},
journal = {IEEE Design {\&} Test of Computers},
volume = {18},
number = {1},
year = {2001},
pages = {31-41},
puburl = {http://doi.ieeecomputersociety.org/10.1109/54.902820},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakGCWWM00ats,
author = {Jennifer Dworak and
Michael R. Grimaila and
Brad Cobb and
Ting-Chi Wang and
Li-C. Wang and
M. Ray Mercer},
title = {On the superiority of DO-RE-ME/MPG-D over stuck-at-based
defective part level prediction},
booktitle = {Asian Test Symposium},
year = {2000},
pages = {151-},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ATS.2000.893618},
crossref = {2000ats},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2000ats,
title = {9th Asian Test Symposium (ATS 2000), 4-6 December 2000,
Taipei, Taiwan},
booktitle = {Asian Test Symposium},
publisher = {IEEE Computer Society},
year = {2000},
isbn = {0-7695-0887-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakGLWM00itc,
author = {Jennifer Dworak and
Michael R. Grimaila and
Sooryong Lee and
Li-C. Wang and
M. Ray Mercer},
title = {Enhanced DO-RE-ME based defect level prediction using defect
site aggregation-MPG-D},
booktitle = {ITC},
year = {2000},
pages = {930-939},
puburl = {http://doi.ieeecomputersociety.org/10.1109/TEST.2000.894304},
crossref = {2000itc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2000itc,
title = {Proceedings IEEE International Test Conference 2000, Atlantic
City, NJ, USA, October 2000},
publisher = {IEEE Computer Society},
year = {2000},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DworakGLWM99itc,
author = {Jennifer Dworak and
Michael R. Grimaila and
Sooryong Lee and
Li-C. Wang and
M. Ray Mercer},
title = {Modeling the probability of defect excitation for a commercial
IC with implications for stuck-at fault-based ATPG strategies},
booktitle = {ITC},
year = {1999},
pages = {1031-1037},
puburl = {http://doi.ieeecomputersociety.org/10.1109/TEST.1999.805836},
crossref = {1999itc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1999itc,
title = {Proceedings IEEE International Test Conference 1999, Atlantic
City, NJ, USA, 27-30 September 1999},
publisher = {IEEE Computer Society},
year = {1999},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{GrimailaLDBSBHMPWM99vts,
author = {Michael R. Grimaila and
Sooryong Lee and
Jennifer Dworak and
Kenneth M. Butler and
Bret Stewart and
Hari Balachandran and
Bryan Houchins and
Vineet Mathur and
Jaehong Park and
Li-C. Wang and
M. Ray Mercer},
title = {REDO - Probabilistic Excitation and Deterministic Observation
- First Commercial Experimen},
booktitle = {VTS},
year = {1999},
pages = {268-274},
puburl = {http://doi.ieeecomputersociety.org/10.1109/VTEST.1999.766675},
crossref = {1999vts},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1999vts,
title = {17th IEEE VLSI Test Symposium (VTS '99), 25-30 April 1999,
San Diego, CA, USA},
booktitle = {VTS},
publisher = {IEEE Computer Society},
year = {1999},
isbn = {0-7695-0146-X},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Manikas12jcsc,
author = {Theodore W. Manikas},
title = {Integrated Circuit Channel Routing using a Pareto-Optimal
Genetic Algorithm},
journal = {Journal of Circuits, Systems, and Computers},
volume = {21},
number = {5},
year = {2012},
puburl = {http://dx.doi.org/10.1142/S0218126612500417},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasFT12ismvl,
author = {Theodore W. Manikas and
David Y. Feinstein and
Mitchell A. Thornton},
title = {Modeling Medical System Threats with Conditional Probabilities
Using Multiple-Valued Logic Decision Diagrams},
booktitle = {ISMVL},
year = {2012},
pages = {244-249},
url = {http://lyle.smu.edu/~manikas/Pubs/Manikas_ISMVL_12.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2012.29},
crossref = {2012ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012ismvl,
editor = {D. Michael Miller and
Vincent C. Gaudet},
title = {42nd IEEE International Symposium on Multiple-Valued Logic,
ISMVL 2012, Victoria, BC, Canada, May 14-16, 2012},
booktitle = {ISMVL},
publisher = {IEEE},
year = {2012},
isbn = {978-1-4673-0908-0},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6214742},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasTF11ismvl,
author = {Theodore W. Manikas and
Mitchell A. Thornton and
David Y. Feinstein},
title = {Using Multiple-Valued Logic Decision Diagrams to Model System
Threat Probabilities},
booktitle = {ISMVL},
year = {2011},
pages = {263-267},
url = {http://lyle.smu.edu/~manikas/Pubs/Manikas-ISMVL-11.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2011.12},
crossref = {2011ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011ismvl,
editor = {Jaakko Astola and
Radomir S. Stankovic},
title = {41st IEEE International Symposium on Multiple-Valued Logic,
ISMVL 2011, Tuusula, Finland, May 23-25, 2011},
booktitle = {ISMVL},
publisher = {IEEE},
year = {2011},
isbn = {978-0-7695-4405-2},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5952386},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{LoPrestiMK10te,
author = {Peter LoPresti and
Theodore W. Manikas and
Jeff Kohlbeck},
title = {An Electrical Engineering Summer Academy for Middle School
and High School Students},
journal = {IEEE Trans. Education},
volume = {53},
number = {1},
year = {2010},
pages = {18-25},
url = {http://lyle.smu.edu/~manikas/Pubs/LoPresti-TE-10.pdf},
puburl = {http://dx.doi.org/10.1109/TE.2009.2022400},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasT08ismvl,
author = {Theodore W. Manikas and
Dale Teeters},
title = {Multiple-Valued Logic Memory System Design Using Nanoscale
Electrochemical Cells},
booktitle = {ISMVL},
year = {2008},
pages = {197-201},
url = {http://lyle.smu.edu/~manikas/Pubs/Manikas-ISMVL-08.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2008.23},
crossref = {2008ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008ismvl,
title = {38th IEEE International Symposium on Multiple-Valued Logic
(ISMVL 2008), 22-23 May 2008, Dallas, Texas, USA},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ManikasK02iwls,
author = {Theodore W. Manikas and
Gerald R. Kane},
title = {Partitioning Effects on Estimated Wire Length for Mixed
Macro and Standard Cell Placement},
booktitle = {IWLS},
year = {2002},
pages = {27-30},
url = {http://lyle.smu.edu/~manikas/Pubs/Manikas-IWLS-02-final.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{VasekC13ecrime,
author = {Marie Vasek and Tyler Moore},
title = {Empirical Analysis of Factors Affecting Malware URL Detection},
booktitle = {8th APWG eCrime Researchers Summit (eCrime)},
year = {2013},
month = {September}
}
@article{Moore13ijcip,
title = {The promise and perils of digital currencies},
author = {Tyler Moore},
journal = {International Journal of Critical Infrastructure Protection},
year = {2013},
url = {http://dx.doi.org/10.1016/j.ijcip.2013.08.002}
}
@inproceedings{LeontiadisMC13,
author = {Nektarios Leontiadis and
Tyler Moore and
Nicolas Christin},
title = {Pick your poison: {P}ricing and inventories at unlicensed
online pharmacies},
booktitle = {ACM Conference on Electronic Commerce},
year = {2013},
pages = {621-638},
puburl = {http://doi.acm.org/10.1145/2482540.2482610}
}
@inproceedings{MooreC13fc,
author = {Tyler Moore and Nicolas Christin},
title = {Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk},
booktitle = {Financial Cryptography and Data Security},
year = {2013},
month = {April},
url = {http://lyle.smu.edu/~tylerm/fc13.pdf},
presurl = {http://lyle.smu.edu/~tylerm/fc13pres.pdf},
pages = {}
}
@inproceedings{PapaCM13ifip,
author = {Steve Papa and William Casper and Tyler Moore},
title = {Securing Wastewater Collection Systems from Accidental and Intentional Harm: a Cost-Benefit Analysis},
booktitle = {7th IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection},
year = {2013},
month = {March},
pages = {},
url = {http://lyle.smu.edu/~tylerm/ifip13.pdf}
}
@inproceedings{MooreC12ecrime,
author = {Tyler Moore and Richard Clayton},
title = {Discovering Phishing Dropboxes Using Email Metadata},
booktitle = {7th APWG eCrime Researchers Summit (eCrime), Las Croabas, PR},
year = {2012},
month = {October},
pages = {},
url = {http://lyle.smu.edu/~tylerm/ecrime12dropbox.pdf},
presurl = {http://lyle.smu.edu/~tylerm/ecrime12dropboxpres.pdf}
}
@inproceedings{BoehmeM12ecrime,
author = {Rainer B{\"o}hme and Tyler Moore},
title = {How Do Consumers React to Cybercrime?},
booktitle = {APWG eCrime Researchers Summit (eCrime), Las Croabas, PR},
year = {2012},
month = {October},
pages = {},
url = {http://lyle.smu.edu/~tylerm/ecrime12eurobar.pdf},
presurl = {http://lyle.smu.edu/~tylerm/ecrime12eurobarpres.pdf}
}
@article{LandauM12firstmonday,
author = {Susan Landau and
Tyler Moore},
title = {Economic tussles in federated identity management},
journal = {First Monday},
volume = {17},
number = {10},
year = {2012},
puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf}
}
@inproceedings{EdwardsMSHF12nspw,
author = {Benjamin Edwards and
Tyler Moore and
George Stelle and
Steven A. Hofmeyr and
Stephanie Forrest},
title = {Beyond the Blacklist: Modeling Malware Spread and the Effect
of Interventions},
booktitle = {Proceedings of the New Security Paradigms Workshop,
Bertinoro, Italy, September 19-21, 2012},
year = {2012},
publisher = {ACM},
url = {http://lyle.smu.edu/~tylerm/nspw12.pdf}
}
@inproceedings{VasekM12cset,
author = {Vasek, Marie and Moore, Tyler},
title = {Do malware reports expedite cleanup? {A}n experimental study},
booktitle = {Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test},
series = {CSET'12},
year = {2012},
location = {Bellevue, WA},
puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf},
url = {http://lyle.smu.edu/~tylerm/cset12.pdf},
presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf},
publisher = {USENIX Association},
address = {Berkeley, CA, USA}
}
@inproceedings{AndersonBBCELMS12weis,
author = {Ross Anderson and
Chris Barton and
Rainer B{\"o}hme and
Richard Clayton and
Michael van Eeten and
Michael Levi and
Tyler Moore and
Stefan Savage},
title = {Measuring the Cost of Cybercrime},
booktitle = {WEIS},
year = {2012},
url = {http://lyle.smu.edu/~tylerm/weis12.pdf},
crossref = {2012weis},
presurl = {http://lyle.smu.edu/~tylerm/weis12pres.pdf}
}
@proceedings{2012weis,
title = {11th Annual Workshop on the Economics of Information Security,
WEIS 2012, Berlin, Germany, 25-26 June, 2012},
booktitle = {WEIS},
year = {2012}
}
@incollection{MooreA12oxford,
author = {Tyler Moore and
Ross Anderson},
title = {Internet Security},
editor = {Martin Peitz and Joel Waldfogel},
booktitle = {The Oxford Handbook of the Digital Economy},
pages = {572-599},
year = 2012,
publisher = {Oxford University Press},
puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21},
url = {http://lyle.smu.edu/~tylerm/oxford12.pdf}
}
@inproceedings{MooreHC12fc,
author = {Tyler Moore and
Jie Han and
Richard Clayton},
title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield
Investment Programs},
booktitle = {Financial Cryptography},
year = {2012},
pages = {41-56},
puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4},
url = {http://lyle.smu.edu/~tylerm/fc12.pdf},
presurl = {http://lyle.smu.edu/~tylerm/fc12pres.pdf},
crossref = {2012fc}
}
@proceedings{2012fc,
editor = {Angelos D. Keromytis},
title = {Financial Cryptography and Data Security - 16th International
Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March
2, 2012, Revised Selected Papers},
booktitle = {Financial Cryptography},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7397},
year = {2012},
isbn = {978-3-642-32945-6},
puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3}
}
@inproceedings{MooreLC11ccs,
author = {Tyler Moore and
Nektarios Leontiadis and
Nicolas Christin},
title = {Fashion crimes: trending-term exploitation on the web},
booktitle = {ACM Conference on Computer and Communications Security},
year = {2011},
pages = {455-466},
url = {http://lyle.smu.edu/~tylerm/ccs11.pdf},
puburl = {http://doi.acm.org/10.1145/2046707.2046761},
presurl = {http://lyle.smu.edu/~tylerm/ccs11pres.pdf},
crossref = {2011ccs}
}
@proceedings{2011ccs,
editor = {Yan Chen and
George Danezis and
Vitaly Shmatikov},
title = {Proceedings of the 18th ACM Conference on Computer and Communications
Security, CCS 2011, Chicago, Illinois, USA, October 17-21,
2011},
booktitle = {ACM Conference on Computer and Communications Security},
publisher = {ACM},
year = {2011},
isbn = {978-1-4503-0948-6}
}
@inproceedings{LeontiadisMC11uss,
author = {Nektarios Leontiadis and
Tyler Moore and
Nicolas Christin},
title = {Measuring and Analyzing Search-Redirection Attacks in the
Illicit Online Prescription Drug Trade},
booktitle = {USENIX Security Symposium},
year = {2011},
url = {http://lyle.smu.edu/~tylerm/usenix11.pdf},
puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf},
crossref = {2011uss}
}
@proceedings{2011uss,
title = {20th USENIX Security Symposium, San Francisco, CA, USA,
August 8-12, 2011, Proceedings},
booktitle = {USENIX Security Symposium},
publisher = {USENIX Association},
year = {2011}
}
@inproceedings{HofmeyrMFES11weis,
author = {Steven A. Hofmeyr and
Tyler Moore and
Stephanie Forrest and
Benjamin Edwards and
George Stelle},
title = {Modeling Internet-Scale Policies for Cleaning up Malware},
booktitle = {WEIS},
year = {2011},
url = {http://lyle.smu.edu/~tylerm/weis11model.pdf},
puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf},
crossref = {2011weis}
}
@proceedings{2011weis,
title = {10th Annual Workshop on the Economics of Information Security,
WEIS 2011, George Mason University, Fairfax, VA, USA, June
14-15, 2011},
booktitle = {WEIS},
year = {2011}
}
@inproceedings{LandauM11weis,
author = {Susan Landau and
Tyler Moore},
title = {Economic Tussles in Federated Identity Management},
booktitle = {WEIS},
year = {2011},
puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf},
crossref = {2011weis}
}
@inproceedings{MooreC11fc,
author = {Tyler Moore and
Richard Clayton},
title = {Ethical Dilemmas in Take-Down Research},
booktitle = {Financial Cryptography Workshops},
year = {2011},
pages = {154-168},
url = {http://lyle.smu.edu/~tylerm/wecsr11.pdf},
presurl = {http://lyle.smu.edu/~tylerm/wecsr11pres.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14},
crossref = {2011wfc}
}
@proceedings{2011wfc,
editor = {George Danezis and
Sven Dietrich and
Kazue Sako},
title = {Financial Cryptography and Data Security - FC 2011 Workshops,
RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
- March 4, 2011, Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7126},
year = {2012},
isbn = {978-3-642-29888-2},
puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9}
}
@article{RePEc:idt:journl:cs8102,
author = {Tyler Moore and Richard Clayton},
title = {The Impact of Public Information on Phishing Attack and Defense},
journal = {Communications \& Strategies},
year = 2011,
volume = {1},
number = {81},
pages = {45-68},
month = {1st quart},
keywords = {security economics; online crime; phishing; transparency},
puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html},
url = {http://lyle.smu.edu/~tylerm/cs81.pdf}
}
@article{Moore10ijcip,
author = {Tyler Moore},
title = {The economics of cybersecurity: Principles and policy options},
journal = {International Journal of Critical Infrastructure Protection},
volume = {3},
number = {3-4},
pages = {103 - 117},
year = {2010},
issn = {1874-5482},
doi = {10.1016/j.ijcip.2010.10.002},
puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429},
url = {http://lyle.smu.edu/~tylerm/ijcip10.pdf}
}
@incollection{Moore10nas,
author = {Tyler Moore},
title = {The economics of cybersecurity: Principles and policy options},
booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy},
isbn = {9780309160353},
puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3},
year = {2010},
publisher = {The National Academies Press}
}
@inproceedings{MooreFP10nspw,
author = {Tyler Moore and
Allan Friedman and
Ariel D. Procaccia},
title = {Would a 'cyber warrior' protect us: exploring trade-offs
between attack and defense of information systems},
booktitle = {NSPW},
year = {2010},
pages = {85-94},
url = {http://lyle.smu.edu/~tylerm/nspw10.pdf},
puburl = {http://doi.acm.org/10.1145/1900546.1900559},
crossref = {2010nspw}
}
@proceedings{2010nspw,
editor = {Angelos D. Keromytis and
Sean Peisert and
Richard Ford and
Carrie Gates},
title = {Proceedings of the New Security Paradigms Workshop,
Concord, MA, USA, September 21-23, 2010},
booktitle = {NSPW},
publisher = {ACM},
year = {2010},
isbn = {978-1-4503-0415-3}
}
@article{BohmeM10ieeesp,
author = {Rainer B{\"o}hme and
Tyler Moore},
title = {The Iterated Weakest Link},
journal = {IEEE Security {\&} Privacy},
volume = {8},
number = {1},
year = {2010},
pages = {53-55},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51},
url = {http://lyle.smu.edu/~tylerm/iwl-gordon.pdf}
}
@article{MoranM10ieeesp,
author = {Tal Moran and
Tyler Moore},
title = {The Phish-Market Protocol: Secure Sharing Between Competitors},
journal = {IEEE Security {\&} Privacy},
volume = {8},
number = {4},
year = {2010},
pages = {40-45},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138},
url = {http://lyle.smu.edu/~tylerm/sp10phishmarket.pdf}
}
@inproceedings{MoranM10fc,
author = {Tal Moran and
Tyler Moore},
title = {The Phish-Market Protocol: Securely Sharing Attack Data
between Competitors},
booktitle = {Financial Cryptography},
year = {2010},
pages = {222-237},
puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18},
url = {http://lyle.smu.edu/~tylerm/fc10phishmarket.pdf},
presurl = {http://lyle.smu.edu/~tylerm/fc10phishmarketpres.pdf},
crossref = {2010fc}
}
@inproceedings{MooreE10fc,
author = {Tyler Moore and
Benjamin Edelman},
title = {Measuring the Perpetrators and Funders of Typosquatting},
booktitle = {Financial Cryptography},
year = {2010},
pages = {175-191},
puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15},
url = {http://lyle.smu.edu/~tylerm/fc10typo.pdf},
presurl = {http://lyle.smu.edu/~tylerm/fc10typopres.pdf},
crossref = {2010fc}
}
@proceedings{2010fc,
editor = {Radu Sion},
title = {Financial Cryptography and Data Security, 14th International
Conference, FC 2010, Tenerife, Canary Islands, January 25-28,
2010, Revised Selected Papers},
booktitle = {Financial Cryptography},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {6052},
year = {2010},
isbn = {978-3-642-14576-6},
puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3}
}
@article{Moore09JEP,
author = {Tyler Moore and Richard Clayton and Ross Anderson},
title = {The Economics of Online Crime},
journal = {Journal of Economic Perspectives},
volume = 23,
number = 3,
month = {Summer},
year = 2009,
pages = {3--20},
puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3},
url = {http://lyle.smu.edu/~tylerm/jep09.pdf}
}
@inproceedings{BohmeM09weis,
author = {Rainer B{\"o}hme and
Tyler Moore},
title = {The Iterated Weakest Link - A Model of Adaptive Security
Investment},
booktitle = {WEIS},
year = {2009},
url = {http://lyle.smu.edu/~tylerm/weis09.pdf},
presurl = {http://lyle.smu.edu/~tylerm/weis09pres.pdf},
puburl = {http://weis09.infosecon.net/files/152/index.html},
crossref = {2009weis}
}
@proceedings{2009weis,
title = {8th Annual Workshop on the Economics of Information Security,
WEIS 2009, University College London, England, UK, June
24-25, 2009},
booktitle = {WEIS},
year = {2009}
}
@inproceedings{MooreCS09leet,
author = {Moore, Tyler and Clayton, Richard and Stern, Henry},
title = {Temporal correlations between spam and phishing websites},
booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more},
series = {LEET'09},
year = {2009},
location = {Boston, MA},
puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites},
url = {http://lyle.smu.edu/~tylerm/leet09.pdf},
presurl = {http://lyle.smu.edu/~tylerm/leet09pres.pdf},
publisher = {USENIX Association},
address = {Berkeley, CA, USA}
}
@inproceedings{MooreC09fc,
author = {Tyler Moore and
Richard Clayton},
title = {Evil Searching: Compromise and Recompromise of Internet
Hosts for Phishing},
booktitle = {Financial Cryptography},
year = {2009},
pages = {256-272},
puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16},
url = {http://lyle.smu.edu/~tylerm/fc09.pdf},
presurl = {http://lyle.smu.edu/~tylerm/fc09pres.pdf},
crossref = {2009fc}
}
@proceedings{2009fc,
editor = {Roger Dingledine and
Philippe Golle},
title = {Financial Cryptography and Data Security, 13th International
Conference, FC 2009, Accra Beach, Barbados, February 23-26,
2009. Revised Selected Papers},
booktitle = {Financial Cryptography},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {5628},
year = {2009},
puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4}
}
@inproceedings{MooreC08ecrime,
author = {Tyler Moore and
Richard Clayton},
title = {The Consequence of Non-Cooperation in the Fight Against Phishing},
booktitle = {APWG eCrime Researchers Summit},
year = {2008},
pages = {1-14},
puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968},
url = {http://lyle.smu.edu/~tylerm/ecrime08.pdf},
presurl = {http://lyle.smu.edu/~tylerm/ecrime08pres.pdf},
publisher = {IEEE}
}
@incollection{MooreC08weis,
author = {Tyler Moore and
Richard Clayton},
title = {The Impact of Incentives on Notice and Take-down},
editor = {M.E. Johnson},
booktitle = {Managing Information Risk and the Economics of Security},
pages = {199-223},
year = 2009,
publisher = {Springer},
puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_10},
url = {http://lyle.smu.edu/~tylerm/weis08takedown.pdf},
presurl = {http://lyle.smu.edu/~tylerm/weis08takedownpres.pdf},
isbn = {978-0-387-09761-9}
}
@incollection{AndersonBCM08weis,
author = {Ross Anderson and
Rainer B{\"o}hme and
Richard Clayton and
Tyler Moore},
title = {Security Economics and {E}uropean Policy},
editor = {M.E. Johnson},
booktitle = {Managing Information Risk and the Economics of Security},
doi = {10.1007/978-0-387-09762-6_3},
puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_3},
url = {http://lyle.smu.edu/~tylerm/weis08enisa.pdf},
publisher = {Springer},
pages = {55-80},
isbn = {978-0-387-09761-9},
year = 2009
}
@inproceedings{AndersonBCM08isse,
author = {Ross Anderson and
Rainer B{\"o}hme and
Richard Clayton and
Tyler Moore},
title = {Security Economics and {E}uropean Policy},
booktitle = {ISSE},
year = {2008},
pages = {57-76},
puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6},
crossref = {2008isse}
}
@proceedings{2008isse,
editor = {Norbert Pohlmann and
Helmut Reimer and
Wolfgang Schneider},
title = {ISSE 2008 - Securing Electronic Busines Processes, Highlights
of the Information Security Solutions Europe 2008 Conference,
7-9 October 2008, Madrid, Spain},
booktitle = {ISSE},
publisher = {Vieweg+Teubner},
year = {2009},
isbn = {978-3-8348-0660-4},
puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6}
}
@inproceedings{MooreC08fc,
author = {Tyler Moore and
Richard Clayton},
title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites},
booktitle = {Financial Cryptography},
year = {2008},
pages = {16-30},
puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2},
url = {http://lyle.smu.edu/~tylerm/fc08.pdf},
presurl = {http://lyle.smu.edu/~tylerm/fc08pres.pdf},
crossref = {2008fc}
}
@proceedings{2008fc,
editor = {Gene Tsudik},
title = {Financial Cryptography and Data Security, 12th International
Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008,
Revised Selected Papers},
booktitle = {Financial Cryptography},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {5143},
year = {2008},
isbn = {978-3-540-85229-2}
}
@inproceedings{AndersonM07crypto,
author = {Ross Anderson and
Tyler Moore},
title = {Information Security Economics - and Beyond},
booktitle = {CRYPTO},
year = {2007},
pages = {68-91},
puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5},
url = {http://lyle.smu.edu/~tylerm/crypto07.pdf},
crossref = {2007crypto}
}
@proceedings{2007crypto,
editor = {Alfred Menezes},
title = {Advances in Cryptology - CRYPTO 2007, 27th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 19-23,
2007, Proceedings},
booktitle = {CRYPTO},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4622},
year = {2007},
isbn = {978-3-540-74142-8}
}
@incollection{AndersonMNO07,
author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment},
title = {Incentives and Information Security},
editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.},
pages = {633-649},
booktitle = {Algorithmic Game Theory},
year = {2007},
isbn = {0521872820},
publisher = {Cambridge University Press},
address = {New York, NY, USA}
}
@inproceedings{MooreC07ecrime,
author = {Tyler Moore and
Richard Clayton},
title = {Examining the impact of website take-down on phishing},
booktitle = {APWG eCrime Researchers Summit},
year = {2007},
pages = {1-13},
puburl = {http://doi.acm.org/10.1145/1299015.1299016},
url = {http://lyle.smu.edu/~tylerm/ecrime07.pdf},
presurl = {http://lyle.smu.edu/~tylerm/ecrime07pres.pdf},
crossref = {2007ecrime}
}
@proceedings{2007ecrime,
editor = {Lorrie Faith Cranor},
title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual
eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania,
USA, October 4-5, 2007},
booktitle = {eCrime Researchers Summit},
publisher = {ACM},
series = {ACM International Conference Proceeding Series},
volume = {269},
year = {2007}
}
@article{AndersonM06science,
author = {Anderson, Ross and Moore, Tyler},
title = {The Economics of Information Security},
journal = {Science},
volume = {314},
number = {5799},
pages = {610-613},
year = {2006},
doi = {10.1126/science.1130992},
puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf},
url = {http://lyle.smu.edu/~tylerm/science-econ.pdf}
}
@inproceedings{MooreRCPAH08secon,
author = {Tyler Moore and
Maxim Raya and
Jolyon Clulow and
Panagiotis Papadimitratos and
Ross Anderson and
Jean-Pierre Hubaux},
title = {Fast Exclusion of Errant Devices from Vehicular Networks},
booktitle = {SECON},
year = {2008},
pages = {135-143},
puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26},
url = {http://lyle.smu.edu/~tylerm/secon.pdf},
crossref = {2008secon}
}
@proceedings{2008secon,
title = {Proceedings of the Fifth Annual IEEE Communications Society
Conference on Sensor, Mesh and Ad Hoc Communications and
Networks, SECON 2008, June 16-20, 2008, Crowne Plaza, San
Francisco International Airport, California, USA},
booktitle = {SECON},
publisher = {IEEE},
year = {2008}
}
@inproceedings{MooreCNA07esas,
author = {Tyler Moore and
Jolyon Clulow and
Shishir Nagaraja and
Ross Anderson},
title = {New Strategies for Revocation in Ad-Hoc Networks},
booktitle = {ESAS},
year = {2007},
pages = {232-246},
puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17},
url = {http://lyle.smu.edu/~tylerm/esas07.pdf},
presurl = {http://lyle.smu.edu/~tylerm/esas07-pres.pdf},
crossref = {2007esas}
}
@proceedings{2007esas,
editor = {Frank Stajano and
Catherine Meadows and
Srdjan Capkun and
Tyler Moore},
title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th
European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,
Proceedings},
booktitle = {ESAS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4572},
year = {2007},
isbn = {978-3-540-73274-7}
}
@inproceedings{MooreC07sec,
author = {Tyler Moore and
Jolyon Clulow},
title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution
Schemes in Sensor Networks},
booktitle = {SEC},
year = {2007},
pages = {157-168},
puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14},
url = {http://lyle.smu.edu/~tylerm/ifipsec2007-path.pdf},
presurl = {http://lyle.smu.edu/~tylerm/ifipsec-pres.pdf},
crossref = {2007sec}
}
@proceedings{2007sec,
editor = {Hein S. Venter and
Mariki M. Eloff and
Les Labuschagne and
Jan H. P. Eloff and
Rossouw von Solms},
title = {New Approaches for Security, Privacy and Trust in Complex
Environments, Proceedings of the IFIP TC-11 22nd International
Information Security Conference (SEC 2007), 14-16 May 2007,
Sandton, South Africa},
booktitle = {SEC},
publisher = {Springer},
series = {IFIP},
volume = {232},
year = {2007},
isbn = {978-0-387-72366-2}
}
@article{ClulowM06sigops,
author = {Jolyon Clulow and
Tyler Moore},
title = {Suicide for the common good: a new strategy for credential
revocation in self-organizing systems},
journal = {Operating Systems Review},
volume = {40},
number = {3},
year = {2006},
pages = {18-21},
puburl = {http://doi.acm.org/10.1145/1151374.1151381}
}
@inproceedings{ClulowHKM06esas,
author = {Jolyon Clulow and
Gerhard P. Hancke and
Markus G. Kuhn and
Tyler Moore},
title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless
Networks},
booktitle = {ESAS},
year = {2006},
pages = {83-97},
puburl = {http://dx.doi.org/10.1007/11964254_9},
url = {http://lyle.smu.edu/~tylerm/esas2006-distance.pdf},
presurl = {http://lyle.smu.edu/~tylerm/esas-pres.pdf},
crossref = {2006esas}
}
@proceedings{2006esas,
editor = {Levente Butty{\'a}n and
Virgil D. Gligor and
Dirk Westhoff},
title = {Security and Privacy in Ad-Hoc and Sensor Networks, Third
European Workshop, ESAS 2006, Hamburg, Germany, September
20-21, 2006, Revised Selected Papers},
booktitle = {ESAS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {4357},
year = {2006},
isbn = {978-3-540-69172-3}
}
@inproceedings{Moore06percom,
author = {Tyler Moore},
title = {A Collusion Attack on Pairwise Key Predistribution Schemes
for Distributed Sensor Networks},
booktitle = {PerCom Workshops},
year = {2006},
pages = {251-255},
puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3},
url = {http://lyle.smu.edu/~tylerm/persec06-moore.pdf},
presurl = {http://lyle.smu.edu/~tylerm/persec06-moore-pres.pdf},
crossref = {2006wpercom}
}
@proceedings{2006wpercom,
title = {4th IEEE Conference on Pervasive Computing and Communications
Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa,
Italy},
booktitle = {PerCom Workshops},
publisher = {IEEE Computer Society},
year = {2006},
isbn = {0-7695-2520-2}
}
@article{CankayaNC13csi,
author = {Ebru C. Cankaya and
Suku Nair and
Hakki C. Cankaya},
title = {Applying error correction codes to achieve security and
dependability},
journal = {Computer Standards {\&} Interfaces},
volume = {35},
number = {1},
year = {2013},
pages = {78-86},
puburl = {http://dx.doi.org/10.1016/j.csi.2012.06.009}
}
@inproceedings{PapaCN11host,
author = {Stephen M. Papa and
William D. Casper and
Suku Nair},
title = {Placement of trust anchors in embedded computer systems},
booktitle = {HOST},
year = {2011},
pages = {111-116},
puburl = {http://dx.doi.org/10.1109/HST.2011.5955006},
crossref = {2011host},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011host,
title = {HOST 2011, Proceedings of the 2011 IEEE International Symposium
on Hardware-Oriented Security and Trust (HOST), 5-6 June
2011, San Diego, California, USA},
booktitle = {HOST},
publisher = {IEEE Computer Society},
year = {2011},
isbn = {978-1-4577-1059-9},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5946040},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairAA11iwcmc,
author = {Suku Nair and
Subil Abraham and
Omar Al-Ibrahim},
title = {Security architecture for resource-limited environments},
booktitle = {IWCMC},
year = {2011},
pages = {412-417},
puburl = {http://dx.doi.org/10.1109/IWCMC.2011.5982569},
crossref = {2011iwcmc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011iwcmc,
title = {Proceedings of the 7th International Wireless Communications
and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey,
4-8 July, 2011},
booktitle = {IWCMC},
publisher = {IEEE},
year = {2011},
isbn = {978-1-4244-9539-9},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5963770},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Al-IbrahimN11iwcmc,
author = {Omar Al-Ibrahim and
Suku Nair},
title = {Cyber-physical security using system-level PUFs},
booktitle = {IWCMC},
year = {2011},
pages = {1672-1676},
puburl = {http://dx.doi.org/10.1109/IWCMC.2011.5982786},
crossref = {2011iwcmc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{krier2011cloaking,
title = {Cloaking {R}{F}{I}{D} tags},
author = {Paul Krier and Sai Seshabhattar and Daniel Engels and Suku Nair},
booktitle = {Consumer Communications and Networking Conference},
pages = {1036--1040},
month = jan,
year = {2011},
organization = {IEEE},
puburl = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5766323}
}
@proceedings{2011iwcmc,
title = {Proceedings of the 7th International Wireless Communications
and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey,
4-8 July, 2011},
booktitle = {IWCMC},
publisher = {IEEE},
year = {2011},
isbn = {978-1-4244-9539-9},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5963770},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{MorrisN10wicomm,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Private computing on public platforms: portable application
security},
journal = {Wireless Communications and Mobile Computing},
volume = {10},
number = {7},
year = {2010},
pages = {942-958},
puburl = {http://dx.doi.org/10.1002/wcm.804},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Abu-NimehN10wicomm,
author = {Saeed Abu-Nimeh and
Suku Nair},
title = {Circumventing security toolbars and phishing filters {\it via}
rogue wireless access points},
journal = {Wireless Communications and Mobile Computing},
volume = {10},
number = {8},
year = {2010},
pages = {1128-1139},
puburl = {http://dx.doi.org/10.1002/wcm.829},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KrierSPEN10mass,
author = {Paul Krier and
Sai Seshabhattar and
Jason Pereira and
Daniel W. Engels and
Suku Nair},
title = {Lightweight key agreement with key chaining},
booktitle = {MASS},
year = {2010},
pages = {594-599},
puburl = {http://dx.doi.org/10.1109/MASS.2010.5663878},
crossref = {2010mass},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010mass,
title = {IEEE 7th International Conference on Mobile Adhoc and Sensor
Systems, MASS 2010, 8-12 November 2010, San Francisco, CA,
USA},
booktitle = {MASS},
publisher = {IEEE},
year = {2010},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNWN09icc,
author = {Saeed Abu-Nimeh and
Dario Nappa and
Xinlei Wang and
Suku Nair},
title = {Distributed Phishing Detection by Applying Variable Selection
Using Bayesian Additive Regression Trees},
booktitle = {ICC},
year = {2009},
pages = {1-5},
puburl = {http://dx.doi.org/10.1109/ICC.2009.5198931},
crossref = {2009icc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009icc,
title = {Proceedings of IEEE International Conference on Communications,
ICC 2009, Dresden, Germany, 14-18 June 2009},
booktitle = {ICC},
publisher = {IEEE},
year = {2009},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN09percom,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Encryption Key Protection for Private Computing on Public
Platforms},
booktitle = {PerCom Workshops},
year = {2009},
pages = {1-6},
puburl = {http://dx.doi.org/10.1109/PERCOM.2009.4912897},
crossref = {2009wpercom},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009wpercom,
title = {Seventh Annual IEEE International Conference on Pervasive
Computing and Communications - Workshops (PerCom Workshops
2009), 9-13 March 2009, Galveston, TX, USA},
booktitle = {PerCom Workshops},
publisher = {IEEE Computer Society},
year = {2009},
isbn = {978-1-4244-3304-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairNMCA08cn,
author = {Padmaraj M. V. Nair and
Suku Nair and
Marco F. Marchetti and
Girish Chiruvolu and
Maher Ali},
title = {Bandwidth sensitive fast failure recovery scheme for Metro
Ethernet},
journal = {Computer Networks},
volume = {52},
number = {8},
year = {2008},
pages = {1603-1616},
puburl = {http://dx.doi.org/10.1016/j.comnet.2008.02.002},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN08IEEEares,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Privacy Protected ELF for Private Computing on Public Platforms},
booktitle = {ARES},
year = {2008},
pages = {452-457},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ARES.2008.160},
crossref = {2008IEEEares},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008IEEEares,
title = {Proceedings of the The Third International Conference on
Availability, Reliability and Security, ARES 2008, March
4-7, 2008, Technical University of Catalonia, Barcelona
, Spain},
booktitle = {ARES},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNWN08IEEEares,
author = {Saeed Abu-Nimeh and
Dario Nappa and
Xinlei Wang and
Suku Nair},
title = {Bayesian Additive Regression Trees-Based Spam Detection
for Enhanced Email Privacy},
booktitle = {ARES},
year = {2008},
pages = {1044-1051},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ARES.2008.136},
crossref = {2008IEEEares},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008IEEEares,
title = {Proceedings of the The Third International Conference on
Availability, Reliability and Security, ARES 2008, March
4-7, 2008, Technical University of Catalonia, Barcelona
, Spain},
booktitle = {ARES},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehN08globecom,
author = {Saeed Abu-Nimeh and
Suku Nair},
title = {Bypassing Security Toolbars and Phishing Filters via DNS
Poisoning},
booktitle = {GLOBECOM},
year = {2008},
pages = {2001-2006},
puburl = {http://dx.doi.org/10.1109/GLOCOM.2008.ECP.386},
crossref = {2008globecom},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008globecom,
title = {Proceedings of the Global Communications Conference, 2008.
GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December
2008},
booktitle = {GLOBECOM},
publisher = {IEEE},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN08globecom,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {Secure Context Switch for Private Computing on Public Platforms},
booktitle = {GLOBECOM},
year = {2008},
pages = {2159-2163},
puburl = {http://dx.doi.org/10.1109/GLOCOM.2008.ECP.416},
crossref = {2008globecom},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008globecom,
title = {Proceedings of the Global Communications Conference, 2008.
GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December
2008},
booktitle = {GLOBECOM},
publisher = {IEEE},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNWN07ecrime,
author = {Saeed Abu-Nimeh and
Dario Nappa and
Xinlei Wang and
Suku Nair},
title = {A comparison of machine learning techniques for phishing
detection},
booktitle = {eCrime Researchers Summit},
year = {2007},
pages = {60-69},
puburl = {http://doi.acm.org/10.1145/1299015.1299021},
crossref = {2007ecrime},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ecrime,
editor = {Lorrie Faith Cranor},
title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual
eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania,
USA, October 4-5, 2007},
booktitle = {eCrime Researchers Summit},
publisher = {ACM},
series = {ACM International Conference Proceeding Series},
volume = {269},
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007hase,
title = {Tenth IEEE International Symposium on High Assurance Systems
Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas,
USA},
booktitle = {HASE},
publisher = {IEEE Computer Society},
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MorrisN07ipps,
author = {Thomas H. Morris and
V. S. S. Nair},
title = {PCPP: On Remote Host Assessment via Naive Bayesian Classification},
booktitle = {IPDPS},
year = {2007},
pages = {1-8},
puburl = {http://dx.doi.org/10.1109/IPDPS.2007.370619},
crossref = {2007ipps},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ipps,
title = {21th International Parallel and Distributed Processing Symposium
(IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach,
California, USA},
booktitle = {IPDPS},
publisher = {IEEE},
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNM06aiccsa,
author = {Saeed Abu-Nimeh and
Suku Nair and
Marco F. Marchetti},
title = {An Experimental and Industrial Experience: Avoiding Denial
of Service via Memory Profiling},
booktitle = {AICCSA},
year = {2006},
pages = {151-158},
puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205083},
crossref = {2006aiccsa},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
title = {2006 IEEE/ACS International Conference on Computer Systems
and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
UAE},
booktitle = {AICCSA},
publisher = {IEEE},
year = {2006},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Abu-NimehNM06aaiccsa,
author = {Saeed Abu-Nimeh and
Suku Nair and
Marco F. Marchetti},
title = {Avoiding Denial of Service via Stress Testing},
booktitle = {AICCSA},
year = {2006},
pages = {300-307},
puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205105},
crossref = {2006aiccsa},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
title = {2006 IEEE/ACS International Conference on Computer Systems
and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
UAE},
booktitle = {AICCSA},
publisher = {IEEE},
year = {2006},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DeprezPN06aiccsa,
author = {George Deprez and
M. Padmaraj and
Suku Nair},
title = {Distributed fault management protocol for Heterogeneous
Networks},
booktitle = {AICCSA},
year = {2006},
pages = {744-747},
puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205173},
crossref = {2006aiccsa},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
title = {2006 IEEE/ACS International Conference on Computer Systems
and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
UAE},
booktitle = {AICCSA},
publisher = {IEEE},
year = {2006},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AliCGPNM06aiccsa,
author = {Maher Ali and
Girish Chiruvolu and
An Ge and
M. Padmaraj and
Suku Nair and
Marco F. Marchetti},
title = {Differentiated Survivability in Ethernet-Based MAN/WAN},
booktitle = {AICCSA},
year = {2006},
pages = {906-910},
puburl = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2006.205196},
crossref = {2006aiccsa},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006aiccsa,
title = {2006 IEEE/ACS International Conference on Computer Systems
and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah,
UAE},
booktitle = {AICCSA},
publisher = {IEEE},
year = {2006},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairNMCA06icn,
author = {Padmaraj M. V. Nair and
Suku Nair and
Marco F. Marchetti and
Girish Chiruvolu and
Maher Ali},
title = {Distributed Restoration Method for Metro Ethernet},
booktitle = {ICN/ICONS/MCL},
year = {2006},
pages = {94},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ICNICONSMCL.2006.80},
crossref = {2006icn},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006icn,
title = {Fifth International Conference on Networking and the International
Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April
2006, Mauritius},
booktitle = {ICN/ICONS/MCL},
publisher = {IEEE Computer Society},
year = {2006},
isbn = {0-7695-2552-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{PadmarajNMCA05icw,
author = {M. Padmaraj and
Suku Nair and
Marco F. Marchetti and
Girish Chiruvolu and
Maher Ali},
title = {Traffic Engineering in Enterprise Ethernet with Multiple
Spanning Tree Regions},
booktitle = {ICW/ICHSN/ICMCS/SENET},
year = {2005},
pages = {261-266},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ICW.2005.78},
crossref = {2005icw},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005icw,
title = {Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET
2005), 14-17 August 2005, Montreal, Canada},
booktitle = {ICW/ICHSN/ICMCS/SENET},
publisher = {IEEE Computer Society},
year = {2005},
isbn = {0-7695-2422-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{CankayaN99cn,
author = {Hakki C. Cankaya and
V. S. S. Nair},
title = {Improved survivability analysis for SONET SHRs},
journal = {Computer Networks},
volume = {31},
number = {23-24},
year = {1999},
pages = {2505-2528},
puburl = {http://dx.doi.org/10.1016/S1389-1286(99)00118-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{AlkhalifaNKA99tpds,
author = {Zeyad Alkhalifa and
V. S. S. Nair and
Narayanan Krishnamurthy and
Jacob A. Abraham},
title = {Design and Evaluation of System-Level Checks for On-Line
Control Flow Error Detection},
journal = {IEEE Trans. Parallel Distrib. Syst.},
volume = {10},
number = {6},
year = {1999},
pages = {627-641},
puburl = {http://doi.ieeecomputersociety.org/10.1109/71.774911},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CankayaN98icccn,
author = {Hakki C. Cankaya and
V. S. S. Nair},
title = {Hierarchical Approach to Performance Analysis of Self-Healing
SONET Networks},
booktitle = {ICCCN},
year = {1998},
pages = {362-369},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ICCCN.1998.998797},
crossref = {1998icccn},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1998icccn,
title = {Proceedings of the International Conference On Computer
Communications and Networks (ICCCN 1998), October 12-15,
1998, Lafayette, Louisiana, USA},
booktitle = {ICCCN},
publisher = {IEEE},
year = {1998},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CankayaN98sigcomm,
author = {Hakki C. Cankaya and
V. S. S. Nair},
title = {Accelerated Reliability Analysis for Self-Healing SONET
Networks},
booktitle = {SIGCOMM},
year = {1998},
pages = {268-277},
puburl = {http://doi.acm.org/10.1145/285237.285288},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{PillaiN97infsof,
author = {Krichnakumar Pillai and
V. S. S. Nair},
title = {Statistical analysis of nonstationary software metrics},
journal = {Information {\&} Software Technology},
volume = {39},
number = {5},
year = {1997},
pages = {363-373},
puburl = {http://dx.doi.org/10.1016/S0950-5849(96)00002-X},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{KimN97jss,
author = {Hyun C. Kim and
V. S. S. Nair},
title = {Software fault tolerance for distributed object based computing},
journal = {Journal of Systems and Software},
volume = {39},
number = {2},
year = {1997},
pages = {103-117},
puburl = {http://dx.doi.org/10.1016/S0164-1212(96)00167-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{PillaiN97tse,
author = {Krichnakumar Pillai and
V. S. S. Nair},
title = {A Model for Software Development Effort and Cost Estimation},
journal = {IEEE Trans. Software Eng.},
volume = {23},
number = {8},
year = {1997},
pages = {485-497},
puburl = {http://doi.ieeecomputersociety.org/10.1109/32.624305},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AlkhalifaN97hase,
author = {Zeyad Alkhalifa and
V. S. S. Nair},
title = {Design of a Portable Control-Flow Checking Technique},
booktitle = {HASE},
year = {1997},
pages = {120-123},
puburl = {http://dlib2.computer.org/conferen/hase/7971/pdf/79710120.pdf},
crossref = {1997hase},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1997hase,
title = {2nd High-Assurance Systems Engineering Workshop (HASE '97),
August 11-12, 1997, Washington, DC, USA, Proceedings},
booktitle = {HASE},
publisher = {IEEE Computer Society},
year = {1997},
isbn = {0-8186-7971-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairAB96tc,
author = {V. S. S. Nair and
Jacob A. Abraham and
Prithviraj Banerjee},
title = {Efficient Techniques for the Analysis of Algorithm-Based
Fault Tolerance (ABFT) Schemes},
journal = {IEEE Trans. Computers},
volume = {45},
number = {4},
year = {1996},
pages = {499-503},
puburl = {http://doi.ieeecomputersociety.org/10.1109/12.494110},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KimN95compsac,
author = {Hyun C. Kim and
V. S. S. Nair},
title = {Application layer software fault tolerance for distributed
object-oriented systems},
booktitle = {COMPSAC},
year = {1995},
pages = {199-204},
puburl = {http://doi.ieeecomputersociety.org/10.1109/CMPSAC.1995.524780},
crossref = {1995compsac},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1995compsac,
title = {19th International Computer Software and Applications Conference
(COMPSAC'95), August 9-11, 1995, Dallas, Texas, USA},
booktitle = {COMPSAC},
publisher = {IEEE Computer Society},
year = {1995},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{X95acompsac,
author = {V. S. S. Nair},
title = {Software Fault Tolerance: Has it Arrived Yet?},
booktitle = {COMPSAC},
year = {1995},
pages = {390},
puburl = {http://doi.ieeecomputersociety.org/10.1109/COMPSAC.1995.10009},
crossref = {1995compsac},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1995compsac,
title = {19th International Computer Software and Applications Conference
(COMPSAC'95), August 9-11, 1995, Dallas, Texas, USA},
booktitle = {COMPSAC},
publisher = {IEEE Computer Society},
year = {1995},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ErbasTN94paapp,
author = {Cengiz Erbas and
Murat M. Tanik and
V. S. S. Nair},
title = {Parallel Memory Allocation and Data Alignment in Simd Machines},
journal = {Parallel Algorithms Appl.},
volume = {4},
number = {1-2},
year = {1994},
pages = {139-151},
puburl = {http://dx.doi.org/10.1080/10637199408915460},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ErbasTN93spdp,
author = {Cengiz Erbas and
Murat M. Tanik and
V. S. S. Nair},
title = {A Circulant Matrix Based Approach to Storage Schemes for
Parallel Memory Systems},
booktitle = {SPDP},
year = {1993},
pages = {92-99},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairHA92tc,
author = {V. S. S. Nair and
Yatin Vasant Hoskote and
Jacob A. Abraham},
title = {Probabilistic Evaluation of On-Line Checks in Fault-Tolerant
Multiprocessor Systems},
journal = {IEEE Trans. Computers},
volume = {41},
number = {5},
year = {1992},
pages = {532-541},
puburl = {http://doi.ieeecomputersociety.org/10.1109/12.142679},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{NairA90tc,
author = {V. S. S. Nair and
Jacob A. Abraham},
title = {Real-Number Codes for Bault-Tolerant Matrix Operations On
Processor Arrays},
journal = {IEEE Trans. Computers},
volume = {39},
number = {4},
year = {1990},
pages = {426-435},
puburl = {http://doi.ieeecomputersociety.org/10.1109/12.54836},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{BanerjeeRSNRBA90tc,
author = {Prithviraj Banerjee and
Joseph T. Rahmeh and
Craig B. Stunkel and
V. S. S. Nair and
Kaushik Roy and
Vijay Balasubramanian and
Jacob A. Abraham},
title = {Algorithm-Based Fault Tolerance on a Hypercube Multiprocessor},
journal = {IEEE Trans. Computers},
volume = {39},
number = {9},
year = {1990},
pages = {1132-1145},
puburl = {http://doi.ieeecomputersociety.org/10.1109/12.57055},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairA90ftcs,
author = {Suku Nair and
Jacob A. Abraham},
title = {Hierarchical design and analysis of fault-tolerant multiprocessor
systems using concurrent error detection},
booktitle = {FTCS},
year = {1990},
pages = {130-137},
puburl = {http://dx.doi.org/10.1109/FTCS.1990.89348},
crossref = {1990ftcs},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1990ftcs,
title = {Proceedings of the 20th International Symposium on Fault-Tolerant
Computing, FTCS 1990, Newcastle Upon Tyne, UK, 26-28 June,
1990},
booktitle = {FTCS},
publisher = {IEEE Computer Society},
year = {1990},
isbn = {0-8186-2051-X},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=292},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NairA88ftcs,
author = {Suku Nair and
Jacob A. Abraham},
title = {General linear codes for fault-tolerant matrix operations
on processor arrays},
booktitle = {FTCS},
year = {1988},
pages = {180-185},
puburl = {http://dx.doi.org/10.1109/FTCS.1988.5317},
crossref = {1988ftcs},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1988ftcs,
title = {Proceedings of the Eighteenth International Symposium on
Fault-Tolerant Computing, FTCS 1988, Tokyo, Japan, 27-30
June, 1988},
booktitle = {FTCS},
publisher = {IEEE Computer Society},
year = {1988},
isbn = {0-8186-0867-6},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=210},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BanerjeeRSNRA88ftcs,
author = {Prithviraj Banerjee and
Joseph T. Rahmeh and
Craig B. Stunkel and
V. S. S. Nair and
Kaushik Roy and
Jacob A. Abraham},
title = {An evaluation of system-level fault tolerance on the Intel
hypercube multiprocessor},
booktitle = {FTCS},
year = {1988},
pages = {362-367},
puburl = {http://dx.doi.org/10.1109/FTCS.1988.5344},
crossref = {1988ftcs},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1988ftcs,
title = {Proceedings of the Eighteenth International Symposium on
Fault-Tolerant Computing, FTCS 1988, Tokyo, Japan, 27-30
June, 1988},
booktitle = {FTCS},
publisher = {IEEE Computer Society},
year = {1988},
isbn = {0-8186-0867-6},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=210},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{moore13mwscas,
title = {Low Power Floating-Point Multiplication
and Squaring Units with Shared Circuitry},
author = {Jason Moore and Mitchell A. Thornton and David W. Matula},
booktitle = {{IEEE} Midwest Symposium on Circuits and Systems (MWSCAS)},
month = aug,
year = 2013,
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/mwscas13.pdf}
}
@inproceedings{thornton13fie,
title = {Embedded and Real-time Systems Classes in Traditional and Distance Format},
booktitle = {Frontiers in Education Conference (FIE)},
month = oct,
year = {2013},
author = {Mitchell A. Thornton and Theodore W. Manikas Manikas and Phillip A. Laplante},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/fie13.pdf}
}
@inproceedings{ThorntonISMVL13-3,
title = {Spectral Response of Ternary Logic Netlists},
author = {Mitchell A. Thornton and Theodore W. Manikas},
booktitle = {IEEE International Symposium on Multiple-Valued Logic},
month = may,
year = {2013},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl13c.pdf}
}
@inproceedings{ManikasRMW13,
title = {Mission Planning Analysis using Decision Diagrams},
author = {Theodore W. Manikas and Mitchell A. Thornton and Frederick R. Chang},
booktitle = {Workshop on Applications of the Reed-Muller Expansion in Circuit Design},
month = may,
year = {2013}
}
@inproceedings{ThorntonISMVL13-2,
title = {A Transfer Function Model for Ternary Switching Logic Circuits},
author = {Mitchell A. Thornton},
booktitle = {IEEE International Symposium on Multiple-Valued Logic},
month = may,
year = {2013},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl13a.pdf}
}
@inproceedings{ImpagliazzoCDMTW12,
author = {John Impagliazzo and
Susan Conry and
Eric Durant and
Andrew D. McGettrick and
Mitchell A. Thornton and
Timothy Wilson},
title = {Computer engineering review task force report},
booktitle = {SIGCSE},
month = feb,
year = {2012},
pages = {401-402},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/sigcse12.pdf},
puburl = {http://doi.acm.org/10.1145/2157136.2157256},
crossref = {sigcse12},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{sigcse12,
editor = {Laurie A. Smith King and
David R. Musicant and
Tracy Camp and
Paul T. Tymann},
title = {43rd ACM technical symposium on Computer
science education},
booktitle = {SIGCSE},
publisher = {ACM},
year = {2012},
isbn = {978-1-4503-1098-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Thornton12cse,
author = {Mitchell A. Thornton},
title = {Professional Licensure for Software Engineers: An Update},
journal = {Computing in Science and Engineering},
volume = {14},
number = {5},
year = {2012},
pages = {85-87},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/cise12.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MCSE.2012.104},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{FeinsteinT12mvl,
author = {David Y. Feinstein and
Mitchell A. Thornton},
title = {Reversible Logic Synthesis Based on Decision Diagram Variable
Ordering},
journal = {Multiple-Valued Logic and Soft Computing},
volume = {19},
number = {4},
year = {2012},
pages = {325-339},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/jmvl12.pdf},
puburl = {http://www.oldcitypublishing.com/MVLSC/MVLSCabstracts/MVLSC19.4abstracts/MVLSCv19n4p325-339Feinstein.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseST12async,
author = {Robert B. Reese and
Scott C. Smith and
Mitchell A. Thornton},
title = {Uncle - An {R}{T}{L} Approach to Asynchronous Design},
booktitle = {ASYNC},
year = {2012},
pages = {65-72},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/async12.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ASYNC.2012.14},
crossref = {2012async}
}
@proceedings{2012async,
editor = {Jens Spars{\o} and
Montek Singh and
Pascal Vivet},
title = {18th IEEE International Symposium on Asynchronous Circuits
and Systems},
booktitle = {ASYNC},
publisher = {IEEE Computer Society},
month = may,
year = {2012},
isbn = {978-1-4673-1360-5},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6242773}
}
@inproceedings{MenonT12ismvl,
author = {Rohit P. Menon and
Mitchell A. Thornton},
title = {Global Multiple-Valued Clock Approach for High-Performance
Multi-phase Clock Integrated Circuits},
booktitle = {ISMVL},
year = {2012},
pages = {19-24},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl12b.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2012.30},
crossref = {2012ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012ismvl,
editor = {D. Michael Miller and
Vincent C. Gaudet},
title = {42nd IEEE International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE},
year = {2012},
isbn = {978-1-4673-0908-0},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6214742}
}
@inproceedings{FeinsteinT12ismvl,
author = {David Y. Feinstein and
Mitchell A. Thornton},
title = {Using the Asynchronous Paradigm for Reversible Sequential
Circuit Implementation},
booktitle = {ISMVL},
year = {2012},
pages = {305-310},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl12a.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2012.33},
crossref = {2012ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinT11ismvl,
author = {David Y. Feinstein and
Mitchell A. Thornton},
title = {On the Skipped Variables of Quantum Multiple-Valued Decision
Diagrams},
booktitle = {ISMVL},
year = {2011},
pages = {164-169},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl11b.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2011.22},
crossref = {2011ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011ismvl,
editor = {Jaakko Astola and
Radomir S. Stankovic},
title = {41st IEEE International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE},
month = may,
year = {2011},
isbn = {978-0-7695-4405-2},
puburl = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5952386}
}
@incollection{Thornton11crypt,
author = {Mitchell A. Thornton},
title = {Keystroke Dynamics},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
publisher = {Springer},
year = {2011},
pages = {688-691},
url = {http://lyle.smu.edu/},
puburl = {http://dx.doi.org/10.1007/978-1-4419-5906-5_783},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{2010Lisynthesis,
author = {Lun Li and
Mitchell A. Thornton},
title = {Digital System Verification: A Combined Formal Methods and
Simulation Framework},
booktitle = {Digital System Verification: A Combined Formal Methods and
Simulation Framework},
publisher = {Morgan {\&} Claypool Publishers},
series = {Synthesis Lectures on Digital Circuits and Systems},
year = {2010},
puburl = {http://dx.doi.org/10.2200/S00257ED1V01Y201002DCS027},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{BarrettT10cse,
author = {Steven F. Barrett and
Mitchell A. Thornton},
title = {To {P}{E} or not to {P}{E}: the Sequel},
journal = {Computing in Science and Engineering},
volume = {12},
number = {4},
year = {2010},
pages = {62-65},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/cise10.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MCSE.2010.90},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DatlaT10ismvl,
author = {Satyendra R. Datla and
Mitchell A. Thornton},
title = {Quaternary Voltage-Mode Logic Cells and Fixed-Point Multiplication
Circuits},
booktitle = {ISMVL},
year = {2010},
pages = {128-133},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl10.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2010.32},
crossref = {2010ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2010ismvl,
title = {40th IEEE International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
month = may,
year = {2010},
isbn = {978-0-7695-4024-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{FeinsteinTM09mvl,
author = {David Y. Feinstein and
Mitchell A. Thornton and
D. Michael Miller},
title = {Minimization of Quantum Multiple-valued Decision Diagrams
Using Data Structure Metrics},
journal = {Multiple-Valued Logic and Soft Computing},
volume = {15},
number = {4},
year = {2009},
pages = {361-377},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/jmvl09.pdf},
puburl = {http://www.oldcitypublishing.com/MVLSC/MVLSCabstracts/MVLSC15.4abstracts/MVLSCv15n4p361-377Feinstein.html}
}
@article{Fit-FloreaLTM09tc,
author = {Alex Fit-Florea and
Lun Li and
Mitchell A. Thornton and
David W. Matula},
title = {A Discrete Logarithm Number System for Integer Arithmetic
Modulo 2$^{\mbox{k}}$: Algorithms and Lookup Structures},
journal = {IEEE Trans. Computers},
volume = {58},
number = {2},
year = {2009},
pages = {163-174},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/tcomp09.pdf},
puburl = {http://dx.doi.org/10.1109/TC.2008.204},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DatlaTM09asap,
author = {Satyendra R. Datla and
Mitchell A. Thornton and
David W. Matula},
title = {A Low Power High Performance Radix-4 Approximate Squaring
Circuit},
booktitle = {ASAP},
year = {2009},
pages = {91-97},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/asap09.pdf},
puburl = {http://dx.doi.org/10.1109/ASAP.2009.35},
crossref = {2009asap},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009asap,
title = {20th IEEE International Conference on Application-Specific
Systems, Architectures and Processors, ASAP 2009, July 7-9,
2009, Boston, MA, USA},
booktitle = {ASAP},
publisher = {IEEE},
year = {2009},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinT09ismvl,
author = {David Y. Feinstein and
Mitchell A. Thornton},
title = {On the Guidance of Reversible Logic Synthesis by Dynamic
Variable Reordering},
booktitle = {ISMVL},
year = {2009},
pages = {132-138},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl09a.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2009.31},
crossref = {2009ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009ismvl,
title = {ISMVL 2009, 39th International Symposium on Multiple-Valued
Logic, 21-23 May 2009, Naha, Okinawaw, Japan},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2009},
isbn = {978-0-7695-3607-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DatlaTHH09ismvl,
author = {Satyendra R. Datla and
Mitchell A. Thornton and
Luther Hendrix and
Dave Henderson},
title = {Quaternary Addition Circuits Based on {S}{U}{S}{L}{O}{C} Voltage-Mode
Cells and Modeling with SystemVerilog},
booktitle = {ISMVL},
year = {2009},
pages = {256-261},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl09b.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2009.66},
crossref = {2009ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2009ismvl,
title = {ISMVL 2009, 39th International Symposium on Multiple-Valued
Logic, 21-23 May 2009, Naha, Okinawaw, Japan},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2009},
isbn = {978-0-7695-3607-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{2007Millersynthesis,
author = {D. Michael Miller and
Mitchell A. Thornton},
title = {Multiple Valued Logic: Concepts and Representations},
booktitle = {Multiple Valued Logic},
publisher = {Morgan {\&} Claypool Publishers},
series = {Synthesis Lectures on Digital Circuits and Systems},
year = {2007},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://www.morganclaypool.com/doi/abs/10.2200/S00065ED1V01Y200709DCS012},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{LawlerHST08ijbis,
author = {Chad M. Lawler and
Michael A. Harper and
Stephen A. Szygenda and
Mitchell A. Thornton},
title = {Components of disaster-tolerant computing: {A}nalysis of disaster
recovery, {I}{T} application downtime and executive visibility},
journal = {IJBIS},
volume = {3},
number = {3},
year = {2008},
pages = {317-331},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ijbis08.pdf},
puburl = {http://dx.doi.org/10.1504/IJBIS.2008.017288},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinTM08date,
author = {David Y. Feinstein and
Mitchell A. Thornton and
D. Michael Miller},
title = {Partially Redundant Logic Detection Using Symbolic Equivalence
Checking in Reversible and Irreversible Logic Circuits},
booktitle = {DATE},
year = {2008},
pages = {1378-1381},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/date08.pdf},
puburl = {http://dx.doi.org/10.1109/DATE.2008.4484932},
crossref = {2008date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008date,
title = {Design, Automation and Test in Europe, DATE 2008, Munich,
Germany, March 10-14, 2008},
booktitle = {DATE},
publisher = {IEEE},
year = {2008},
isbn = {978-3-9810801-3-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinTM08ismvl,
author = {David Y. Feinstein and
Mitchell A. Thornton and
D. Michael Miller},
title = {On the Data Structure Metrics of Quantum Multiple-Valued
Decision Diagrams},
booktitle = {ISMVL},
year = {2008},
pages = {138-143},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl08b.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2008.28},
crossref = {2008ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008ismvl,
title = {38th IEEE International Symposium on Multiple-Valued Logic
(ISMVL 2008), 22-23 May 2008, Dallas, Texas, USA},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonMSM08ismvl,
author = {Mitchell A. Thornton and
David W. Matula and
Laura Spenner and
D. Michael Miller},
title = {Quantum Logic Implementation of Unary Arithmetic Operations},
booktitle = {ISMVL},
year = {2008},
pages = {202-207},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl08a.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2008.27},
crossref = {2008ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2008ismvl,
title = {38th IEEE International Symposium on Multiple-Valued Logic
(ISMVL 2008), 22-23 May 2008, Dallas, Texas, USA},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2008},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{MillerFT07mvl,
author = {D. Michael Miller and
David Y. Feinstein and
Mitchell A. Thornton},
title = {QMDD Minimization Using Sifting for Variable Reordering},
journal = {Multiple-Valued Logic and Soft Computing},
volume = {13},
number = {4-6},
year = {2007},
pages = {537-552},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/jmvl07.pdf},
puburl = {http://www.oldcitypublishing.com/MVLSC/MVLSCabstracts/MVLSC13.4-6abstracts/MVLSCv13n4-6p537-552Miller.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiCT07fdl,
author = {Lun Li and
Frank P. Coyle and
Mitchell A. Thornton},
title = {{U}{M}{L} to {S}ystem{V}erilog Synthesisfor Embedded System Models
with Support for Assertion Generation},
booktitle = {FDL},
year = {2007},
pages = {261-267},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/fdl07.pdf},
puburl = {http://www.ecsi-association.org/ecsi/main.asp?l1=library{\&}fn=def{\&}id=267},
crossref = {2007fdl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007fdl,
title = {Forum on specification and Design Languages},
booktitle = {FDL},
publisher = {ECSI},
month = sep,
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FeinsteinNT07hase,
author = {David Y. Feinstein and
V. S. S. Nair and
Mitchell A. Thornton},
title = {Advances in Quantum Computing Fault Tolerance and Testing},
booktitle = {HASE},
year = {2007},
pages = {369-370},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/hase07.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/HASE.2007.16},
crossref = {2007hase},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007hase,
title = {10th IEEE International Symposium on High Assurance Systems
Engineering},
booktitle = {HASE},
publisher = {IEEE Computer Society},
month = nov,
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LawlerHT07ipccc,
author = {Chad M. Lawler and
Michael A. Harper and
Mitchell A. Thornton},
title = {Components and Analysis of Disaster Tolerant Computing},
booktitle = {IPCCC},
year = {2007},
pages = {380-386},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ijbis08.pdf},
puburl = {http://dx.doi.org/10.1109/PCCC.2007.358917},
crossref = {2007ipccc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ipccc,
title = {26th IEEE International Performance Computing
and Communications Conference},
booktitle = {IPCCC},
publisher = {IEEE Computer Society},
month = apr,
year = {2007},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MillerFT07ismvl,
author = {D. Michael Miller and
David Y. Feinstein and
Mitchell A. Thornton},
title = {Variable Reordering and Sifting for {Q}{M}{D}{D}},
booktitle = {ISMVL},
year = {2007},
pages = {10},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl07a.pdf},
puburl = {http://dx.doi.org/10.1109/ISMVL.2007.59},
crossref = {2007ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2007ismvl,
title = {37th International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
month = may,
year = {2007},
isbn = {978-0-7695-2831-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AmouiGTD07ismvl,
author = {Mahsan Amoui and
Daniel Gro{\ss}e and
Mitchell A. Thornton and
Rolf Drechsler},
title = {Evaluation of Toggle Coverage for {M}{V}{L} Circuits Specified
in the {S}ystem{V}erilog {H}{D}{L}},
booktitle = {ISMVL},
year = {2007},
pages = {50},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl07b.pdf},
puburl = {http://dx.doi.org/10.1109/ISMVL.2007.19},
crossref = {2007ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{2006Reesesynthesis,
author = {Robert B. Reese and
Mitchell A. Thornton},
title = {Introduction to Logic Synthesis using Verilog HDL},
booktitle = {Introduction to Logic Synthesis using Verilog HDL},
publisher = {Morgan {\&} Claypool Publishers},
series = {Synthesis Lectures on Digital Circuits and Systems},
year = {2006},
puburl = {http://dx.doi.org/10.2200/S00060ED1V01Y200610DCS006},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiFTM06asap,
author = {Lun Li and
Alex Fit-Florea and
Mitchell A. Thornton and
David W. Matula},
title = {Performance Evaluation of a Novel Direct Table Lookup Method
and Architecture with Application to 16-bit Integer Functions},
booktitle = {ASAP},
year = {2006},
pages = {99-104},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/asap06.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ASAP.2006.52},
crossref = {2006asap},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006asap,
title = {2006 IEEE International Conference on Application-Specific
Systems, Architecture and Processors},
booktitle = {ASAP},
publisher = {IEEE Computer Society},
month = sep,
year = {2006},
isbn = {0-7695-2682-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiTM06glvlsi,
author = {Lun Li and
Mitchell A. Thornton and
David W. Matula},
title = {A digit serial algorithm for the integer power operation},
booktitle = {ACM Great Lakes Symposium on VLSI},
year = {2006},
pages = {302-307},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/glsvlsi06.pdf},
puburl = {http://doi.acm.org/10.1145/1127908.1127978},
crossref = {2006glvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006glvlsi,
editor = {Gang Qu and
Yehea I. Ismail and
Narayanan Vijaykrishnan and
Hai Zhou},
title = {16th ACM Great Lakes Symposium on VLSI},
booktitle = {ACM Great Lakes Symposium on VLSI},
publisher = {ACM},
year = {2006},
isbn = {1-59593-347-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MillerT06ismvl,
author = {D. Michael Miller and
Mitchell A. Thornton},
title = {{Q}{M}{D}{D}: A Decision Diagram Structure for Reversible and Quantum
Circuits},
booktitle = {ISMVL},
year = {2006},
pages = {30},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl06a.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2006.35},
crossref = {2006ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiTP06ismvl,
author = {Lun Li and
Mitchell A. Thornton and
Marek A. Perkowski},
title = {A Quantum {C}{A}{D} Accelerator Based on {G}rover's Algorithm for
Finding the Minimum Fixed Polarity {R}eed-{M}uller Form},
booktitle = {ISMVL},
year = {2006},
pages = {33},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl06b.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2006.8},
crossref = {2006ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2006ismvl,
title = {36th IEEE International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2006},
isbn = {0-7695-2532-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ReeseTT05tc,
author = {Robert B. Reese and
Mitchell A. Thornton and
Cherrice Traver},
title = {A Coarse-Grain Phased Logic {C}{P}{U}},
journal = {IEEE Trans. Computers},
volume = {54},
number = {7},
year = {2005},
pages = {788-799},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/toc05.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/TC.2005.105},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ReeseTTH05tcad,
author = {Robert B. Reese and
Mitchell A. Thornton and
Cherrice Traver and
David Hemmendinger},
title = {Early evaluation for performance enhancement in phased logic},
journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
volume = {24},
number = {4},
year = {2005},
pages = {532-550},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/tcad05.pdf},
puburl = {http://dx.doi.org/10.1109/TCAD.2005.844084},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MatulaFT05arith,
author = {David W. Matula and
Alex Fit-Florea and
Mitchell Aaron Thornton},
title = {Table Lookup Structures for Multiplicative Inverses Modulo
2$^{\mbox{k}}$},
booktitle = {IEEE Symposium on Computer Arithmetic},
year = {2005},
pages = {156-163},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/arith05.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ARITH.2005.43},
crossref = {2005arith},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005arith,
title = {17th IEEE Symposium on Computer Arithmetic},
booktitle = {ARITH-17},
publisher = {IEEE Computer Society},
year = {2005},
isbn = {0-7695-2366-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Thornton05ismvl,
author = {Mitchell A. Thornton},
title = {The {K}arhunen-{L}o{\`e}ve Transform of Discrete {M}{V}{L} Functions},
booktitle = {ISMVL},
year = {2005},
pages = {194-199},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl05.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISMVL.2005.48},
crossref = {2005ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005ismvl,
title = {35th IEEE International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
month = may,
year = {2005},
isbn = {0-7695-2336-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiFTM05isvlsi,
author = {Lun Li and
Alex Fit-Florea and
Mitchell A. Thornton and
David W. Matula},
title = {Hardware Implementation of an Additive Bit-Serial Algorithm
for the Discrete Logarithm Modulo 2$^{\mbox{k}}$},
booktitle = {ISVLSI},
year = {2005},
pages = {130-135},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi05.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2005.35},
crossref = {2005isvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005isvlsi,
title = {2005 IEEE Computer Society Annual Symposium on VLSI},
booktitle = {ISVLSI},
publisher = {IEEE Computer Society},
year = {2005},
isbn = {0-7695-2365-X},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CoyleT05itcc,
author = {Frank P. Coyle and
Mitchell A. Thornton},
title = {A Framework and Process for Curricular Integration and Innovation
Using Project Based Interdisciplinary Teams},
booktitle = {ITCC},
year = {2005},
pages = {432-435},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/itcc05.pdf},
puburl = {http://dx.doi.org/10.1109/ITCC.2005.9},
crossref = {2005-1itcc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2005-1itcc,
title = {International Symposium on Information Technology: Coding
and Computing},
booktitle = {ITCC},
publisher = {IEEE Computer Society},
month = apr,
year = {2005},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FazelLTRT04glvlsi,
author = {Kenneth Fazel and
Lun Li and
Mitchell A. Thornton and
Robert B. Reese and
Cherrice Traver},
title = {Performance enhancement in phased logic circuits using automatic
slack-matching buffer insertion},
booktitle = {ACM Great Lakes Symposium on VLSI},
year = {2004},
pages = {413-416},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/glsvlsi04.pdf},
puburl = {http://doi.acm.org/10.1145/988952.989051},
crossref = {2004glvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004glvlsi,
editor = {David Garrett and
John Lach and
Charles A. Zukowski},
title = {14th ACM Great Lakes Symposium on VLSI},
booktitle = {ACM Great Lakes Symposium on VLSI},
publisher = {ACM},
year = {2004},
isbn = {1-58113-853-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MarczynskiTS04iscas,
author = {Ralph Marczynski and
Mitchell A. Thornton and
Stephen A. Szygenda},
title = {Test vector generation and classification using FSM traversals},
booktitle = {ISCAS},
year = {2004},
pages = {309-312},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/iscas04.pdf},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LiTS04isvlsi,
author = {Lun Li and
Mitchell A. Thornton and
Stephen A. Szygenda},
title = {A Genetic Approach for Conjunction Scheduling in Symbolic
Equivalence Checking},
booktitle = {ISVLSI},
year = {2004},
pages = {32-38},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi04.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2004.1339505},
crossref = {2004isvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2004isvlsi,
title = {2004 IEEE Computer Society Annual Symposium on VLSI},
booktitle = {ISVLSI},
publisher = {IEEE Computer Society},
year = {2004},
isbn = {0-7695-2097-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Thornton03ppl,
author = {Mitchell A. Thornton},
title = {Performance Evaluation of a Parallel Decoupled Data Driven
Multiprocessor},
journal = {Parallel Processing Letters},
volume = {13},
number = {3},
year = {2003},
pages = {497-507},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/pplet.pdf},
puburl = {http://dx.doi.org/10.1142/S0129626403001458},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseTT03async,
author = {Robert B. Reese and
Mitchell A. Thornton and
Cherrice Traver},
title = {A Coarse-Grain Phased Logic {C}{P}{U}},
booktitle = {ASYNC},
year = {2003},
pages = {2-13},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/async03.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ASYNC.2003.1199161},
crossref = {2003async},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003async,
title = {9th International Symposium on Advanced Research in Asynchronous
Circuits and Systems},
booktitle = {ASYNC},
publisher = {IEEE Computer Society},
year = {2003},
isbn = {0-7695-1898-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FazelTR03date,
author = {Kenneth Fazel and
Mitchell A. Thornton and
Robert B. Reese},
title = {{P}{L}{F}ire: A Visualization Tool for Asynchronous Phased Logic
Designs},
booktitle = {DATE},
year = {2003},
pages = {11096-11097},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/date03.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2003.10062},
crossref = {2003date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003date,
title = {2003 Design, Automation and Test in Europe Conference and
Exposition},
booktitle = {DATE},
publisher = {IEEE Computer Society},
year = {2003},
isbn = {0-7695-1870-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Thornton03ismvl,
author = {Mitchell A. Thornton},
title = {Spectral Transforms of Mixed-radix {M}{V}{L} Functions},
booktitle = {ISMVL},
month = may,
year = {2003},
pages = {329-333},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl03.pdf},
puburl = {http://computer.org/proceedings/ismvl/1918/19180329abs.htm},
crossref = {2003ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003ismvl,
title = {33rd IEEE International Symposium on Multiple-Valued Logic
(ISMVL 2003), 16-19 May 2003, Tokyo, Japan},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2003},
isbn = {0-7695-1918-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseTT03isvlsi,
author = {Robert B. Reese and
Mitchell A. Thornton and
Cherrice Traver},
title = {A Fine-Grain Phased Logic CPU},
booktitle = {ISVLSI},
month = feb,
year = {2003},
pages = {70-79},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi03.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2003.1183355},
crossref = {2003isvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2003isvlsi,
title = {2003 IEEE Computer Society Annual Symposium on VLSI},
booktitle = {ISVLSI},
publisher = {IEEE Computer Society},
year = {2003},
isbn = {0-7695-1904-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonFRT02date,
author = {Mitchell A. Thornton and
Kenneth Fazel and
Robert B. Reese and
Cherrice Traver},
title = {Generalized Early Evaluation in Self-Timed Circuits},
booktitle = {DATE},
year = {2002},
pages = {255-259},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/date02.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.2002.998281},
crossref = {2002date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002date,
title = {2002 Design, Automation and Test in Europe Conference and
Exposition},
booktitle = {DATE},
publisher = {IEEE Computer Society},
year = {2002},
isbn = {0-7695-1471-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{TownsendTDM02glvlsi,
author = {Whitney J. Townsend and
Mitchell A. Thornton and
Rolf Drechsler and
D. Michael Miller},
title = {Computing walsh, arithmetic, and reed-muller spectral decision
diagrams using graph transformations},
booktitle = {ACM Great Lakes Symposium on VLSI},
year = {2002},
pages = {178-183},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/glvlsi02.pdf},
puburl = {http://doi.acm.org/10.1145/505306.505344},
crossref = {2002glvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002glvlsi,
editor = {Kanad Ghose and
Patrick H. Madden and
Vivek De and
Peter M. Kogge},
title = {Proceedings of the 12th ACM Great Lakes Symposium on VLSI},
booktitle = {ACM Great Lakes Symposium on VLSI},
publisher = {ACM},
year = {2002},
isbn = {1-58113-462-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KerttuLTD02iscas,
author = {Mikael Kerttu and
Per Lindgren and
Mitchell A. Thornton and
Rolf Drechsler},
title = {Switching activity estimation of finite state machines for
low power synthesis},
booktitle = {ISCAS},
year = {2002},
pages = {65-68},
url = {http://engr.smu.edu/~mitch/ftp_dir/pubs/iscas02.ps},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISCAS.2002.1010389},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonMT02ismvl,
author = {Mitchell A. Thornton and
D. Michael Miller and
Whitney J. Townsend},
title = {Chrestenson Spectrum Computation Using Cayley Color Graphs},
booktitle = {ISMVL},
year = {2002},
pages = {123-129},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/ismvl02.pdf},
puburl = {http://computer.org/proceedings/ismvl/1462/14620123abs.htm},
crossref = {2002ismvl},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002ismvl,
title = {32nd IEEE International Symposium on Multiple-Valued Logic},
booktitle = {ISMVL},
publisher = {IEEE Computer Society},
year = {2002},
isbn = {0-7695-1462-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonDM02isvlsi,
author = {Mitchell A. Thornton and
Rolf Drechsler and
D. Michael Miller},
title = {Multi-Output Timed Shannon Circuits},
booktitle = {ISVLSI},
year = {2002},
pages = {47-52},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi02a.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2002.1016873},
crossref = {2002isvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002isvlsi,
title = {2002 IEEE Computer Society Annual Symposium on VLSI},
booktitle = {ISVLSI},
publisher = {IEEE Computer Society},
year = {2002},
isbn = {0-7695-1486-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BruceTSKL02isvlsi,
author = {J. W. Bruce and
Mitchell A. Thornton and
L. Shivakumaraiah and
P. S. Kokate and
X. Li},
title = {Efficient Adder Circuits Based on a Conservative Reversible
Logic Gate},
booktitle = {ISVLSI},
year = {2002},
pages = {83-88},
url = {http://lyle.smu.edu/~mitch/ftp_dir/pubs/isvlsi02b.pdf},
puburl = {http://doi.ieeecomputersociety.org/10.1109/ISVLSI.2002.1016879},
crossref = {2002isvlsi},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2002isvlsi,
title = {2002 IEEE Computer Society Annual Symposium on VLSI},
booktitle = {ISVLSI},
publisher = {IEEE Computer Society},
year = {2002},
isbn = {0-7695-1486-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KerttuLDT02iwls,
author = {Mikael Kerttu and
Per Lindgren and
Rolf Drechsler and
Mitchell A. Thornton},
title = {Low Power Optimization Techniques for BDD Mapped Finite
State Machines},
booktitle = {IWLS},
year = {2002},
pages = {143-148},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{TownsendTL02iwls,
author = {Whitney J. Townsend and
Mitchell A. Thornton and
Parag K. Lala},
title = {On-line Error Detection in a Carry-free Adder},
booktitle = {IWLS},
year = {2002},
pages = {251-254},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@book{0006031daglib,
author = {Mitchell Aaron Thornton and
Rolf Drechsler and
D. Michael Miller},
title = {Spectral techniques in {V}{L}{S}{I} {C}{A}{D}},
publisher = {Kluwer},
year = {2001},
isbn = {978-0-7923-7433-6},
pages = {I-XIII, 1-250},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LindgrenKTD01aspdac,
author = {Per Lindgren and
Mikael Kerttu and
Mitchell A. Thornton and
Rolf Drechsler},
title = {Low power optimization technique for BDD mapped circuits},
booktitle = {ASP-DAC},
year = {2001},
pages = {615-621},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.acm.org/10.1145/370155.370564},
crossref = {2001aspdac},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2001aspdac,
title = {Proceedings of ASP-DAC 2001, Asia and South Pacific Design
Automation Conference 2001, January 30-February 2, 2001,
Yokohama, Japan},
booktitle = {ASP-DAC},
publisher = {ACM},
year = {2001},
isbn = {0-7803-6634-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonD01date,
author = {Mitchell A. Thornton and
Rolf Drechsler},
title = {Spectral decision diagrams using graph transformations},
booktitle = {DATE},
year = {2001},
pages = {713-719},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.acm.org/10.1145/367072.367860},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ReeseTT01iccd,
author = {Robert B. Reese and
Mitchell A. Thornton and
Cherrice Traver},
title = {Arithmetic Logic Circuits Using Self-Timed Bit Level Dataflow
and Early Evaluation},
booktitle = {ICCD},
year = {2001},
pages = {18-23},
crossref = {2001iccd},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2001iccd,
title = {19th International Conference on Computer Design (ICCD 2001),
VLSI in Computers and Processors, 23-26 September 2001,
Austin, TX, USA, Proceedings},
booktitle = {ICCD},
publisher = {IEEE Computer Society},
year = {2001},
isbn = {0-7695-1200-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ZuzekDT00integration,
author = {A. Zuzek and
Rolf Drechsler and
Mitchell A. Thornton},
title = {Boolean function representation and spectral characterization
using AND/OR graphs},
journal = {Integration},
volume = {29},
number = {2},
year = {2000},
pages = {101-116},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://dx.doi.org/10.1016/S0167-9260(00)00003-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DrechslerTW00ismvl,
author = {Rolf Drechsler and
Mitchell A. Thornton and
David Wessels},
title = {MDD-Based Synthesis of Multi-Valued Logic Networks},
booktitle = {ISMVL},
year = {2000},
pages = {41-46},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://computer.org/proceedings/ismvl/0692/06920041abs.htm},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DrechslerT00ismvl,
author = {Rolf Drechsler and
Mitchell A. Thornton},
title = {Computation of Spectral Information from Logic Netlists},
booktitle = {ISMVL},
year = {2000},
pages = {53-58},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://computer.org/proceedings/ismvl/0692/06920053abs.htm},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonDG00ismvl,
author = {Mitchell A. Thornton and
Rolf Drechsler and
Wolfgang G{\"u}nther},
title = {A Method for Approximate Equivalence Checking},
booktitle = {ISMVL},
year = {2000},
pages = {447-452},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://computer.org/proceedings/ismvl/0692/06920447abs.htm},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{SamdaniT00mascots,
author = {Q. G. Samdani and
Mitchell A. Thornton},
title = {Cache Resident Data Locality Analysis},
booktitle = {MASCOTS},
year = {2000},
pages = {539-},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://computer.org/proceedings/mascots/0728/07280539abs.htm},
crossref = {2000mascots},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2000mascots,
title = {MASCOTS 2000, Proceedings of the 8th International Symposium
on Modeling, Analysis and Simulation of Computer and Telecommunication
Systems, 29 August - 1 September 2000, San Francisco, California,
USA},
booktitle = {MASCOTS},
publisher = {IEEE Computer Society},
year = {2000},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ThorntonN99todaes,
author = {Mitchell A. Thornton and
V. S. S. Nair},
title = {Behavioral synthesis of combinational logic using spectral-based
heuristics},
journal = {ACM Trans. Design Autom. Electr. Syst.},
volume = {4},
number = {2},
year = {1999},
pages = {219-230},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.acm.org/10.1145/307988.308000},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonWDD99date,
author = {Mitchell A. Thornton and
J. P. Williams and
Rolf Drechsler and
Nicole Drechsler},
title = {Variable Reordering for Shared Binary Decision Diagrams
Using Output Probabilities},
booktitle = {DATE},
year = {1999},
pages = {758-759},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.ieeecomputersociety.org/10.1109/DATE.1999.761217},
crossref = {1999date},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{1999date,
title = {1999 Design, Automation and Test in Europe (DATE '99), 9-12
March 1999, Munich, Germany},
booktitle = {DATE},
publisher = {IEEE Computer Society},
year = {1999},
isbn = {0-7695-0078-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{Thornton97tc,
author = {Mitchell A. Thornton},
title = {Signed Binary Addition Circuitry with Inherent Even Parity
Outputs},
journal = {IEEE Trans. Computers},
volume = {46},
number = {7},
year = {1997},
pages = {811-816},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.ieeecomputersociety.org/10.1109/12.599901},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ThorntonA97hicss,
author = {Mitchell A. Thornton and
D. L. Andrews},
title = {Graph Analysis and Transformation Techniques for Runtime
Minimization in Multi-Threaded Architectures},
booktitle = {HICSS (1)},
year = {1997},
pages = {566-575},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.ieeecomputersociety.org/10.1109/HICSS.1997.667356},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@article{ThorntonN95tcad,
author = {Mitchell A. Thornton and
V. S. S. Nair},
title = {Efficient calculation of spectral coefficients and their
applications},
journal = {IEEE Trans. on CAD of Integrated Circuits and Systems},
volume = {14},
number = {11},
year = {1995},
pages = {1328-1341},
url = {http://lyle.smu.edu/},
presurl = {http://lyle.smu.edu/},
puburl = {http://doi.ieeecomputersociety.org/10.1109/43.469660},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CasperSAM12,
author = {William Casper and Stephen Papa},
title = {A Multi-Disciplined Security Engineering Education Approach},
booktitle = {Conference on Security and Management ({S}{A}{M})},
year = {2012},
month = {July},
pages = {},
puburl = {http://elrond.informatik.tu-freiberg.de/papers/WorldComp2012/SAM9724.pdf}
}