default search action
John C. Kelly
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Mansi Bhavsar, Yohannes Belayneh Bekele, Kaushik Roy, John C. Kelly, Daniel B. Limbrick:
FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT. IEEE Access 12: 52215-52226 (2024) - 2023
- [j6]Yohannes Belayneh Bekele, Daniel B. Limbrick, John C. Kelly:
A Survey of QEMU-Based Fault Injection Tools & Techniques for Emulating Physical Faults. IEEE Access 11: 62662-62673 (2023) - [j5]Mansi Bhavsar, Kaushik Roy, John C. Kelly, Olusola Tolulope Odeyomi:
Anomaly-based intrusion detection system for IoT application. Discov. Internet Things 3(1): 5 (2023) - 2022
- [c18]Mansi Bhavsar, Kaushik Roy, Zhipeng Liu, John C. Kelly, Balakrishna Gokaraju:
Intrusion-Based Attack Detection Using Machine Learning Techniques for Connected Autonomous Vehicle. IEA/AIE 2022: 505-515 - 2020
- [c17]Christopher Horne, John C. Kelly:
Study of Wave Motion and Teaching Methods in Engineering Problem Solving Course. EDUCON 2020: 279-283
2010 – 2019
- 2013
- [j4]Aniesha Alford, Joshua Adams, Joseph Shelton, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly:
Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection. Int. J. Intell. Comput. Cybern. 6(1): 4-20 (2013) - 2012
- [j3]Aniesha Alford, Kelvin S. Bryant, Tamirat Abegaz, Gerry V. Dozier, John C. Kelly, Joseph Shelton, Lasanio Small, Jared Williams, Damon L. Woodard, Karl Ricanek:
Genetic and evolutionary methods for biometric feature reduction. Int. J. Biom. 4(3): 220-245 (2012) - [c16]Aniesha Alford, Joshua Adams, Joseph Shelton, Kelvin S. Bryant, John C. Kelly, Gerry V. Dozier:
Analyzing the cross-generalization ability of a hybrid genetic & evolutionary application for multibiometric feature weighting and selection. GECCO (Companion) 2012: 1521-1522 - 2011
- [c15]Khary Popplewell, Aniesha Alford, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Kamilah Purrington, Joseph Shelton:
A comparison of genetic feature selection and weighting techniques for multi-biometric recognition. ACM Southeast Regional Conference 2011: 205-208 - [c14]Aniesha Alford, Caresse Hansen, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Tamirat Abegaz, Karl Ricanek, Damon L. Woodard:
GEC-based multi-biometric fusion. IEEE Congress on Evolutionary Computation 2011: 2071-2074 - [c13]Aniesha Alford, Khary Popplewell, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Joseph Shelton, Karl Ricanek, Damon L. Woodard:
A comparison of GEC-based feature selection and weighting for multimodal biometric recognition. IEEE Congress on Evolutionary Computation 2011: 2725-2728 - [c12]Aniesha Alford, Khary Popplewell, Gerry V. Dozier, Kelvin S. Bryant, John C. Kelly, Joshua Adams, Tamirat Abegaz, Joseph Shelton:
GEFeWS: A Hybrid Genetic-Based Feature Weighting and Selection Algorithm for Multi-Biometric Recognition. MAICS 2011: 86-90 - 2010
- [c11]Adrián Canedo-Rodriguez, Jung Hyoun Kim, John C. Kelly, Jung Hee Kim, Soo-Hyung Kim, Yolanda Blanco-Fernández, Pavan Banugondi:
Color Clustering Text Extraction Algorithm for Mobile Phone Images. IPCV 2010: 210-215 - [c10]Adrián Canedo-Rodriguez, Jung Hyoun Kim, John C. Kelly, Jung Hee Kim, Soo-Hyung Kim, Yolanda Blanco-Fernández, Sai Kiran Veeramachaneni:
An Efficient and Accurate Text Localization Algorithm in Compressed Mobile Phone Image Domain. IPCV 2010: 610-614
2000 – 2009
- 2008
- [c9]Trevillian Highter, Jung Hee Kim, Jung Hyoun Kim, John C. Kelly:
An Efficient Database for Environmental Monitoring through Wireless Sensor Network. IKE 2008: 67-70 - [c8]Gi Yeon Park, Jung Hyoun Kim, Jung Hee Kim, John C. Kelly:
Face Detection and Recogntion Using Geometrical Features. IPCV 2008: 363-368 - 2007
- [j2]John C. Kelly:
Creating an institutional repository at a challenged institution. OCLC Syst. Serv. 23(2): 142-147 (2007) - 2001
- [c7]David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop:
Development of a Software Security Assessment Instrument to Reduce Software Security Risk. WETICE 2001: 144-149 - 2000
- [c6]Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel, James D. Kiper, John D. Powell:
Technology Transfer Issues for Formal Methods of Software Specification. CSEE&T 2000: 23-31 - [c5]Steven L. Cornford, Martin S. Feather, John C. Kelly, Timothy W. Larson, Burton Sigal, James D. Kiper:
Design and Development Assessment. IWSSD 2000: 105-114 - [c4]David P. Gilliam, John C. Kelly, Matt Bishop:
Reducing Software Security Risk through an Integrated Approach. WETICE 2000: 141-146
1990 – 1999
- 1992
- [j1]John C. Kelly, Joseph S. Sherif, Jonathan M. Hops:
An analysis of defect densities found during software inspections. J. Syst. Softw. 17(2): 111-117 (1992) - [c3]Ken Abernethy, John C. Kelly:
Comparing Object-Oriented and Data Flow Models - a Case Study. ACM Conference on Computer Science 1992: 541-547
1980 – 1989
- 1981
- [c2]Jerome W. Blaylock, John C. Kelly:
System Tuning the UNIVAC Executive Operating System's Dynamic Allocator. Int. CMG Conference 1981: 213-219
1970 – 1979
- 1978
- [c1]John C. Kelly, Gary P. Route:
A Structured Approach for Evaluating UNIVAC 1100 Series Computer Systems. Int. CMG Conference 1978: 227-238 - 1974
- [b1]John C. Kelly:
The theory of repetition networks with application to computer programs. Purdue University, USA, 1974
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint