default search action
Kenneth M. Hopkinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Brian Wheelhouse, Kenneth M. Hopkinson, Laura R. Humphrey:
Formal Verification of Prim's Algorithm in SPARK. HICSS 2023: 6695-6703 - [c25]Ashutosh Ghimire, Fathi H. Amsaad, Tamzidul Hoque, Kenneth M. Hopkinson, Md. Tauhidur Rahman:
Unsupervised IC Security with Machine Learning for Trojan Detection. MWSCAS 2023: 20-24 - 2021
- [j20]Michael S. Hughes, Brian J. Lunday, Jeffrey D. Weir, Kenneth M. Hopkinson:
The multiple shortest path problem with path deconfliction. Eur. J. Oper. Res. 292(3): 818-829 (2021)
2010 – 2019
- 2019
- [j19]Andrew Compton, John M. Pecarina, Alan C. Lin, Kenneth M. Hopkinson:
PeerAppear: A distributed geospatial index supporting collaborative world model construction and maintenance. Future Gener. Comput. Syst. 95: 802-815 (2019) - [j18]Nicholas Becherer, John M. Pecarina, Scott Nykl, Kenneth M. Hopkinson:
Improving optimization of convolutional neural networks through parameter fine-tuning. Neural Comput. Appl. 31(8): 3469-3479 (2019) - 2017
- [j17]Seth T. Hamman, Kenneth M. Hopkinson, Ruth L. Markham, Andrew M. Chaplik, Gabrielle E. Metzler:
Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students. IEEE Trans. Educ. 60(3): 205-211 (2017) - [j16]Michael R. Clark, Kyle E. Stewart, Kenneth M. Hopkinson:
Dynamic, Privacy-Preserving Decentralized Reputation Systems. IEEE Trans. Mob. Comput. 16(9): 2506-2517 (2017) - [j15]Todd J. Bodnar, Matthew L. Dering, Conrad S. Tucker, Kenneth M. Hopkinson:
Using Large-Scale Social Media Networks as a Scalable Sensing System for Modeling Real-Time Energy Utilization Patterns. IEEE Trans. Syst. Man Cybern. Syst. 47(10): 2627-2640 (2017) - 2016
- [j14]Addison Betances, Kenneth M. Hopkinson, Mark D. Silvius:
Context aware routing management architecture for airborne networks. IET Networks 5(4): 85-92 (2016) - 2015
- [j13]Jared J. Thompson, Kenneth M. Hopkinson, Mark D. Silvius:
A Test Methodology for Evaluating Cognitive Radio Systems. IEEE Trans. Wirel. Commun. 14(11): 6311-6324 (2015) - [c24]Russell G. Shirey, Kenneth M. Hopkinson, Kyle E. Stewart, Douglas D. Hodson, Brett J. Borghetti:
Analysis of Implementations to Secure Git for Use as an Encrypted Distributed Version Control System. HICSS 2015: 5310-5319 - 2014
- [j12]Mark C. Duncan, Kenneth M. Hopkinson, Eric D. Trias, Jeffrey W. Humphries:
Trust Management Approach to Satellite System Telecommanding Security. J. Aerosp. Inf. Syst. 11(1): 19-34 (2014) - [j11]Ryan K. McLean, Mark D. Silvius, Kenneth M. Hopkinson, Bridget N. Flatley, Ethan S. Hennessey, Curtis C. Medve, Jared J. Thompson, Matthew R. Tolson, Clark V. Dalton:
An Architecture for Coexistence with Multiple Users in Frequency Hopping Cognitive Radio Networks. IEEE J. Sel. Areas Commun. 32(3): 563-571 (2014) - [j10]Michael R. Clark, Kenneth M. Hopkinson:
Transferable Multiparty Computation With Applications to the Smart Grid. IEEE Trans. Inf. Forensics Secur. 9(9): 1356-1366 (2014) - [c23]Todd J. Bodnar, Conrad S. Tucker, Kenneth M. Hopkinson, Sven G. Bilén:
Increasing the veracity of event detection on social media networks through user trust modeling. IEEE BigData 2014: 636-643 - [c22]Matthew R. Tolson, Clark V. Dalton, Mark D. Silvius, Ethan S. Hennessey, Curtis C. Medve, Jared J. Thompson, Kenneth M. Hopkinson, Seif Azghandi:
Totally-Ordered, Reliable Multicast over Cognitive Radio Networks. HICSS 2014: 5135-5143 - [c21]Seif Azghandi, Kenneth M. Hopkinson, Robert McTasney:
An empirical model for smart meters using data security. ISGT 2014: 1-5 - [c20]Ethan S. Hennessey, Kenneth M. Hopkinson, Mark D. Silvius:
Opportunistic access in frequency hopping cognitive radio networks. WTS 2014: 1-6 - 2013
- [j9]M. Brent Reynolds, Don R. Hulce, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
A Bin Packing Heuristic for On-Line Service Placement and Performance Control. IEEE Trans. Netw. Serv. Manag. 10(3): 326-339 (2013) - [j8]Xiaoyang Tong, Xiaoru Wang, Rui Wang, Fei Huang, Xueyuan Dong, Kenneth M. Hopkinson, Gongyi Song:
The Study of a Regional Decentralized Peer-to-Peer Negotiation-Based Wide-Area Backup Protection Multi-Agent System. IEEE Trans. Smart Grid 4(2): 1197-1206 (2013) - [j7]Keith J. Ross, Kenneth M. Hopkinson, Meir Pachter:
Using a Distributed Agent-Based Communication Enabled Special Protection System to Enhance Smart Grid Security. IEEE Trans. Smart Grid 4(2): 1216-1224 (2013) - [c19]Ryan K. McLean, Mark D. Silvius, Kenneth M. Hopkinson:
Method for Evaluating k-Means Clustering for Increased Reliability in Cognitive Radio Networks. SERE 2013: 99-108 - 2012
- [j6]D. F. Harmon, M. Brent Reynolds, Scott R. Graham, Kenneth M. Hopkinson:
Integrating disruption-prone links into reliable networks: a transmission control protocol friendly approach. IET Commun. 6(12): 1702-1709 (2012) - [j5]Mark P. Kleeman, Benjamin A. Seibert, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham:
Solving Multicommodity Capacitated Network Design Problems Using Multiobjective Evolutionary Algorithms. IEEE Trans. Evol. Comput. 16(4): 449-471 (2012) - [c18]M. Brent Reynolds, Don R. Hulce, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants. HICSS 2012: 5546-5555 - 2011
- [j4]Kevin T. Kennedy, Richard F. Deckro, James T. Moore, Kenneth M. Hopkinson:
Nodal interdiction. Math. Comput. Model. 54(11-12): 3116-3125 (2011) - [j3]Larry C. Llewellyn, Kenneth M. Hopkinson, Scott R. Graham:
Distributed Fault-Tolerant Quality of Wireless Networks. IEEE Trans. Mob. Comput. 10(2): 175-190 (2011) - [j2]John F. Borowski, Kenneth M. Hopkinson, Jeffrey W. Humphries, Brett J. Borghetti:
Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme. IEEE Trans. Smart Grid 2(2): 287-301 (2011) - [c17]M. Brent Reynolds, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
Provisioning Norm: An Asymmetric Quality Measure for SaaS Resource Allocation. IEEE SCC 2011: 112-119 - [c16]Jose Fadul, Kenneth M. Hopkinson, Christopher Sheffield, James T. Moore, Todd R. Andel:
Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid. HICSS 2011: 1-10 - [c15]Jeffrey Hemmes, Matthew Fisher, Kenneth M. Hopkinson:
Predictive Routing in Mobile Ad-Hoc Networks. NGMAST 2011: 117-122 - 2010
- [c14]Vinod Naga, John M. Colombi, Michael R. Grimaila, Kenneth M. Hopkinson:
Enabling Performance of Mission-Oriented Networks Through Quality of Service Methods. Security and Management 2010: 529-535 - [c13]Jose Fadul, Kenneth M. Hopkinson, James T. Moore, Todd R. Andel, Stuart H. Kurkowski:
SCADA Trust Management System. Security and Management 2010: 548-554 - [c12]M. Brent Reynolds, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation. SERVICES 2010: 156-157 - [c11]James Haught, Kenneth M. Hopkinson, Nathan Stuckey, Michael Dop, Alexander Stirling:
A Kalman filter-based prediction system for better network context-awareness. WSC 2010: 2927-2934
2000 – 2009
- 2009
- [j1]Kenneth M. Hopkinson, Kate Jenkins, Kenneth P. Birman, James S. Thorp, Gregory Toussaint, Manu Parashar:
Adaptive Gravitational Gossip: A Gossip-Based Communication Protocol with User-Selectable Rates. IEEE Trans. Parallel Distributed Syst. 20(12): 1830-1843 (2009) - [c10]Clifton M. Durham, Todd R. Andel, Kenneth M. Hopkinson, Stuart H. Kurkowski:
Evaluation of an OPNET model for unmanned aerial vehicle (UAV) networks. SpringSim 2009 - [c9]John S. Weir, Stuart H. Kurkowski, Kenneth M. Hopkinson:
Mediated user-simulator interactive command with visualization (MUSIC-V). SpringSim 2009 - 2008
- [c8]Steven C. Oimoen, Gilbert L. Peterson, Kenneth M. Hopkinson:
Network Formation Using Ant Colony Optimization. ANTS Conference 2008: 405-406 - [c7]Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson:
Cyberspace Policy For Critical Infrastructures. Critical Infrastructure Protection 2008: 17-28 - [c6]Mark E. Coyne, Scott R. Graham, Kenneth M. Hopkinson, Stuart H. Kurkowski:
A methodology for unit testing actors in proprietary discrete event based simulations. WSC 2008: 1012-1019 - [c5]J. Mark Belue, Stuart H. Kurkowski, Scott R. Graham, Kenneth M. Hopkinson, Ryan W. Thomas, Joshua W. Abernathy:
Research and analysis of simulation-based networks through multi-objective visualization. WSC 2008: 1216-1224 - 2007
- [c4]Mark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham:
Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm. CISDA 2007: 33-41 - [c3]Mark P. Kleeman, Gary B. Lamont, Kenneth M. Hopkinson, Scott R. Graham:
Multiobjective evolutionary algorithms for designing capacitated network centric communications. GECCO 2007: 905 - 2004
- [b1]Kenneth M. Hopkinson:
Overcoming Communication, Distributed Systems, and Simulation Challenges: A case study involving the protection and control of the electric power grid using a utility intranet based on internet tech. Cornell University, USA, 2004 - 2003
- [c2]Kenneth M. Hopkinson, Kenneth P. Birman, Renan Giovanini, Denis Vinicius Coury, Xiaoru Wang, James S. Thorp:
Distributed simulation in manufacturing: EPOCHS: integrated commercial off-the-shelf software for agent-based electric power and communication simulation. WSC 2003: 1158-1166 - 2001
- [c1]Kate Jenkins, Kenneth M. Hopkinson, Ken Birman:
A Gossip Protocol for Subgroup Multicast. ICDCS Workshops 2001: 25-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint