default search action
John May
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Erwin Jose Lopez Pulgarin, Guido Herrmann, Christine Hollinshead, John May, Kibrom Negash Gebremicael, Diane Daw:
Towards wireless communication in control systems of the civil nuclear energy sector. Annu. Rev. Control. 57: 100936 (2024)
2010 – 2019
- 2019
- [c21]Richard Craig, Theo Tryfonas, John May:
A Proactive Genotype for Cybernetic Systems. SMC 2019: 4231-4238 - 2015
- [c20]Harold P. Lehmann, M. C. Gibbons, Richard Singlerman, Steve King, Joe Warren, John May:
Design of a Knowledge Exchange for Community Health Workers. AMIA 2015 - [c19]Shani Lu, John May, Russell J. Haines:
Effects of Correlated Shadowing Modeling on Performance Evaluation of Wireless Sensor Networks. VTC Fall 2015: 1-5 - 2014
- [c18]Shani Lu, John May, Russell J. Haines:
Reliability modeling and prediction of Wireless Multi-Hop Networks with correlated shadowing. PIMRC 2014: 1663-1668 - [c17]Richard Craig, Theodoros Spyridopoulos, Theo Tryfonas, John May:
Soft systems methodology in net-centric cyber defence system development. SMC 2014: 672-677 - [c16]Richard Craig, Theo Tryfonas, John May:
A viable systems approach towards cyber situational awareness. SMC 2014: 1405-1411 - [c15]Shani Lu, John May, Russell J. Haines:
Efficient modeling of correlated shadow fading in dense wireless multi-hop networks. WCNC 2014: 311-316 - 2011
- [j5]John May:
East coast computer algebra day 2011 abstracts. ACM Commun. Comput. Algebra 45(1/2): 100-106 (2011) - [j4]Ioannis G. Askoxylakis, Theodore Tryfonas, John May, Vasilios A. Siris, Apostolos Traganitis:
A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - 2010
- [c14]Ioannis G. Askoxylakis, Theodore Tryfonas, John May, Apostolos Traganitis:
A Dynamic Key Agreement Mechanism for Mission Critical Mobile Ad Hoc Networking. MOBILIGHT 2010: 216-228
2000 – 2009
- 2009
- [c13]Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theodore Tryfonas, John May, Apostolos Traganitis:
A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. MOBILIGHT 2009: 103-113 - 2007
- [c12]Mário Brito, John May:
Safety Critical Software Process Improvement by Multi-objective Optimization Algorithms. ICSP 2007: 96-108 - 2006
- [c11]Mário Brito, John May:
Gaining Confidence in the Software Development Process Using Expert Systems. SAFECOMP 2006: 113-126 - [c10]Mário Brito, John May, Julio Gallardo, Ed Fergus:
Use of Graphical Probabilistic Models to build SIL claims based on software safety standards such as IEC61508-3. SSS 2006: 241-259 - 2005
- [j3]Jeffrey S. Vetter, Bronis R. de Supinski, Lynn Kissel, John May, Sheila Vaidya:
Evaluating high-performance computers. Concurr. Pract. Exp. 17(10): 1239-1270 (2005) - [c9]Martin Schulz, John May, John C. Gyllenhaal:
DynTG: A Tool for Interactive, Dynamic Instrumentation. International Conference on Computational Science (2) 2005: 140-148 - [c8]Karen L. Karavanic, John May, Kathryn M. Mohror, Brian Miller, Kevin A. Huck, Rashawn L. Knapp, Brian Pugh:
Integrating Database Technology with Comparison-based Parallel Performance Diagnosis: The PerfTrack Performance Experiment Management Tool. SC 2005: 39 - 2004
- [j2]Mikael Lindvall, Dirk Muthig, Aldo Dagnino, Christina Wallin, Michael Stupperich, David Kiefer, John May, Tuomo Kähkönen:
Agile Software Development in Large Organizations. Computer 37(12): 26-34 (2004) - [c7]Xiaoguang Mao, John May:
Reliability specification for component-based software. IASTED Conf. on Software Engineering and Applications 2004: 275-281 - 2003
- [c6]John May, John C. Gyllenhaal:
Tool Gear: Infrastructure for Parallel Tools. PDPTA 2003: 231-240 - 2002
- [c5]Jason Bowers, John May, Erik Melander, Matthew Baarman, Azeem Ayoob:
Tailoring XP for Large System Mission Critical Software Development. XP/Agile Universe 2002: 100-111 - 2000
- [c4]Richard Hedges, Terry Jones, John May, Robert Kim Yates:
Performance of an MPI-IO Implementation Using Third-Party Transfer. IEEE Symposium on Mass Storage Systems 2000: 75-88
1990 – 1999
- 1999
- [c3]Bronis R. de Supinski, John May:
Benchmarking Pthreads Performance. PDPTA 1999: 1985-1991 - 1996
- [j1]John May, Francine Berman:
Retargetability and Extensibility in a Parallel Debugger. J. Parallel Distributed Comput. 35(2): 142-155 (1996) - 1994
- [c2]John May, Francine Berman:
Designing a Parallel Debugger for Portability. IPPS 1994: 909-914 - 1993
- [c1]John May, Francine Berman:
Panorama: A Portable, Extensible Parallel Debugger. Workshop on Parallel and Distributed Debugging 1993: 96-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint