default search action
Christopher King
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Pietro Ferraro, Lianna Zhao, Christopher King, Robert Shorten:
Personalized Feedback Control, Social Contracts, and Compliance Strategies for Ensembles. IEEE Internet Things J. 11(3): 3942-3955 (2024) - 2023
- [j11]Cem Okan Yaldiz, Mark J. Buller, Kristine L. Richardson, Sungtae An, David Jimmy Lin, Aprameya Satish, Kyla Driver, Emma Atkinson, Timothy Mesite, Christopher King, Max Bursey, Meghan Galer, Mindy L. Millard-Stafford, Michael N. Sawka, Alessio Medda, Omer T. Inan:
Early Prediction of Impending Exertional Heat Stroke With Wearable Multimodal Sensing and Anomaly Detection. IEEE J. Biomed. Health Informatics 27(12): 5803-5814 (2023) - 2022
- [c9]Ronak Dedhiya, Siva Teja Kakileti, Goutham Deepu, Kanchana Gopinath, Nicholas Opoku, Christopher King, Geetha Manjunath:
Evaluation of Non-Invasive Thermal Imaging for Detection of Viability of Onchocerciasis Worms. EMBC 2022: 3518-3521 - [i1]Ronak Dedhiya, Siva Teja Kakileti, Goutham Deepu, Kanchana Gopinath, Nicholas Opoku, Christopher King, Geetha Manjunath:
Evaluation of Non-Invasive Thermal Imaging for detection of Viability of Onchocerciasis worms. CoRR abs/2203.12620 (2022)
2010 – 2019
- 2018
- [b1]Christopher King:
Efficient Object Detection and Tracking Using a Novel MSER-Based Approach. University of Nevada, Reno, USA, 2018 - 2014
- [j10]Christopher King:
Multiplicativity of superoperator norms for some entanglement breaking channels. Quantum Inf. Comput. 14(13-14): 1203-1212 (2014) - [c8]Christopher King, Dana Peiffer, Nikolas Varrone:
Lessons from Farming for IT. SIGUCCS 2014: 1-5 - 2013
- [j9]Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa:
Performance of IEEE 802.11 under Jamming. Mob. Networks Appl. 18(5): 678-696 (2013) - 2012
- [j8]Richard Kelley, Alireza Tavakkoli, Christopher King, Amol Ambardekar, Monica N. Nicolescu, Mircea Nicolescu:
Context-Based Bayesian Intent Recognition. IEEE Trans. Auton. Ment. Dev. 4(3): 215-225 (2012) - [r2]Christopher King, Maria Valera, Raphael Grech, Robert J. Mullen, Paolo Remagnino, Luca Iocchi, Luca Marchetti, Daniele Nardi, Dorothy Ndedi Monekosso, Mircea Nicolescu:
Multi-Robot and Multi-Camera Patrolling. Handbook of Soft Computing for Video Surveillance 2012: 255-286 - 2011
- [j7]Christopher King, Timothy Vidas:
Empirical analysis of solid state disk data retention when used with contemporary operating systems. Digit. Investig. 8(Supplement): S111-S117 (2011) - [r1]Christopher King:
Extranet Access Control. Encyclopedia of Information Assurance 2011 - 2010
- [c7]Richard Kelley, Christopher King, Amol Ambardekar, Monica N. Nicolescu, Mircea Nicolescu, Alireza Tavakkoli:
Integrating Context into Intent Recognition Systems. ICINCO (2) 2010: 315-320
2000 – 2009
- 2008
- [j6]Richard Kelley, Christopher King, Alireza Tavakkoli, Mircea Nicolescu, Monica N. Nicolescu, George Bebis:
An Architecture for Understanding Intent Using a Novel Hidden Markov Formulation. Int. J. Humanoid Robotics 5(2): 203-224 (2008) - [c6]Richard Kelley, Alireza Tavakkoli, Christopher King, Monica N. Nicolescu, Mircea Nicolescu, George Bebis:
Understanding human intentions via hidden markov models in autonomous mobile robots. HRI 2008: 367-374 - [c5]Emrah Bayraktaroglu, Christopher King, Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa:
On the Performance of IEEE 802.11 under Jamming. INFOCOM 2008: 1265-1273 - [c4]Alireza Tavakkoli, Richard Kelley, Christopher King, Mircea Nicolescu, Monica N. Nicolescu, George Bebis:
A Visual Tracking Framework for Intent Recognition in Videos. ISVC (1) 2008: 450-459 - 2007
- [j5]David Malone, Ken Duffy, Christopher King:
Some remarks on ld plots for heavy-tailed traffic. Comput. Commun. Rev. 37(1): 41-42 (2007) - [c3]Alireza Tavakkoli, Richard Kelley, Christopher King, Mircea Nicolescu, Monica N. Nicolescu, George Bebis:
A Vision-Based Architecture for Intent Recognition. ISVC (2) 2007: 173-182 - [c2]Christopher King, Xavier Palathingal, Monica N. Nicolescu, Mircea Nicolescu:
A Control Architecture for Long-Term Autonomy of Robotic Assistants. ISVC (1) 2007: 375-384 - 2005
- [j4]Patrick M. Hayden, Christopher King:
Correcting quantum channels by measuring the environment. Quantum Inf. Comput. 5(2): 156-160 (2005) - 2004
- [j3]Christopher King, Mary Beth Ruskai:
Comments on multiplicativity of maximalp-norms whenp=2. Quantum Inf. Comput. 4(6): 500-512 (2004) - 2003
- [j2]Christopher King:
Maximal p-norms of entanglement breaking channels. Quantum Inf. Comput. 3(2): 186-190 (2003) - 2001
- [j1]Christopher King, Mary Beth Ruskai:
Minimal entropy of states emerging from noisy quantum channels. IEEE Trans. Inf. Theory 47(1): 192-209 (2001)
1990 – 1999
- 1999
- [c1]Richard Draves, Christopher King, Venkatachary Srinivasan, Brian Zill:
Constructing Optimal IP Routing Tables. INFOCOM 1999: 88-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint