default search action
John Matthews
Person information
- affiliation: Portland State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Duo Ma, Hongyuan Fang, Niannian Wang, Hongfang Lu, John Matthews, Chao Zhang:
Transformer-optimized generation, detection, and tracking network for images with drainage pipeline defects. Comput. Aided Civ. Infrastructure Eng. 38(15): 2109-2127 (2023)
2010 – 2019
- 2017
- [j10]Hassan Habibi Gharakheili, Vijay Sivaraman, Tim Moors, Arun Vishwanath, John Matthews, Craig Russell:
Enabling Fast and Slow Lanes for Content Providers Using Software Defined Networking. IEEE/ACM Trans. Netw. 25(3): 1373-1385 (2017) - 2016
- [j9]John Matthews, Khin Than Win, Harri Oinas-Kukkonen, Mark B. Freeman:
Persuasive Technology in Mobile Applications Promoting Physical Activity: a Systematic Review. J. Medical Syst. 40(3): 72:1-72:13 (2016) - [j8]Hassan Habibi Gharakheili, Vijay Sivaraman, Arun Vishwanath, Luke Exton, John Matthews, Craig Russell:
SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks. IEEE Trans. Netw. Serv. Manag. 13(4): 823-834 (2016) - 2015
- [j7]Vijay Sivaraman, John Matthews, Craig Russell, Syed Taha Ali, Arun Vishwanath:
Greening Residential Wi-Fi Networks under Centralized Control. IEEE Trans. Mob. Comput. 14(3): 552-564 (2015) - [c24]Hassan Habibi Gharakheili, Luke Exton, Vijay Sivaraman, John Matthews, Craig Russell:
Third-party customization of residential Internet sharing using SDN. ITNAC 2015: 214-219 - [c23]Hassan Habibi Gharakheili, Vijay Sivaraman, Arun Vishwanath, Luke Exton, John Matthews, Craig Russell:
Broadband fast-lanes with two-sided control: Design, evaluation, and economics. IWQoS 2015: 195-200 - 2014
- [j6]Ren Ping Liu, Antonio Cantoni, John Matthews:
Work-Conserving In-Sequence Striping in Multi-Band Wireless Backhaul Systems. IEEE Trans. Mob. Comput. 13(8): 1896-1908 (2014) - [c22]Jian A. Zhang, Wei Ni, John Matthews, Chang-Kyung Sung, Xiaojing Huang, Hajime Suzuki, Iain B. Collings:
Low latency integrated point-to-multipoint and e-band point-to-point backhaul for mobile small cells. ICC Workshops 2014: 592-597 - 2013
- [c21]Vijay Sivaraman, Tim Moors, Hassan Habibi Gharakheili, Dennis Ong, John Matthews, Craig Russell:
Virtualizing the access network via open APIs. CoNEXT 2013: 31-42 - [c20]John Matthews, Leonid Bukshpun, Ranjit D. Pradhan:
High-Fidelity Adaptive Compression for Cognitive Spectral Monitoring. MILCOM 2013: 1183-1186 - 2012
- [j5]Johannes H. Hattingh, Nader Jafari Rad, Sayyed Heidar Jafari, Marc Loizeaux, John Matthews, Lucas C. van der Merwe:
Total edge critical graphs with leaves. Discret. Math. 312(24): 3482-3488 (2012) - [c19]Hajime Suzuki, Rodney Kendall, Kevin Anderson, Alex Grancea, David Humphrey, Joseph Pathikulangara, Keith Bengston, John Matthews, Craig Russell:
Highly spectrally efficient Ngara Rural Wireless Broadband Access Demonstrator. ISCIT 2012: 914-919 - 2010
- [j4]Zvi Rosberg, John Matthews, Moshe Zukerman:
A network rate management protocol with TCP congestion control and fairness for all. Comput. Networks 54(9): 1358-1374 (2010)
2000 – 2009
- 2009
- [c18]Levent Erkök, John Matthews:
High assurance programming in Cryptol. CSIIRW 2009: 60 - [c17]Zvi Rosberg, Fariza Sabrina, Sheldon Dealy, John Matthews, Craig Russell:
Rate and delay controlled core networks: An experimental demonstration. IWQoS 2009: 1-9 - [c16]Levent Erkök, John Matthews:
Pragmatic equivalence and safety checking in Cryptol. PLPV 2009: 73-82 - 2008
- [j3]Sandip Ray, Warren A. Hunt Jr., John Matthews, J Strother Moore:
A Mechanical Analysis of Program Verification Strategies. J. Autom. Reason. 40(4): 245-269 (2008) - [c15]Lukas Bulwahn, Alexander Krauss, Florian Haftmann, Levent Erkök, John Matthews:
Imperative Functional Programming with Isabelle/HOL. TPHOLs 2008: 134-149 - 2006
- [c14]Lee Pike, Mark Shields, John Matthews:
A verifying core for a cryptographic language compiler. ACL2 2006: 1-10 - [c13]John Matthews, J Strother Moore, Sandip Ray, Daron Vroon:
Verification Condition Generation Via Theorem Proving. LPAR 2006: 362-376 - 2005
- [c12]Brian Huffman, John Matthews, Peter White:
Axiomatic Constructor Classes in Isabelle/HOLCF. TPHOLs 2005: 147-162 - 2004
- [c11]Sava Krstic, John Matthews:
Semantics of the reFLect language. PPDP 2004: 32-42 - 2003
- [j2]Rajeev Joshi, Leslie Lamport, John Matthews, Serdar Tasiran, Mark R. Tuttle, Yuan Yu:
Checking Cache-Coherence Protocols with TLA+. Formal Methods Syst. Des. 22(2): 125-131 (2003) - [c10]Sava Krstic, John Matthews:
Inductive Invariants for Nested Recursion. TPHOLs 2003: 253-269 - 2002
- [c9]Leslie Lamport, John Matthews, Mark R. Tuttle, Yuan Yu:
Specifying and verifying systems with TLA+. ACM SIGOPS European Workshop 2002: 45-48 - [c8]Sava Krstic, John Matthews:
Verifying BDD Algorithms through Monadic Interpretation. VMCAI 2002: 182-195
1990 – 1999
- 1999
- [c7]John Matthews, John Launchbury:
Elementary Microarchitecture Algebra. CAV 1999: 288-300 - [c6]Byron Cook, John Launchbury, John Matthews, Richard B. Kieburtz:
Formal Verification of Explicitly Parallel Microprocessors. CHARME 1999: 23-36 - [c5]John Matthews:
Recursive Function Definition over Coinductive Types. TPHOLs 1999: 73-90 - 1998
- [c4]John Matthews, Byron Cook, John Launchbury:
Microprocessor Specification in Hawk. ICCL 1998: 90-101 - 1997
- [j1]Gary S. Tyson, Matthew K. Farrens, John Matthews, Andrew R. Pleszkun:
Managing data caches using selective cache line replacement. Int. J. Parallel Program. 25(3): 213-242 (1997) - 1996
- [c3]John Matthews, Charles U. Martel:
Parallel Algorithms Using Unreliable Broadcasts. IPPS 1996: 692-696 - 1995
- [c2]Gary S. Tyson, Matthew K. Farrens, John Matthews, Andrew R. Pleszkun:
A modified approach to data cache management. MICRO 1995: 93-103 - [c1]Srinivasan Tridandapani, Anton T. Dahbura, Arun K. Somani, Charles U. Martel, John Matthews:
Free Performance and Fault Tolerance: Using System Idle Capacity Efficiently (Panel). SIGMETRICS 1995: 60-61
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint