default search action
Chris McDonald
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j18]Chris McDonald:
Influence of heterogeneous edge weights on assortative mixing patterns in military personnel networks. Pattern Anal. Appl. 25(1): 35-46 (2022) - 2021
- [j17]Matthew Heinsen Egan, Chris McDonald:
An evaluation of SeeC: a tool designed to assist novice C programmers with program understanding and debugging. Comput. Sci. Educ. 31(3): 340-373 (2021) - 2020
- [j16]José Camacho, Chris McDonald, Ron Peterson, Xia Zhou, David Kotz:
Longitudinal analysis of a campus Wi-Fi network. Comput. Networks 170: 107103 (2020)
2010 – 2019
- 2019
- [c46]Brett A. Becker, Paul Denny, Raymond Pettit, Durell Bouchard, Dennis J. Bouvier, Brian Harrington, Amir Kamil, Amey Karkare, Chris McDonald, Peter-Michael Osera, Janice L. Pearce, James Prather:
Compiler Error Messages Considered Unhelpful: The Landscape of Text-Based Programming Error Message Research. ITiCSE-WGR 2019: 177-210 - [c45]Brett A. Becker, Paul Denny, Raymond Pettit, Durell Bouchard, Dennis J. Bouvier, Brian Harrington, Amir Kamil, Amey Karkare, Chris McDonald, Peter-Michael Osera, Janice L. Pearce, James Prather:
Unexpected Tokens: A Review of Programming Error Messages and Design Guidelines for the Future. ITiCSE 2019: 253-254 - 2017
- [c44]Rui Wang, Wei Liu, Chris McDonald:
A Matrix-Vector Recurrent Unit Model for Capturing Compositional Semantics in Phrase Embeddings. CIKM 2017: 1499-1507 - 2016
- [c43]Rui Wang, Wei Liu, Chris McDonald:
Featureless Domain-Specific Term Extraction with Minimal Labelled Data. ALTA 2016: 103-112 - 2015
- [j15]Muhammad Uzair, Arif Mahmood, Ajmal S. Mian, Chris McDonald:
Periocular region-based person identification in the visible, infrared and hyperspectral imagery. Neurocomputing 149: 854-867 (2015) - [c42]Matthew Heinsen Egan, Chris McDonald:
Dynamic evaluation trees for novice C programmers. ACE 2015: 175-181 - [c41]Rui Wang, Wei Liu, Chris McDonald:
Using Word Embeddings to Enhance Keyword Identification for Scientific Publications. ADC 2015: 257-268 - 2014
- [j14]Keren Tan, Chris McDonald, Bennet Vance, Chrisil Arackaparambil, Sergey Bratus, David Kotz:
From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System. IEEE Trans. Mob. Comput. 13(1): 216-229 (2014) - [c40]Matthew Heinsen Egan, Chris McDonald:
Program visualization and explanation for novice C programmers. ACE 2014: 51-57 - [c39]Chris McDonald:
A Multi-tier Client-Server Project Employing Mobile Clients. ACE 2014: 91-96 - [c38]Rui Wang, Wei Liu, Chris McDonald:
How Preprocessing Affects Unsupervised Keyphrase Extraction. CICLing (1) 2014: 163-176 - [c37]Lyndon While, Chris McDonald:
Optimising Wi-Fi Installations Using a Multi-Objective Evolutionary Algorithm. SEAL 2014: 747-759 - 2013
- [c36]Muhammad Uzair, Arif Mahmood, Ajmal S. Mian, Chris McDonald:
A compact discriminative representation for efficient image-set classification with application to biometric recognition. ICB 2013: 1-8 - [c35]Chris McDonald:
A location prediction project on mobile devices. ITiCSE 2013: 320 - [c34]Matthew Heinsen Egan, Chris McDonald:
Reducing novice C programmers' frustration through improved runtime error checking. ITiCSE 2013: 322 - [c33]Muhammad Uzair, Arif Mahmood, Ajmal S. Mian, Chris McDonald:
Periocular biometric recognition using image sets. WACV 2013: 246-251
2000 – 2009
- 2009
- [c32]Chris McDonald:
Linking Simulation and Practice. CSEDU (2) 2009: 258-263 - 2008
- [j13]Yong Sheng, Guanling Chen, Hongda Yin, Keren Tan, Udayan Deshpande, Bennet Vance, David Kotz, Andrew T. Campbell, Chris McDonald, Tristan Henderson, J. Wright:
Map: a scalable monitoring system for dependable 802.11 wireless networks. IEEE Wirel. Commun. 15(5): 10-18 (2008) - [c31]Udayan Deshpande, Chris McDonald, David Kotz:
Refocusing in 802.11 Wireless Measurement. PAM 2008: 142-151 - 2007
- [j12]Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Dependable Dynamic Source Routing without a Trusted Third Party. J. Res. Pract. Inf. Technol. 39(1): 19-34 (2007) - [j11]Asad Amir Pirzada, Chris McDonald:
Collaborative Dynamic Source Routing using transitional trust filters. Int. J. Inf. Comput. Secur. 1(3): 278-297 (2007) - [c30]Babak Pazand, Chris McDonald:
A Critique of Mobility Models for Wireless Network Simulation. ACIS-ICIS 2007: 141-146 - [c29]Asad Amir Pirzada, Chris McDonald:
Trusted Greedy Perimeter Stateless Routing. ICON 2007: 206-211 - [c28]Udayan Deshpande, David Kotz, Chris McDonald:
Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring. ICON 2007: 353-358 - [c27]Christian Brown, Chris McDonald:
Visualizing berkeley socket calls in students' programs. ITiCSE 2007: 101-105 - 2006
- [j10]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Incorporating trust and reputation in the DSR protocol for dependable routing. Comput. Commun. 29(15): 2806-2821 (2006) - [j9]Asad Amir Pirzada, Chris McDonald:
Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks. Int. J. Netw. Secur. 3(2): 191-202 (2006) - [j8]Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Performance Comparison of Trust-Based Reactive Routing Protocols. IEEE Trans. Mob. Comput. 5(6): 695-710 (2006) - [j7]Asad Amir Pirzada, Chris McDonald:
Trust Establishment In Pure Ad-hoc Networks. Wirel. Pers. Commun. 37(1-2): 139-168 (2006) - 2005
- [j6]Binbing Yu, Ram C. Tiwari, Kathleen A. Cronin, Chris McDonald, Eric J. Feuer:
CANSURV: A Windows program for population-based cancer survival analysis. Comput. Methods Programs Biomed. 80(3): 195-203 (2005) - [c26]Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Dependable Dynamic Source Routing without a Trusted Third Party. ACSC 2005: 79-86 - [c25]Amer Filipovic, Amitava Datta, Chris McDonald:
Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. ISPA Workshops 2005: 422-433 - 2004
- [j5]Simon Huband, Chris McDonald:
Parallel program debugging by specification. Concurr. Pract. Exp. 16(6): 551-585 (2004) - [j4]Asad Amir Pirzada, Chris McDonald:
Performance Comparison of Reactive Routing Protocols under Attack Conditions. Int. J. Wirel. Opt. Commun. 2(2): 163-180 (2004) - [c24]Asad Amir Pirzada, Chris McDonald:
Kerberos Assisted Authentication in Mobile Ad-hoc Networks. ACSC 2004: 41-46 - [c23]Asad Amir Pirzada, Chris McDonald:
Establishing Trust In Pure Ad-hoc Networks. ACSC 2004: 47-54 - [c22]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Trusted routing in ad-hoc networks using pheromone trails. IEEE Congress on Evolutionary Computation 2004: 1938-1943 - [c21]Asad Amir Pirzada, Chris McDonald:
Trusted Route Discovery with TORA Protocol. CNSR 2004: 121-130 - [c20]Chris McDonald, Gerhard Roth, Stephen Marsh:
Red-Handed: Collaborative Gesture Interaction with a Projection Table. FGR 2004: 773-778 - [c19]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Trust-based routing for ad-hoc wireless networks. ICON 2004: 326-330 - [c18]Asad Amir Pirzada, Chris McDonald:
Secure Pervasive Computing without a Trusted Third Party. ICPS 2004: 240 - [c17]Asad Amir Pirzada, Amitava Datta, Chris McDonald:
Trusted Route Discovery with AODV Protocol. International Conference on Wireless Networks 2004: 129-135 - [c16]Asad Amir Pirzada, Chris McDonald:
Secure Routing with the DSR Protocol. Wireless Information Systems 2004: 24-33 - 2003
- [c15]Voon-Li Chung, Chris McDonald:
Towards Customisable Tuple Field Matching in VLOS. ACSC 2003: 317-323 - [e1]Chris McDonald:
Converged Networking: Data and Real-time Communications over IP, IFIP TC6 / WG6.2 Sixth International Symposium on Communications Interworking (Interworking 2002), October 13-16, 2002, Perth, Western Australia. IFIP Conference Proceedings 247, Kluwer 2003, ISBN 1-4020-7379-8 [contents] - 2002
- [c14]Shahzad Malik, Chris McDonald, Gerhard Roth:
Hand Tracking for Interactive Pattern-Based Augmented Reality. ISMAR 2002: 117-126 - [c13]Bruce S. Elenbogen, John E. Laird, Richard J. Enbody, Chris McDonald, Peter B. Henderson, Richard Nau, Steven L. Tanimoto:
Mathematics preparation for undergraduate degrees in computer science. SIGCSE 2002: 98-99 - 2001
- [j3]Simon Huband, Chris McDonald:
Using XML to Specify a Trace Format for MPI Programs. J. Res. Pract. Inf. Technol. 33(2): 133-145 (2001) - [c12]Simon Huband, Chris McDonald:
A Preliminary Topological Debugger for MPI Programs. CCGRID 2001: 422-429 - [c11]Simon Huband, Chris McDonald:
DEPICT: A Topology-Based Debugger for MPI Programs. HIPS 2001: 109-121 - [c10]Simon Huband, Chris McDonald:
DEPICT: a topology-based debugger for MPI programs. IPDPS 2001: 106 - 2000
- [c9]Chris McDonald, Kamran Kazemi:
Teaching parallel algorithm with process topologies. SIGCSE 2000: 70-74 - [c8]Bruce S. Elenbogen, Bruce R. Maxim, Chris McDonald:
Yet, more Web exercises for learning C++. SIGCSE 2000: 290-294 - [c7]Elliot B. Koffman, Dorothy Deremer, Chris McDonald, Loren Rhodes, S. Rebecca Thomas, A. Joe Turner, Curt M. White:
IT programs and CS departments (panel session). SIGCSE 2000: 417-418
1990 – 1999
- 1999
- [c6]Kamran Kazemi, Chris McDonald:
Formal Specification of Virtual Process Topologies. IWCC 1999: 169-176 - [c5]Simon Huband, Chris McDonald:
Debugging Parallel Programs Using Incomplete Information. IWCC 1999: 278-286 - 1997
- [c4]Chris McDonald, Kamran Kazemi:
Improving the PVM teaching environment. SIGCSE 1997: 219-223 - 1996
- [c3]Chris McDonald:
User-level distributed file systems projects. SIGCSE 1996: 333-337 - 1993
- [j2]Chris McDonald:
Computers at Risk: Does Anyone Remember?. Inf. Secur. J. A Glob. Perspect. 2(1): 9-12 (1993) - 1992
- [c2]Chris McDonald:
Teaching concurrency with Joyce and Linda. SIGCSE 1992: 46-52 - 1991
- [c1]Chris McDonald:
A network specification language and execution environment for undergraduate teaching. SIGCSE 1991: 25-34
1980 – 1989
- 1988
- [j1]Chris McDonald, Trevor I. Dix:
Support for Graphs of Processes in a Command Interpreter. Softw. Pract. Exp. 18(10): 1011-1016 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint