John C. Kelly

According to our database1, John C. Kelly authored at least 26 papers between 1974 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT.
IEEE Access, 2024

2023
Anomaly-based intrusion detection system for IoT application.
Discov. Internet Things, December, 2023

A Survey of QEMU-Based Fault Injection Tools & Techniques for Emulating Physical Faults.
IEEE Access, 2023

2022
Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence, 2022

2020
Study of Wave Motion and Teaching Methods in Engineering Problem Solving Course.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

2013
Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection.
Int. J. Intell. Comput. Cybern., 2013

2012
Genetic and evolutionary methods for biometric feature reduction.
Int. J. Biom., 2012

Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

2011
GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi-Biometric Recognition.
Proceedings of The 22nd Midwest Artificial Intelligence and Cognitive Science Conference 2011, 2011

A comparison of GEC-based feature selection and weighting for multimodal biometric recognition.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

GEC-based multi-biometric fusion.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

A comparison of genetic feature selection and weighting techniques for multi-biometric recognition.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
An Efficient and Accurate Text Localization Algorithm in Compressed Mobile Phone Image Domain.
Proceedings of the 2010 International Conference on Image Processing, 2010

Color Clustering Text Extraction Algorithm for Mobile Phone Images.
Proceedings of the 2010 International Conference on Image Processing, 2010

2008
Face Detection and Recogntion Using Geometrical Features.
Proceedings of the 2008 International Conference on Image Processing, 2008

An Efficient Database for Environmental Monitoring through Wireless Sensor Network.
Proceedings of the 2008 International Conference on Information & Knowledge Engineering, 2008

2007
Creating an institutional repository at a challenged institution.
OCLC Syst. Serv., 2007

2001
Development of a Software Security Assessment Instrument to Reduce Software Security Risk.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

2000
Reducing Software Security Risk through an Integrated Approach.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000

Design and Development Assessment.
Proceedings of the 10th International Workshop on Software Specification and Design, 2000

Technology Transfer Issues for Formal Methods of Software Specification.
Proceedings of the Thirteenth Conference on Software Engineering Education and Training, 2000

1992
An analysis of defect densities found during software inspections.
J. Syst. Softw., 1992

Comparing Object-Oriented and Data Flow Models - a Case Study.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1981
System Tuning the UNIVAC Executive Operating System's Dynamic Allocator.
Proceedings of the Seventh International Computer Measurement Group Conference, 1981

1978
A Structured Approach for Evaluating UNIVAC 1100 Series Computer Systems.
Proceedings of the Fourth International Computer Measurement Group Conference, 1978

1974
The theory of repetition networks with application to computer programs.
PhD thesis, 1974


  Loading...