Christopher Morrell

According to our database1, Christopher Morrell authored at least 20 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Using Virtual Machines to Enhance the Educational Experience in an Introductory Computing Course.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

To CamelCase or under_score.
Proceedings of the 27th International Conference on Program Comprehension, 2019

2018
The need for software specific natural language techniques.
Empir. Softw. Eng., 2018

2017
The Impact of Virtualized Technology on Undergraduate Computer Networking Education.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

2016
Modeling network based moving target defense impacts through simulation in Ns-3.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Utilizing the BitTorrent DHT for blind rendezvous and information exchange.
Proceedings of the 34th IEEE Military Communications Conference, 2015

DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Scaling IPv6 address bindings in support of a moving target defense.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
The impact of identifier style on effort and comprehension.
Empir. Softw. Eng., 2013

2011
A Comparative Study of Approaches for Predicting Prostate Cancer from Longitudinal Data.
Commun. Stat. Simul. Comput., 2011

Cognitive and self-selective routing for sensor networks.
Comput. Manag. Sci., 2011

2010
Normalizing Source Code Vocabulary.
Proceedings of the 17th Working Conference on Reverse Engineering, 2010

2009
Identifier length and limited programmer memory.
Sci. Comput. Program., 2009

Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Self-Selecting Reliable Path Routing in diverse Wireless Sensor Network environments.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Self-selecting reliable paths for wireless sensor network routing.
Comput. Commun., 2008

Impact of Limited Memory Resources.
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

2007
Effective identifier names for comprehension and memory.
Innov. Syst. Softw. Eng., 2007

Biologically Inspired Self Selective Routing with Preferred Path Selection.
Proceedings of the Bio-Inspired Computing and Communication, 2007

2006
What's in a Name? A Study of Identifiers.
Proceedings of the 14th International Conference on Program Comprehension (ICPC 2006), 2006


  Loading...