default search action
Thomas E. Carroll
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c27]Richard M. Pratt, Thomas E. Carroll:
Vehicle Charging Infrastructure Security. ICCE 2019: 1-5 - 2018
- [c26]Kristine Arthur-Durett, Thomas E. Carroll, Satish Chikkagoudar:
Discovering Significant Co-Occurrences to Characterize Network Behaviors. HCI (4) 2018: 609-623 - 2017
- [c25]Jason Bonior, Philip Evans, Greg Sheets, John Paul Jones, Toby Flynn, Lori Ross O'Neil, William Hutton, Richard M. Pratt, Thomas E. Carroll:
Implementation of a Wireless Time Distribution Testbed Protected with Quantum Key Distribution. WCNC 2017: 1-6 - 2015
- [c24]Yannan Sun, Abhishek Somani, Thomas E. Carroll:
Learning based bidding strategy for HVAC systems in double auction retail energy markets. ACC 2015: 2912-2917 - [c23]Glenn A. Fink, Dimitri V. Zarzhitsky, Thomas E. Carroll, Ethan Farquhar:
Security and privacy grand challenges for the Internet of Things. CTS 2015: 27-34 - [c22]Thomas E. Carroll, Satish Chikkagoudar, Kristine Arthur-Durett:
Impact of network activity levels on the performance of passive network service dependency discovery. MILCOM 2015: 1341-1347 - [c21]Christopher S. Oehmen, Thomas E. Carroll, Patrick C. Paulson, Daniel M. Best, Christine F. Noonan, Seth R. Thompson, Jeffrey L. Jensen, Glenn A. Fink, Elena S. Peterson:
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures. SafeConfig@CCS 2015: 55-58 - [c20]He Hao, Abhishek Somani, Jianming Lian, Thomas E. Carroll:
Generalized aggregation and coordination of residential loads in a smart community. SmartGridComm 2015: 67-72 - 2014
- [j7]Thomas E. Carroll, Frank L. Greitzer, Adam D. Roberts:
Security informatics research challenges for mitigating cyber friendly fire. Secur. Informatics 3(1): 13 (2014) - [c19]Alefiya Hussain, Ted Faber, Robert Braden, Terry V. Benzel, Tim Yardley, Jeremy Jones, David M. Nicol, William H. Sanders, Thomas W. Edgar, Thomas E. Carroll, David O. Manz, Laura Tinnel:
Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems. DCOSS 2014: 358-360 - [c18]Thomas E. Carroll, Michael B. Crouse, Errin W. Fulp, Kenneth S. Berenhaut:
Analysis of network address shuffling as a moving target defense. ICC 2014: 701-706 - [c17]Mohammed M. Olama, Stephen M. Killough, P. Teja Kuruganti, Thomas E. Carroll:
Design, Implementation, and Evaluation of a Hybrid DS/FFH Spread-Spectrum Radio Transceiver. MILCOM 2014: 1368-1373 - 2013
- [c16]Jereme Haack, Bora A. Akyol, Nathan Tenney, Brandon Carpenter, Richard M. Pratt, Thomas E. Carroll:
VOLTTRON™: An agent platform for integrating electric vehicles and Smart Grid. ICCVE 2013: 81-86 - [c15]Frank L. Greitzer, Thomas E. Carroll, Adam D. Roberts:
Cyber friendly fire: Research challenges for security informatics. ISI 2013: 94-99 - 2012
- [j6]Thomas E. Carroll, Daniel Grosu:
An incentive-based distributed mechanism for scheduling divisible loads in tree networks. J. Parallel Distributed Comput. 72(3): 389-401 (2012) - 2011
- [j5]Thomas E. Carroll, Daniel Grosu:
Distributed algorithmic mechanism design for scheduling on unrelated machines. J. Parallel Distributed Comput. 71(3): 397-406 (2011) - [j4]Thomas E. Carroll, Daniel Grosu:
A game theoretic investigation of deception in network security. Secur. Commun. Networks 4(10): 1162-1172 (2011) - [c14]Thomas W. Edgar, David O. Manz, Thomas E. Carroll:
Towards an experimental testbed facility for cyber-physical security research. CSIIRW 2011: 53 - [c13]Patrick R. Paulson, Thomas E. Carroll, Chitra Sivaraman, Peter Neorr, Stephen D. Unwin, Shamina Hossain:
Simplifying Probability Elicitation and Uncertainty Modeling in Bayesian Networks. MAICS 2011: 114-119 - 2010
- [j3]Thomas E. Carroll, Daniel Grosu:
Formation of virtual organizations in grids: a game-theoretic approach. Concurr. Comput. Pract. Exp. 22(14): 1972-1989 (2010) - [c12]Thomas E. Carroll, Daniel Grosu:
Incentive Compatible Online Scheduling of Malleable Parallel Jobs with Individual Deadlines. ICPP 2010: 516-524 - [p1]Thomas E. Carroll, Daniel Grosu:
Formation of Virtual Organizations in Grids: A Game-Theoretic Approach. Economic Models and Algorithms for Distributed Systems 2010: 63-81
2000 – 2009
- 2009
- [j2]Thomas E. Carroll, Daniel Grosu:
A secure and anonymous voter-controlled election scheme. J. Netw. Comput. Appl. 32(3): 599-606 (2009) - [c11]Thomas E. Carroll, Daniel Grosu:
A Game Theoretic Investigation of Deception in Network Security. ICCCN 2009: 1-6 - 2008
- [j1]Thomas E. Carroll, Daniel Grosu:
Strategyproof Mechanisms for Scheduling Divisible Loads in Bus-Networked Distributed Systems. IEEE Trans. Parallel Distributed Syst. 19(8): 1124-1135 (2008) - [c10]Thomas E. Carroll, Daniel Grosu:
An Incentive-Compatible Mechanism for Scheduling Non-Malleable Parallel Jobs with Individual Deadlines. ICPP 2008: 107-114 - 2007
- [c9]Thomas E. Carroll, Daniel Grosu:
A Strategyproof Mechanism for Scheduling Divisible Loads in Linear Networks. IPDPS 2007: 1-9 - [c8]Thomas E. Carroll, Daniel Grosu:
Divisible Load Scheduling: An Approach Using Coalitional Games. ISPDC 2007: 258-265 - 2006
- [c7]Thomas E. Carroll, Daniel Grosu:
A strategy proof mechanism for scheduling divisible loads in bus networks without control processors. IPDPS 2006 - [c6]Thomas E. Carroll, Daniel Grosu:
A Strategyproof Mechanism for Scheduling Divisible Loads in Bus Networks without Control Processors. IPDPS 2006: 1-8 - [c5]Thomas E. Carroll, Daniel Grosu:
Selfish Multi-User Task Scheduling. ISPDC 2006: 99-106 - 2005
- [c4]Thomas E. Carroll, Daniel Grosu:
Distributed Algorithmic Mechanism Design for Scheduling on Unrelated Machines. ISPAN 2005: 194-201 - [c3]Daniel Grosu, Thomas E. Carroll:
A Strategyproof Mechanism for Scheduling Divisible Loads in Distributed Systems. ISPDC 2005: 83-90 - [c2]Thomas E. Carroll, Daniel Grosu:
A Secure and Efficient Voter-Controlled Anonymous Election Scheme. ITCC (1) 2005: 721-726 - [c1]Thomas E. Carroll, Daniel Grosu:
Brief announcement: distributed algorithmic mechanism design for scheduling. PODC 2005: 128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint