default search action
Suzanne McIntosh
Person information
- affiliation: NYU School of Engineering, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c14]Cole Smith, Andrii Dobroshynskyi, Suzanne McIntosh:
Quantifying Local Energy Demand Through Pollution Analysis. LOD (2) 2020: 504-515
2010 – 2019
- 2019
- [c13]Diwen Xue, Willie Yee, Yueping Wang, Suzanne McIntosh:
Implementing a Domain-Independent Framework to Detect Suspicious Review Patterns. IEEE BigData 2019: 1687-1692 - 2018
- [c12]Samuel Smith, Kedar Gangopadhyay, Simranjyot Singh Gill, Suzanne McIntosh:
A Relationship Between Fines and Violent Crimes. BigDataService 2018: 115-120 - 2017
- [j5]Huiyu Sun, Suzanne McIntosh, Bin Li:
Detection of in-progress phone calls using smartphone proximity and orientation sensors. Int. J. Sens. Networks 25(2): 104-114 (2017) - [j4]Shih-Chia Huang, Suzanne McIntosh, Stanislav Sobolevsky, Patrick C. K. Hung:
Big Data Analytics and Business Intelligence in Industry. Inf. Syst. Frontiers 19(6): 1229-1232 (2017) - 2016
- [j3]Stanislav Sobolevsky, Suzanne McIntosh, Patrick C. K. Hung:
Editorial Preface: Special Issue on Big Data Analytics, Infrastructure, and Applications. IEEE Trans. Serv. Comput. 9(1): 2-3 (2016) - [c11]Huiyu Sun, Suzanne McIntosh:
Phone Call Detection Based on Smartphone Sensor Data. ICCCS (1) 2016: 284-295 - [c10]Huiyu Sun, Suzanne McIntosh:
Big Data Mobile Services for New York City Taxi Riders and Drivers. IEEE MS 2016: 57-64 - 2015
- [e1]Indu Nair, Sushmita Mitra, Ljiljana Trajkovic, Punam Bedi, Suzanne McIntosh, M. S. Rajasree:
Proceedings of the Third International Symposium on Women in Computing and Informatics, WCI 2015, co-located with ICACCI 2015, Kochi, India, August 10-13, 2015. ACM 2015, ISBN 978-1-4503-3361-0 [contents] - 2013
- [c9]Canturk Isci, Suzanne McIntosh, Jeffrey O. Kephart, Rajarshi Das, James E. Hanson, Scott Piper, Robert R. Wolford, Thomas Brey, Robert Kantner, Allen Ng, James Norris, Abdoulaye Traore, Michael Frissora:
Agile, efficient virtualization power management with low-latency server power states. ISCA 2013: 96-107 - 2011
- [j2]Paul A. Karger, Suzanne McIntosh, Elaine R. Palmer, David C. Toll, Samuel Weber:
Lessons Learned: Building the Caernarvon High-Assurance Operating System. IEEE Secur. Priv. 9(1): 22-30 (2011) - [c8]Suzanne McIntosh, Jeffrey O. Kephart, Jonathan Lenchner, B. Yang, Metin Feridun, Michael Nidd, Axel Tanner, I. Barabasi:
Semi-automated data center hotspot diagnosis. CNSM 2011: 1-7 - [c7]Jonathan Lenchner, Canturk Isci, Jeffrey O. Kephart, Christopher R. Mansley, Jonathan Connell, Suzanne McIntosh:
Towards data center self-diagnosis using a mobile robot. ICAC 2011: 81-90 - [c6]Hoi Y. Chan, Jonathan Connell, Canturk Isci, Jeffrey O. Kephart, Jonathan Lenchner, Christopher R. Mansley, Suzanne McIntosh:
A robot as mobile sensor and agent in data center energy management. ICAC 2011: 165-166 - [c5]Christopher R. Mansley, Jonathan Connell, Canturk Isci, Jonathan Lenchner, Jeffrey O. Kephart, Suzanne McIntosh, Michael Schappert:
Robotic mapping and monitoring of data centers. ICRA 2011: 5905-5910 - 2010
- [c4]Paul A. Karger, David C. Toll, Elaine R. Palmer, Suzanne McIntosh, Samuel Weber, Jonathan W. Edwards:
Implementing a High-Assurance Smart-Card OS. Financial Cryptography 2010: 51-65
2000 – 2009
- 2008
- [j1]David C. Toll, Paul A. Karger, Elaine R. Palmer, Suzanne McIntosh, Sam Weber:
The Caernarvon secure embedded operating system. ACM SIGOPS Oper. Syst. Rev. 42(1): 32-39 (2008) - [c3]Sam Weber, Amitkumar M. Paradkar, Suzanne McIntosh, David C. Toll, Paul A. Karger, Matthew Kaplan, Elaine R. Palmer:
The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System. ISSRE 2008: 229-238 - 2007
- [c2]Xiaolan Zhang, Suzanne McIntosh, Pankaj Rohatgi, John Linwood Griffin:
XenSocket: A High-Throughput Interdomain Transport for Virtual Machines. Middleware 2007: 184-203 - 2006
- [c1]Amit M. Paradkar, Suzanne McIntosh, Sam Weber, David C. Toll, Paul A. Karger, Matt Kaplan:
Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria Evaluations. ISSSE 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint