The SCEAS System
Navigation Menu

Search the dblp DataBase


Chris McDonald: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Voon-Li Chung, Chris McDonald
    Towards Customisable Tuple Field Matching in VLOS. [Citation Graph (0, 0)][DBLP]
    ACSC, 2003, pp:317-323 [Conf]
  2. Asad Amir Pirzada, Chris McDonald
    Kerberos Assisted Authentication in Mobile Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:41-46 [Conf]
  3. Asad Amir Pirzada, Chris McDonald
    Establishing Trust In Pure Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:47-54 [Conf]
  4. Asad Amir Pirzada, Chris McDonald, Amitava Datta
    Dependable Dynamic Source Routing without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:79-86 [Conf]
  5. Simon Huband, Chris McDonald
    A Preliminary Topological Debugger for MPI Programs. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2001, pp:422-429 [Conf]
  6. Asad Amir Pirzada, Chris McDonald
    Trusted Route Discovery with TORA Protocol. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:121-130 [Conf]
  7. Chris McDonald, Gerhard Roth, Steve Marsh
    Red-Handed: Collaborative Gesture Interaction with a Projection Table. [Citation Graph (0, 0)][DBLP]
    FGR, 2004, pp:773-778 [Conf]
  8. Simon Huband, Chris McDonald
    DEPICT: A Topology-Based Debugger for MPI Programs. [Citation Graph (0, 0)][DBLP]
    HIPS, 2001, pp:109-121 [Conf]
  9. Asad Amir Pirzada, Chris McDonald
    Secure Pervasive Computing without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ICPS, 2004, pp:240-240 [Conf]
  10. Asad Amir Pirzada, Amitava Datta, Chris McDonald
    Trusted Route Discovery with AODV Protocol. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:129-135 [Conf]
  11. Simon Huband, Chris McDonald
    DEPICT: a topology-based debugger for MPI programs. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2001, pp:106- [Conf]
  12. Shahzad Malik, Chris McDonald, Gerhard Roth
    Hand Tracking for Interactive Pattern-Based Augmented Reality. [Citation Graph (0, 0)][DBLP]
    ISMAR, 2002, pp:117-126 [Conf]
  13. Amer Filipovic, Amitava Datta, Chris McDonald
    Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:422-433 [Conf]
  14. Simon Huband, Chris McDonald
    Debugging Parallel Programs Using Incomplete Information. [Citation Graph (0, 0)][DBLP]
    IWCC, 1999, pp:278-286 [Conf]
  15. Kamran Kazemi, Chris McDonald
    Formal Specification of Virtual Process Topologies. [Citation Graph (0, 0)][DBLP]
    IWCC, 1999, pp:169-176 [Conf]
  16. Bruce S. Elenbogen, John E. Laird, Richard J. Enbody, Chris McDonald, Peter B. Henderson, Richard Nau, Steven L. Tanimoto
    Mathematics preparation for undergraduate degrees in computer science. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2002, pp:98-99 [Conf]
  17. Bruce S. Elenbogen, Bruce R. Maxim, Chris McDonald
    Yet, more Web exercises for learning C++. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2000, pp:290-294 [Conf]
  18. Elliot B. Koffman, Dorothy Deremer, Chris McDonald, Loren Rhodes, S. Rebecca Thomas, A. Joe Turner, Curt M. White
    IT programs and CS departments (panel session). [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2000, pp:417-418 [Conf]
  19. Chris McDonald
    A network specification language and execution environment for undergraduate teaching. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1991, pp:25-34 [Conf]
  20. Chris McDonald
    Teaching concurrency with Joyce and Linda. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1992, pp:46-52 [Conf]
  21. Chris McDonald
    User-level distributed file systems projects. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1996, pp:333-337 [Conf]
  22. Chris McDonald, Kamran Kazemi
    Teaching parallel algorithm with process topologies. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2000, pp:70-74 [Conf]
  23. Chris McDonald, Kamran Kazemi
    Improving the PVM teaching environment. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1997, pp:219-223 [Conf]
  24. Asad Amir Pirzada, Chris McDonald
    Secure Routing with the DSR Protocol. [Citation Graph (0, 0)][DBLP]
    Wireless Information Systems, 2004, pp:24-33 [Conf]
  25. Simon Huband, Chris McDonald
    Using XML to Specify a Trace Format for MPI Programs. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2001, v:33, n:2, pp:133-145 [Journal]
  26. Asad Amir Pirzada, Amitava Datta, Chris McDonald
    Incorporating trust and reputation in the DSR protocol for dependable routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2806-2821 [Journal]
  27. Simon Huband, Chris McDonald
    Parallel program debugging by specification. [Citation Graph (0, 0)][DBLP]
    Concurrency - Practice and Experience, 2004, v:16, n:6, pp:551-585 [Journal]
  28. Chris McDonald, Trevor I. Dix
    Support for Graphs of Processes in a Command Interpreter. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1988, v:18, n:10, pp:1011-1016 [Journal]
  29. Asad Amir Pirzada, Chris McDonald, Amitava Datta
    Performance Comparison of Trust-Based Reactive Routing Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:6, pp:695-710 [Journal]
  30. Binbing Yu, Ram C. Tiwari, Kathleen A. Cronin, Chris McDonald, Eric J. Feuer
    CANSURV: A Windows program for population-based cancer survival analysis. [Citation Graph (0, 0)][DBLP]
    Computer Methods and Programs in Biomedicine, 2005, v:80, n:3, pp:195-203 [Journal]
  31. Babak Pazand, Chris McDonald
    A Critique of Mobility Models for Wireless Network Simulation. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2007, pp:141-146 [Conf]
  32. Christian Brown, Chris McDonald
    Visualizing berkeley socket calls in students' programs. [Citation Graph (0, 0)][DBLP]
    ITiCSE, 2007, pp:101-105 [Conf]

  33. Refocusing in 802.11 Wireless Measurement. [Citation Graph (, )][DBLP]

  34. Linking Simulation and Practice. [Citation Graph (, )][DBLP]

  35. Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring. [Citation Graph (, )][DBLP]

  36. Trusted Greedy Perimeter Stateless Routing. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002