Michael Collins

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Superflows: A New Tool for Forensic Network Flow Analysis.
CoRR, 2024

Enabling Digital Technology in Primary Schools.
Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 2, 2024

Controlled Decoding from Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2022
Perspectives on computing ethics: a multi-stakeholder analysis.
J. Inf. Commun. Ethics Soc., 2022

Towards an Operations-Aware Experimentation Methodology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
On planetary systems as ordered sequences.
CoRR, 2021

CHARTS: a web application for characterizing and comparing tumor subpopulations in publicly available single-cell RNA-seq data sets.
BMC Bioinform., 2021

Case Studies in Experiment Design on a minimega Based Network Emulation Testbed.
Proceedings of the CSET '21: Cyber Security Experimentation and Test Workshop, 2021

The Development of Teaching Case Studies to Explore Ethical Issues Associated with Computer Programming: Four Case Studies on Programming Ethics.
Proceedings of the UKICER '21: United Kingdom and Ireland Computing Education Research Conference, Glasgow, UK, September 2, 2021

2020
REBUF: Jam Resistant BBC based Uncoordinated Frequency Division Multiplexing.
Proceedings of the 2020 Wireless Telecommunications Symposium, 2020

REPROOF: Quantifying the Jam Resistance of REBUF.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Unsupervised Cross-Lingual Part-of-Speech Tagging for Truly Low-Resource Scenarios.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

2019
An experimental framework for investigating hashgraph algorithm transaction speed.
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Systems, 2019

2018
Noise Contrastive Estimation and Negative Sampling for Conditional Models: Consistency and Statistical Efficiency.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

2016
Chappie Swarm: Persona-Driven Web Corpus Generation.
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

2013
Haptics Assisted Training (HAT) System for children's handwriting.
Proceedings of the 2013 World Haptics Conference, 2013

2012
Test-driven development for the web: increasing efficiency of web development.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

2011
SAR tomography development for Radarsat-2.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

2009
Payoff Based IDS Evaluation.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

Active Learning in the Security Classroom.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Using discovery to create an architecture-based implementation baseline.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

2006
Automated data verification in a format-free environment.
ACM SIGSOFT Softw. Eng. Notes, 2006

Network Communication as a Service-Oriented Capability.
Proceedings of the High Performance Computing and Grids in Action, 2006

2004
Computer Aided Monitoring of Fibrous Dysplasia Disease in Craniofacial Bones.
Proceedings of the 2004 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2004

2002
Reranking an n-gram supertagger.
Proceedings of the Sixth International Workshop on Tree Adjoining Grammar and Related Frameworks, 2002

2000
Telecommunications Crime - Part 3.
Comput. Secur., 2000

Comparing Web, Correspondence and Lecture versions of a second-year non-major Biology course.
Br. J. Educ. Technol., 2000

1999
Telecommunications crime - Part 2.
Comput. Secur., 1999

Telecommunications crime - Part 1.
Comput. Secur., 1999

1996
Overview of Memory Channel Network for PCI.
Proceedings of the Forty-First IEEE Computer Society International Conference: Technologies for the Information Superhighway, 1996


  Loading...