Hamiltonian results in K1,3‐free graphs MM Matthews, DP Sumner Journal of Graph Theory 8 (1), 139-146, 1984 | 326 | 1984 |
A Shoulder-Surfing Resistant Graphical Password Scheme-Wiw. S Man, D Hong, MM Matthews Security and Management, 105-111, 2003 | 235 | 2003 |
Security issues in privacy and key management protocols of IEEE 802.16 S Xu, M Matthews, CT Huang Proceedings of the 44th annual Southeast regional conference, 113-118, 2006 | 150 | 2006 |
A graphical password scheme strongly resistant to spyware D Hong, S Man, B Hawes, M Matthews Proceedings of the International Conference on Security and Management, SAM …, 2004 | 132 | 2004 |
Longest paths and cycles in K1,3‐free graphs MM Matthews, DP Sumner Journal of graph theory 9 (2), 269-277, 1985 | 132 | 1985 |
Chinese remainder theorem based group key management X Zheng, CT Huang, M Matthews Proceedings of the 45th annual southeast regional conference, 266-271, 2007 | 111 | 2007 |
Efficient and secure multicast in wirelessman: A cross-layer design CT Huang, M Matthews, M Ginley, X Zheng, C Chen, JM Chang Journal of Communications Software and Systems 3 (3), 199-206, 2007 | 31 | 2007 |
USCSH: an active intelligent assistance system M Matthews, W Pharr, G Biswas, H Neelakandan Intelligent Help Systems for UNIX, 127-147, 2000 | 30 | 2000 |
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR S Xu, CT Huang, MM Matthews 2008 IEEE International Symposium on Wireless Communication Systems, 653-657, 2008 | 29 | 2008 |
Secure Multicast in WiMAX. S Xu, CT Huang, MM Matthews J. Networks 3 (2), 48-57, 2008 | 26 | 2008 |
A dual authentication protocol for IEEE 802.11 wireless LANs X Zheng, C Chen, CT Huang, MM Matthews, N Santhapuri 2005 2nd International Symposium on Wireless Communication Systems, 565-569, 2005 | 22 | 2005 |
Application of natural language processing techniques to marine V-22 maintenance data for populating a CBM-oriented database H Bokinsky, A McKenzie, A Bayoumi, R McCaslin, A Patterson, ... AHS Airworthiness, CBM, and HUMS Specialists' Meeting, Huntsville, AL, 2013 | 21 | 2013 |
Information extraction from helicopter maintenance records as a springboard for the future of maintenance text analysis A McKenzie, M Matthews, N Goodman, A Bayoumi Trends in Applied Intelligent Systems: 23rd International Conference on …, 2010 | 20 | 2010 |
Secure multicast in various scenarios of WirelessMAN S Xu, CT Huang, M Matthews Proceedings 2007 IEEE SoutheastCon, 709-714, 2007 | 13 | 2007 |
Efficient and secure multicast in WirelessMAN M Ginley, S Xu, CT Huang, M Matthews 2007 2nd International Symposium on Wireless Pervasive Computing, 2007 | 11 | 2007 |
Knowledge acquisition for active assistance M Matthews, W Pharr Preprints of the First International Workshop on Knowledge representation in …, 1987 | 11 | 1987 |
ORACLE: A knowledgeable user interface MM Matthews, G Biswas Proc. 9th COMPSAC Computer Software and Applications Conf, 358-363, 1985 | 9 | 1985 |
A New Approach to Managing the Evolution of OWL Ontologies. C Chen, MM Matthews SWWS, 57-63, 2008 | 8 | 2008 |
Extending description logic for reasoning about ontology evolution C Chen, MM Matthews IEEE/WIC/ACM International Conference on Web Intelligence (WI'07), 452-456, 2007 | 8 | 2007 |
USCSH: An Active Assistance Interface for UNIX M Matthews, G Biswas, H Neelakandan University of South Carolina technical report USC-CS TR, 86-003, 1986 | 7 | 1986 |