John A. Hamilton Jr.

According to our database1, John A. Hamilton Jr. authored at least 48 papers between 1995 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
We didn't start the fire: using an agent-directed thermal simulator to keep servers cool.
Proceedings of the Agent-Directed Simulation Symposium, 2014

2013
Architecture-based network simulation for cyber security.
Proceedings of the Winter Simulations Conference: Simulation Making Decisions in a Complex World, 2013

2012
Constructing a Cloud-Based IDS by Merging VMI with FMA.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
An embedded system for real-time navigation and remote command of a trained canine.
Pers. Ubiquitous Comput., 2011

The Comprehensive Phytopathogen Genomics Resource: a web-based resource for data-mining plant pathogen genomes.
Database J. Biol. Databases Curation, 2011

2010
Information assurance modeling using the Department of Defense architecture framework.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Enhanced expert field medical training simulations and their effect on the modern combat life saver training procedures.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

2009
Building information assurance education partnerships with minority institutions.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

Using software architecture to facilitate reuse in a product family.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Suggested improvements to the DoDAF for modeling architectural security.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

DoDAF Modeling of a Unified Analysis Framework for Software Security.
Proceedings of the Huntsville Simulation Conference, 2009

A compiler classification framework for use in reverse engineering.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

User identification using GUI manipulation patterns and artificial neural networks.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

2008
Panel discussion: What makes good research in modeling and simulation: Assessing the quality, success, and utility of M&S research.
Proceedings of the 2008 Winter Simulation Conference, Global Gateway to Discovery, 2008

A Cloaking Algorithm Based on Spatial Networks for Location Privacy.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

Supporting a service-oriented architecture.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

Building executable service-oriented architectures with the WS-Management specification.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

The importance of information security spending: an economic approach.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

Understanding security architecture.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

Masquerade Detection through GUIID.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

DSR and TORA in fixed and mobile wireless networks.
Proceedings of the 46th Annual Southeast Regional Conference, 2008

2007
The TIGR Rice Genome Annotation Resource: improvements and new features.
Nucleic Acids Res., 2007

The TIGR Plant Transcript Assemblies database.
Nucleic Acids Res., 2007

Validating a network simulation testbed for army UAVs.
Proceedings of the Winter Simulation Conference, 2007

Simulation of army unmanned aerial vehicle communications.
Proceedings of the Winter Simulation Conference, 2007

Bowl championship series vulnerability analysis.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2007, 2007

A security-centric ring-based software architecture.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

A performance analysis of the spring protocol through simulation.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Computer defense using artificial intelligence.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Modeling unmanned aerial vehicle communications at the Auburn University Miss Center.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

Performance evaluation: running DSR and TORA routing protocols concurrently.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

Impact of daily computer usage on GUI usage analysis.
Proceedings of the 4th Annual Conference on Information Security Curriculum Development, 2007

2006
Integrating Ada 2005 into visual studio 2005.
Proceedings of the 2006 Annual ACM SIGAda International Conference on Ada, 2006

Static analysis of anomalies and security vulnerabilities in executable files.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2004
Methods for the prevention, detection and removal of software security vulnerabilities.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

On the current state of transport layer protocols in mobile ad hoc networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

2003
Security Vulnerabilities in Command and Control Interoperability.
Proceedings of the IEEE Systems, 2003

2002
Software Process as a Foundation for Teaching, Learning and Accrediting.
Proceedings of the 15th Conference on Software Engineering Education and Training (CSEET'02), 2002

1998
Tracking multiple objects in terrain.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

The future of programming - are fundamental changes in computer science programs coming? (panel).
Proceedings of the 29th SIGCSE Technical Symposium on Computer Science Education, 1998

A Comparison of Ada and Pascal in an Introductory Computer Science Course.
Proceedings of the ACM SIGAda Annual International Conference on Ada Technology, 1998

1996
Public Domain Tools for Modeling and Simulating Computer Networks.
Simul., 1996

Ada Training and Education in the US Army and US Air Force.
Proceedings of the annual meeting of the Ada programming world, 1996

PACKET tracing: a new paradigm for teaching computer network courses.
Proceedings of the 1st Annual Conference on Integrating Technology into Computer Science Education, 1996

1995
AToolkit for Monitoring the Utilization and Performance of Computer Networks.
Simul., 1995

An Open Simulation Architecture for Force XXI.
Proceedings of the 27th conference on Winter simulation, 1995

A survey of object-oriented methodologies.
Proceedings of the conference on TRI-Ada 1995: Ada's role in global markets: solutions for a changing complex world, 1995

Distributed simulation in Ada 95.
Proceedings of the conference on TRI-Ada 1995: Ada's role in global markets: solutions for a changing complex world, 1995


  Loading...