default search action
Patrick Hurley
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j6]Michael Inadomi, Karandeep Singh, Ji Qi, Rodney Dunn, Susan Linsell, Brian T. Denton, Patrick Hurley, Eduardo Kleer, James Montie, Khurshid Ghani:
Prospective monitoring of imaging guideline adherence by physicians in a surgical collaborative: comparison of statistical process control methods for detecting outlying performance. BMC Medical Informatics Decis. Mak. 20(1): 89 (2020) - 2014
- [j5]Hala Mostafa, Partha P. Pal, Patrick Hurley:
Message Passing for Distributed QoS-Security Tradeoffs. Comput. J. 57(6): 840-855 (2014) - 2013
- [j4]Nong Ye, Billibaldo Martinez Aranda, Patrick Hurley:
System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability. Inf. Knowl. Syst. Manag. 12(1): 75-95 (2013) - 2010
- [j3]Nong Ye, Stephen S. Yau, Dazhi Huang, Mustafa Gökçe Baydogan, Billibaldo Martinez Aranda, Auttawut Roontiva, Patrick Hurley:
Models of dynamic relations among service activities, system state and service quality on computer and network systems. Inf. Knowl. Syst. Manag. 9(2): 99-116 (2010) - 2008
- [j2]Nong Ye, Xiaoyun Xu, Patrick Hurley:
QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks. Inf. Knowl. Syst. Manag. 7(4): 429-451 (2008) - 2006
- [j1]Shirley Cohen, Patrick Hurley, Karl W. Schulz, William L. Barth, Brad Benton:
Scientific formats for object-relational database systems: a study of suitability and performance. SIGMOD Rec. 35(2): 10-15 (2006)
Conference and Workshop Papers
- 2022
- [c10]Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). ISSRE 2022: 73-84 - 2017
- [c9]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c8]Aaron Paulos, Partha P. Pal, Shane S. Clark, Kyle Usbeck, Patrick Hurley:
Trusted Mission Operation - Concept and Implementation. RV 2017: 416-423 - 2016
- [c7]Kate Highnam, Kevin Angstadt, Kevin Leach, Westley Weimer, Aaron Paulos, Patrick Hurley:
An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. DSN Workshops 2016: 222-225 - [c6]Westley Weimer, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley:
Trusted Software Repair for System Resiliency. DSN Workshops 2016: 238-241 - 2013
- [c5]Hala Mostafa, Nathaniel Soule, Nicholas Hoff, Partha P. Pal, Patrick Hurley:
Applying distributed optimization for QoS-security tradeoff in a distributed information system. AAMAS 2013: 1261-1262 - 2011
- [c4]Patrick Hurley, Partha P. Pal, Matthew Tan Creti, Amy Fedyk:
Continuous mission-oriented assessment (CMA) of assurance. DSN Workshops 2011: 33-38 - [c3]Matthew R. Hanlon, Rion Dooley, Stephen A. Mock, Maytal Dahan, Praveen Nuthulapati, Patrick Hurley:
Benefits of NoSQL databases for portals & science gateways. TG 2011: 36:1 - 2009
- [c2]Rion Dooley, Stephen A. Mock, Maytal Dahan, Praveen Nuthulapati, Patrick Hurley:
Evolving interfaces to impacting technology: the mobile TeraGrid User Portal. SC-GCE 2009 - 2005
- [c1]Kevin A. Kwiat, Kaliappa Nadar Ravindran, Patrick Hurley:
Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems. WOWMOM 2005: 153-162
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint