Остановите войну!
for scientists:
default search action
Jean Mayo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c39]Steven Carr, Yu Chin Cheng, Yu-Hsiang Hu, Jean Mayo, Ahmed Radwan, Ching-Kuang Shene, James W. Walker:
Design and Use of a Visualization for Teaching Integer Coercion. SIGCSE (1) 2022: 794-800 - 2021
- [c38]Wassnaa Al-Mawee, Steve Carr, Jean Mayo:
Admonita: A Recommendation-based Trust Model for Dynamic Data Integrity. ICISSP 2021: 273-282 - [c37]James W. Walker, Steven Carr, Ahmed Radwan, Yu-Hsiang Hu, Yu Chin Cheng, Jean Mayo, Ching-Kuang Shene:
A Visualization for Teaching Integer Coercion. ITiCSE (2) 2021: 640 - 2020
- [c36]James W. Walker, Man Wang, Steve Carr, Jean Mayo, Ching-Kuang Shene:
A System for Visualizing the Process Address Space in the Context of Teaching Secure Coding in C. SIGCSE 2020: 1033-1039 - [c35]Steve Carr, Jean Mayo:
SecureCvisual: Visualization and Analysis for C Code Security. SIGCSE 2020: 1418
2010 – 2019
- 2019
- [c34]Wassnaa Al-Mawee, Paul J. Bonamy, Steve Carr, Jean Mayo:
Maia: A Language for Mandatory Integrity Controls of Structured Data. ICISSP 2019: 257-265 - [c33]James W. Walker, Man Wang, Steven Carr, Jean Mayo, Ching-Kuang Shene:
Teaching Integer Security Using Simple Visualizations. ITiCSE 2019: 513-519 - 2017
- [c32]Man Wang, Jean Mayo, Ching-Kuang Shene, Steve Carr, Chaoli Wang:
UNIXvisual: A Visualization Tool for Teaching UNIX Permissions. ITiCSE 2017: 194-199 - [c31]James W. Walker, Jean Mayo, Ching-Kuang Shene, Steve Carr:
Visualization for Secure Coding in C. ITiCSE 2017: 372 - 2016
- [c30]Jun Ma, Jun Tao, Jean Mayo, Ching-Kuang Shene, Melissa S. Keranen, Chaoli Wang:
AESvisual: A Visualization Tool for the AES Cipher. ITiCSE 2016: 230-235 - [c29]Man Wang, Jean Mayo, Ching-Kuang Shene, Steve Carr, Chaoli Wang:
UNIXvisual: A Visualization Tool for Teaching the UNIX Permission Model. ITiCSE 2016: 356 - 2015
- [c28]Ali Ebnenasir, Jean Mayo:
Fault-Tolerant Parallel and Distributed Computing for Software Engineering Undergraduates. IPDPS Workshops 2015: 788-794 - [c27]Can Li, Jun Ma, Jun Tao, Jean Mayo, Ching-Kuang Shene, Melissa S. Keranen, Chaoli Wang:
VIGvisual: A Visualization Tool for the Vigenère Cipher. ITiCSE 2015: 129-134 - [c26]Man Wang, Jean Mayo, Ching-Kuang Shene, Thomas Lake, Steve Carr, Chaoli Wang:
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control. ITiCSE 2015: 141-146 - [c25]Steve Carr, Melissa S. Keranen, Jean Mayo:
Teaching Cryptography and Access Control Hands-On (Abstract Only). SIGCSE 2015: 707 - 2014
- [c24]Man Wang, Steve Carr, Jean Mayo, Ching-Kuang Shene, Chaoli Wang:
MLSvisual: a visualization tool for teaching access control using multi-level security. ITiCSE 2014: 93-98 - [c23]Jun Ma, Jun Tao, Melissa S. Keranen, Jean Mayo, Ching-Kuang Shene, Chaoli Wang:
SHAvisual: a secure hash algorithm visualization tool. ITiCSE 2014: 338 - [c22]Jun Tao, Jun Ma, Melissa S. Keranen, Jean Mayo, Ching-Kuang Shene, Chaoli Wang:
RSAvisual: a visualization tool for the RSA cipher. SIGCSE 2014: 635-640 - 2013
- [c21]Lihui Hu, Jean Mayo, Charles Wallace:
An empirical study of three access control systems. SIN 2013: 287-291 - 2012
- [c20]Jun Tao, Jun Ma, Melissa S. Keranen, Jean Mayo, Ching-Kuang Shene:
ECvisual: a visualization tool for elliptic curve based ciphers. SIGCSE 2012: 571-576 - 2010
- [c19]Xinli Wang, Jean Mayo, Guy C. Hembroff:
Detection of a Weak Conjunction of Unstable Predicates in Dynamic Systems. ICPADS 2010: 338-346
2000 – 2009
- 2009
- [c18]Xinli Wang, Jean Mayo, Guy C. Hembroff, Chunming Gao:
Detection of Conjunctive Stable Predicates in Dynamic Systems. ICPADS 2009: 828-835 - 2008
- [j4]Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo:
MuON: Epidemic based mutual anonymity in unstructured P2P networks. Comput. Networks 52(5): 915-934 (2008) - 2006
- [c17]Xinli Wang, Jean Mayo, Wei Gao, James Slusser:
An Efficient Implementation of Vector Clocks in Dynamic Systems. PDPTA 2006: 593-599 - 2005
- [c16]Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean Mayo:
MuON: Epidemic Based Mutual Anonymity. ICNP 2005: 99-109 - [c15]Donald Darling, Jean Mayo, Xinli Wang:
Stable Predicate Detection in Dynamic Systems. OPODIS 2005: 161-175 - 2004
- [j3]Shilpa Bansod, Jean Mayo:
A Distributed Algorithm For Unstable Global Predicate Evaluation With Approximately Synchronized Clocks. Stud. Inform. Univ. 3(2): 151-168 (2004) - [c14]Xinli Wang, Jean Mayo:
A Distributed Algorithm for Detecting Deadlocks under the OR Model and the Resolution Based on Hardware Clocks. PDCS 2004: 193-200 - [c13]Xinli Wang, Jean Mayo:
A General Model for Detecting Distributed Termination in Dynamic Systems. IPDPS 2004 - [c12]Xinli Wang, Jean Mayo:
A Dynamic Priority Based Algorithm for Distributed Deadlock Detection and Resolution. PDPTA 2004: 599-605 - 2003
- [j2]Steve Carr, Jean Mayo, Ching-Kuang Shene:
ThreadMentor: a pedagogical tool for multithreaded programming. ACM J. Educ. Resour. Comput. 3(1): 1 (2003) - [c11]James K. Huggins, Jean Mayo, Charles Wallace:
Teaching ASMs, Teaching with ASMs: Opportunities in Undergraduate Education. Abstract State Machines 2003: 414 - [c10]Jeffrey Dobbelaere, Phil Kearns, Jean Mayo:
The Advantages of Real Time in TORA. CAINE 2003: 225-229 - [c9]Steve Carr, Changpeng Fang, Tim Jozwowski, Jean Mayo, Ching-Kuang Shene:
Concurrent Mentor: A Visualization System for Distributed Programming Education. PDPTA 2003: 1676-1682 - 2002
- [c8]Steve Carr, Ping Chen, Tim Jozwowski, Jean Mayo, Ching-Kuang Shene:
Channels, visualization, and topology editor. ITiCSE 2002: 106-110 - [c7]Shilpa Bansod, Jean Mayo:
A Distributed Algorithm for Unstable Global Predicate Evaluation with Approximately Synchronized Clocks. OPODIS 2002: 63-72 - [c6]Steve Carr, Changpeng Fang, Tim Jozwowski, Jean Mayo, Ching-Kuang Shene:
A communication library to support concurrent programming courses. SIGCSE 2002: 360-364
1990 – 1999
- 1999
- [c5]Jean Mayo, Phil Kearns:
Distributed Deadlock Detection and Resolution Based on Hardware Clocks. ICDCS 1999: 208-215 - [c4]Jean Mayo, Phil Kearns:
A secure unrestricted advanced systems laboratory. SIGCSE 1999: 165-169 - 1998
- [c3]Jean Mayo, Phil Kearns:
A secure networked laboratory for kernel programming. ITiCSE 1998: 175-177 - 1995
- [c2]Jean Mayo, Phil Kearns:
Efficient Distributed Termination Detection with Roughly Synchronized Clocks. Parallel and Distributed Computing and Systems 1995: 305-307 - [c1]Jean Mayo, Phil Kearns:
Global predicates in rough real time. SPDP 1995: 17-24 - 1994
- [j1]Jean Mayo, Phil Kearns:
Distributed Termination Detection with Roughly Synchronized Clocks. Inf. Process. Lett. 52(2): 105-108 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint