Establishing Trust In Pure Ad-hoc Networks. AA Pirzada, C McDonald ACSC 4 (26), 1, 2004 | 616 | 2004 |
Compiler error messages considered unhelpful: The landscape of text-based programming error message research BA Becker, P Denny, R Pettit, D Bouchard, DJ Bouvier, B Harrington, ... Proceedings of the working group reports on innovation and technology in …, 2019 | 223 | 2019 |
Performance comparison of trust-based reactive routing protocols AA Pirzada, C McDonald, A Datta IEEE transactions on mobile computing 5 (6), 695-710, 2006 | 220 | 2006 |
Kerberos assisted authentication in mobile ad-hoc networks AA Pirzada, C McDonald ACM International Conference Proceeding Series 56, 41-46, 2004 | 174 | 2004 |
Trust establishment in pure ad-hoc networks AA Pirzada, C McDonald Wireless Personal Communications 37, 139-168, 2006 | 173 | 2006 |
Corpus-independent generic keyphrase extraction using word embedding vectors R Wang, W Liu, C McDonald Software engineering research conference 39, 1-8, 2014 | 132 | 2014 |
Using word embeddings to enhance keyword identification for scientific publications R Wang, W Liu, C McDonald Databases Theory and Applications: 26th Australasian Database Conference …, 2015 | 83 | 2015 |
Trust-based routing for ad-hoc wireless networks AA Pirzada, A Datta, C McDonald Proceedings. 2004 12th IEEE international conference on networks (ICON 2004 …, 2004 | 81 | 2004 |
Trusted greedy perimeter stateless routing AA Pirzada, C McDonald 2007 15th IEEE International Conference on Networks, 206-211, 2007 | 80 | 2007 |
A critique of mobility models for wireless network simulation B Pazand, C McDonald 6th IEEE/ACIS International Conference on Computer and Information Science …, 2007 | 79 | 2007 |
Propagating trust in ad-hoc networks for reliable routing AA Pirzada, A Datta, C McDonald International Workshop on Wireless Ad-Hoc Networks, 2004., 58-62, 2004 | 79 | 2004 |
Circumventing sinkholes and wormholes in wireless sensor networks AA Pirzada, C McDonald IWWAN’05: Proceedings of International Workshop on Wireless Ad-hoc Networks 71, 2005 | 76 | 2005 |
Secure routing with the AODV protocol AA Pirzada, C McDonald 2005 Asia-Pacific Conference on Communications, 57-61, 2005 | 64 | 2005 |
Incorporating trust and reputation in the DSR protocol for dependable routing AA Pirzada, A Datta, C McDonald Computer Communications 29 (15), 2806-2821, 2006 | 61 | 2006 |
Featureless domain-specific term extraction with minimal labelled data R Wang, W Liu, C McDonald Proceedings of the Australasian Language Technology Association Workshop …, 2016 | 57 | 2016 |
MAP: A scalable monitoring system for dependable 802.11 wireless networks Y Sheng, G Chen, H Yin, K Tan, U Deshpande, B Vance, D Kotz, ... IEEE Wireless Communications 15 (5), 10-18, 2008 | 56 | 2008 |
Periocular biometric recognition using image sets M Uzair, A Mahmood, A Mian, C McDonald 2013 IEEE Workshop on Applications of Computer Vision (WACV), 246-251, 2013 | 50* | 2013 |
A network specification language and execution environment for undergraduate teaching C McDonald ACM SIGCSE Bulletin 23 (1), 25-34, 1991 | 50 | 1991 |
Periocular region-based person identification in the visible, infrared and hyperspectral imagery M Uzair, A Mahmood, A Mian, C McDonald Neurocomputing 149, 854-867, 2015 | 49 | 2015 |
Program visualization and explanation for novice C programmers MH Egan, C McDonald Proceedings of the Sixteenth Australasian Computing Education Conference …, 2014 | 41 | 2014 |