default search action
David J. Thuente
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c22]Zifan Li, David J. Thuente:
Extensions and improvements of jump-stay rendezvous algorithms for Cognitive Radios. MoWNet 2017: 1-8 - 2016
- [c21]Young-Hyun Oh, David J. Thuente:
Jamming and advanced modular-based blind rendezvous algorithms for Cognitive Radio Networks. WoWMoM 2016: 1-10 - 2014
- [c20]Young-Hyun Oh, David J. Thuente:
Channel detecting jamming attacks on symmetric blind rendezvous algorithms for cognitive radio networks. GLOBECOM 2014: 1005-1010 - 2013
- [c19]William Formyduval, David J. Thuente:
Priority inversion and queue management for 802.11 priority WLANs. CCNC 2013: 565-573 - [c18]Young-Hyun Oh, David J. Thuente:
Sequence sensing Jamming attacks against modular-based channel hopping rendezvous algorithms for cognitive ratio networks. ICC 2013: 2171-2176 - [c17]Young-Hyun Oh, David J. Thuente:
Channel Detecting Jamming Attacks against Jump-Stay Based Channel Hopping Rendezvous Algorithms for Cognitive Radio Networks. ICCCN 2013: 1-9 - 2012
- [c16]Young-Hyun Oh, David J. Thuente:
Enhanced security of random seed DSSS algorithms against seed jamming attacks. GLOBECOM 2012: 801-806 - [c15]Kaiqi Xiong, David J. Thuente:
Locating jamming attackers in malicious wireless sensor networks. IPCCC 2012: 400-407 - [c14]Young-Hyun Oh, David J. Thuente:
Limitations of Quorum-based Rendezvous and key establishment schemes against sophisticated jamming attacks. MILCOM 2012: 1-6 - 2011
- [j4]Xinxin Sheng, David J. Thuente:
Using Decision Trees for State Evaluation in General Game Playing. Künstliche Intell. 25(1): 53-56 (2011) - [c13]Xinxin Sheng, David J. Thuente:
Contextual Decision Making in General Game Playing. ICTAI 2011: 679-684 - [c12]Sudarshan Prasad, David J. Thuente:
Jamming attacks in 802.11g - A cognitive radio based approach. MILCOM 2011: 1219-1224 - 2010
- [c11]Xinxin Sheng, David J. Thuente:
Predictive Sub-goal Analysis in a General Game Playing Agent. Web Intelligence/IAT Workshops 2010: 423-427
2000 – 2009
- 2009
- [j3]Kaiqi Xiong, David J. Thuente:
Dynamic Localization Schemes in Malicious Sensor Networks. J. Networks 4(8): 677-686 (2009) - 2008
- [c10]Kaiqi Xiong, David J. Thuente:
Efficient Localization Schemes in Sensor Networks with Malicious Nodes. SECRYPT 2008: 190-196 - 2001
- [c9]David J. Thuente, John K. Whiteman:
Systems Engineering of Communication Protocols for Command and Control Systems. HASE 2001: 194-208
1990 – 1999
- 1995
- [c8]David J. Thuente, Pulin Sampat:
Mathematical programming in a hybrid genetic algorithm for Steiner point problems. SAC 1995: 357-363 - 1994
- [j2]Jorge J. Moré, David J. Thuente:
Line search algorithms with guaranteed sufficient decrease. ACM Trans. Math. Softw. 20(3): 286-307 (1994) - 1993
- [c7]S. J. Ignace, Robert L. Sedlmeyer, David J. Thuente:
Integrating Rate-Monotonic Analysis into Real-Time Software Development. Diffusion, Transfer and Implementation of Information Technology 1993: 257-274 - 1991
- [c6]David J. Thuente:
Rapid simulation and software prototyping for the architectural design of embedded multiprocessor systems. ACM Conference on Computer Science 1991: 113-121 - [c5]David J. Thuente, Rhys Price Jones:
Beyond minimaxing for games with draws. ACM Conference on Computer Science 1991: 551-557 - 1990
- [c4]David J. Thuente, Robert L. Sedlmeyer:
A macro preprocessor for the simulation language network II.5. Annual Simulation Symposium 1990: 5-13 - [c3]Rhys Price Jones, David J. Thuente:
The role of simulation in developing game playing strategies. Annual Simulation Symposium 1990: 89-97
1980 – 1989
- 1989
- [c2]David J. Thuente, Rhys Price Jones:
New strategies for complete game trees. ACM Conference on Computer Science 1989: 408 - 1987
- [c1]David J. Thuente:
Critique of SIMAN as a programming language (abstract only). ACM Conference on Computer Science 1987: 385 - 1980
- [j1]David J. Thuente:
Technical Note - Duality Theory for Generalized Linear Programs with Computational Methods. Oper. Res. 28(4): 1005-1011 (1980)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint