Chris McDonald

Orcid: 0000-0003-4667-541X

According to our database1, Chris McDonald authored at least 62 papers between 1988 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Influence of heterogeneous edge weights on assortative mixing patterns in military personnel networks.
Pattern Anal. Appl., 2022

2021
An evaluation of SeeC: a tool designed to assist novice C programmers with program understanding and debugging.
Comput. Sci. Educ., 2021

2020
Longitudinal analysis of a campus Wi-Fi network.
Comput. Networks, 2020

2019
Unexpected Tokens: A Review of Programming Error Messages and Design Guidelines for the Future.
Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, 2019

Compiler Error Messages Considered Unhelpful: The Landscape of Text-Based Programming Error Message Research.
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, 2019

2017
A Matrix-Vector Recurrent Unit Model for Capturing Compositional Semantics in Phrase Embeddings.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Featureless Domain-Specific Term Extraction with Minimal Labelled Data.
Proceedings of the Australasian Language Technology Association Workshop 2016, Melbourne, Australia, December 5, 2016

2015
Periocular region-based person identification in the visible, infrared and hyperspectral imagery.
Neurocomputing, 2015

Using Word Embeddings to Enhance Keyword Identification for Scientific Publications.
Proceedings of the Databases Theory and Applications, 2015

Dynamic evaluation trees for novice C programmers.
Proceedings of the 17th Australasian Computing Education Conference, 2015

2014
From MAP to DIST: The Evolution of a Large-Scale WLAN Monitoring System.
IEEE Trans. Mob. Comput., 2014

Optimising Wi-Fi Installations Using a Multi-Objective Evolutionary Algorithm.
Proceedings of the Simulated Evolution and Learning - 10th International Conference, 2014

How Preprocessing Affects Unsupervised Keyphrase Extraction.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2014

A Multi-tier Client-Server Project Employing Mobile Clients.
Proceedings of the Sixteenth Australasian Computing Education Conference, 2014

Program visualization and explanation for novice C programmers.
Proceedings of the Sixteenth Australasian Computing Education Conference, 2014

2013
Periocular biometric recognition using image sets.
Proceedings of the 2013 IEEE Workshop on Applications of Computer Vision, 2013

A location prediction project on mobile devices.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Reducing novice C programmers' frustration through improved runtime error checking.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

A compact discriminative representation for efficient image-set classification with application to biometric recognition.
Proceedings of the International Conference on Biometrics, 2013

2009
Linking Simulation and Practice.
Proceedings of the CSEDU 2009 - Proceedings of the First International Conference on Computer Supported Education, Lisboa, Portugal, March 23-26, 2009, 2009

2008
Map: a scalable monitoring system for dependable 802.11 wireless networks.
IEEE Wirel. Commun., 2008

Refocusing in 802.11 Wireless Measurement.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

2007
Collaborative Dynamic Source Routing using transitional trust filters.
Int. J. Inf. Comput. Secur., 2007

Dependable Dynamic Source Routing without a Trusted Third Party.
J. Res. Pract. Inf. Technol., 2007

Visualizing berkeley socket calls in students' programs.
Proceedings of the 12th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2007

Trusted Greedy Perimeter Stateless Routing.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring.
Proceedings of the 15th IEEE International Conference on Networks, 2007

A Critique of Mobility Models for Wireless Network Simulation.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Trust Establishment In Pure Ad-hoc Networks.
Wirel. Pers. Commun., 2006

Performance Comparison of Trust-Based Reactive Routing Protocols.
IEEE Trans. Mob. Comput., 2006

Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks.
Int. J. Netw. Secur., 2006

Incorporating trust and reputation in the DSR protocol for dependable routing.
Comput. Commun., 2006

2005
CANSURV: A Windows program for population-based cancer survival analysis.
Comput. Methods Programs Biomed., 2005

Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

2004
Performance Comparison of Reactive Routing Protocols under Attack Conditions.
Int. J. Wirel. Opt. Commun., 2004

Parallel program debugging by specification.
Concurr. Pract. Exp., 2004

Secure Routing with the DSR Protocol.
Proceedings of the Wireless Information Systems, 2004

Trusted Route Discovery with AODV Protocol.
Proceedings of the International Conference on Wireless Networks, 2004

Secure Pervasive Computing without a Trusted Third Party.
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004

Trust-based routing for ad-hoc wireless networks.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Red-Handed: Collaborative Gesture Interaction with a Projection Table.
Proceedings of the Sixth IEEE International Conference on Automatic Face and Gesture Recognition (FGR 2004), 2004

Trusted Route Discovery with TORA Protocol.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Trusted routing in ad-hoc networks using pheromone trails.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Establishing Trust In Pure Ad-hoc Networks.
Proceedings of the Computer Science 2004, 2004

Kerberos Assisted Authentication in Mobile Ad-hoc Networks.
Proceedings of the Computer Science 2004, 2004

2003
Towards Customisable Tuple Field Matching in VLOS.
Proceedings of the Computer Science 2003, 2003

2002
Mathematics preparation for undergraduate degrees in computer science.
Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education, 2002

Hand Tracking for Interactive Pattern-Based Augmented Reality.
Proceedings of the 2002 IEEE / ACM International Symposium on Mixed and Augmented Reality (ISMAR 2002), 30 September, 2002

2001
Using XML to Specify a Trace Format for MPI Programs.
J. Res. Pract. Inf. Technol., 2001

DEPICT: A Topology-Based Debugger for MPI Programs.
Proceedings of the High-Level Parallel Programming Models and Supportive Environments, 2001

A Preliminary Topological Debugger for MPI Programs.
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Teaching parallel algorithm with process topologies.
Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000

IT programs and CS departments (panel session).
Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000

Yet, more Web exercises for learning C++.
Proceedings of the 31st SIGCSE Technical Symposium on Computer Science Education, 2000

1999
Formal Specification of Virtual Process Topologies.
Proceedings of the International Workshop on Cluster Computing (IWCC '99), 1999

Debugging Parallel Programs Using Incomplete Information.
Proceedings of the International Workshop on Cluster Computing (IWCC '99), 1999

1997
Improving the PVM teaching environment.
Proceedings of the 28th SIGCSE Technical Symposium on Computer Science Education, 1997

1996
User-level distributed file systems projects.
Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education, 1996

1993
Computers at Risk: <i>Does Anyone Remember?</i>.
Inf. Secur. J. A Glob. Perspect., 1993

1992
Teaching concurrency with Joyce and Linda.
Proceedings of the 23rd SIGCSE Technical Symposium on Computer Science Education, 1992

1991
A network specification language and execution environment for undergraduate teaching.
Proceedings of the 22nd SIGCSE Technical Symposium on Computer Science Education, 1991

1988
Support for Graphs of Processes in a Command Interpreter.
Softw. Pract. Exp., 1988


  Loading...