default search action
Aspen Olmsted
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c47]Sreejith Gopinath, Aspen Olmsted:
Safeguarding National Security Interests Utilizing Location-Aware Camera Devices. FTC (2) 2022: 354-371 - [i2]Sreejith Gopinath, Aspen Olmsted:
Mitigating the Effects of Ransomware Attacks on Healthcare Systems. CoRR abs/2202.06108 (2022) - [i1]Sreejith Gopinath, Aspen Olmsted:
Safeguarding National Security Interests Utilizing Location-Aware Camera Devices. CoRR abs/2205.03330 (2022) - 2021
- [c46]Kevin Zhang, Aspen Olmsted:
Examining Autonomous Vehicle Operating Systems Vulnerabilities using a Cyber-Physical Approach. ITSC 2021: 976-981
2010 – 2019
- 2017
- [c45]Aspen Olmsted:
Entity identity, performance, and storage. ICITST 2017: 155-160 - [c44]Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted:
Evaluate action primitives for human activity recognition using unsupervised learning approach. ICITST 2017: 186-188 - [c43]Pasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted:
Classification of music by composer using fuzzy min-max neural networks. ICITST 2017: 189-192 - [c42]Pasha Sadeghian, Aspen Olmsted:
Assessment of fuzzy min-max neural networks for classification tasks. ICITST 2017: 193-196 - [c41]Huicong Loi, Aspen Olmsted:
Low-cost detection of backdoor malware. ICITST 2017: 197-198 - [c40]Walter Blair, Aspen Olmsted, Paul Anderson:
Docker vs. KVM: Apache spark application performance and ease of use. ICITST 2017: 199-201 - [c39]Ryan Lile, Aspen Olmsted:
Meaningful sandbox data. ICITST 2017: 203-204 - [c38]Elizabeth Healy, Husna Siddiqui, Aspen Olmsted:
Classifying influenza outbreaks by analyzing and filtering Twitter data. ICITST 2017: 205-207 - [c37]Casey Wilson, Aspen Olmsted:
Handling an organization's communication needs with a single web service. ICITST 2017: 208-209 - [c36]Andrew Bissada, Aspen Olmsted:
Mobile multi-factor authentication. ICITST 2017: 210-211 - [c35]William Kennedy, Aspen Olmsted:
Three factor authentication. ICITST 2017: 212-213 - [c34]Ahana Roy, Aspen Olmsted:
Distributed query processing and data sharing. ICITST 2017: 221-224 - [c33]Thomas Nash, Aspen Olmsted:
Performance vs. security: Implementing an immutable database in MySQL. ICITST 2017: 290-291 - [c32]Paul Helling, Ahana Roy, Aspen Olmsted:
Effects of lexicon size on solving bananagrams. ICITST 2017: 339-341 - [c31]Wayne Chen, Aspen Olmsted:
Considerations for OSV over Linux-based virtual machines. ICITST 2017: 346-348 - [c30]Thomas Briggs, Aspen Olmsted:
Client side calculation of 'bacon number'. ICITST 2017: 356-358 - [c29]Cameron Hamilton, Aspen Olmsted:
Database multi-factor authentication via pluggable authentication modules. ICITST 2017: 367-368 - [c28]Blake Badders, Aspen Olmsted:
Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. ICITST 2017: 370-371 - [c27]Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted:
Weighing the shopping benefits of a smarter refrigerator. ICITST 2017: 377-378 - [c26]Preston T. Owens, Aspen Olmsted:
Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. ICITST 2017: 379-380 - [c25]Husna Siddiqui, Aspen Olmsted, Brendan Keane:
Venmo: Exposing a user's lifestyle. ICITST 2017: 403-404 - [c24]Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted:
Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. ICITST 2017: 424-426 - [c23]Thomas Nash, Aspen Olmsted:
shinySDM: Point and click species distribution modeling. ICITST 2017: 450-451 - [c22]Seth Stoudenmier, Aspen Olmsted:
Efficient retrieval of information from hierarchical REST requests. ICITST 2017: 452-454 - [c21]Husna Siddiqui, Elizabeth Healy, Aspen Olmsted:
Bot or not. ICITST 2017: 462-463 - [c20]Walter Blair, Aspen Olmsted, Paul Anderson:
Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files. ICITST 2017: 469-471 - [c19]Luis F. Mejia-Ricart, Aspen Olmsted:
Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. ICITST 2017: 472-474 - [c18]Casey Wilson, Anna V. Sandifer, Aspen Olmsted:
Designing an assembly language using MIT App inventor. ICITST 2017: 491-493 - [c17]Wren Chan, Aspen Olmsted:
Ethereum transaction graph analysis. ICITST 2017: 498-500 - [c16]Anna V. Sandifer, Casey Wilson, Aspen Olmsted:
Detection of fake online hotel reviews. ICITST 2017: 501-502 - 2016
- [c15]Aspen Olmsted:
Modeling cloud applications for partition contingency. ICITST 2016: 230-234 - [c14]Madeline Little, Aspen Olmsted:
Temporal resource scheduling equity. ICITST 2016: 297-299 - 2015
- [c13]Aspen Olmsted:
Keynote speaker 3: Secure software engineering in the cloud. ICITST 2015: 19 - [c12]Aspen Olmsted:
Long running, consistent, web service transactions. ICITST 2015: 139-144 - [c11]Clinton Medbery, Aspen Olmsted:
HeartSync: Mobile pacemaker failure detector. ICITST 2015: 277-279 - [c10]Aspen Olmsted:
Keynote speaker 3. WCICSS 2015: 12 - [c9]Aspen Olmsted:
Keynote speaker 2: Secure software engineering in the cloud. WorldCIS 2015: 12 - [c8]Aspen Olmsted:
Ecurrency threat modeling and hardening. WorldCIS 2015: 49-54 - [c7]Matt Piazza, Aspen Olmsted:
Founding a cybersecurity club in a higher education environment: A case study. WorldCIS 2015: 139-143 - 2014
- [c6]Aspen Olmsted, RoxAnn H. Stalvey:
Highly available, consistent, business rule filters. ICITST 2014: 125-130 - 2013
- [c5]Aspen Olmsted, Csilla Farkas:
Web Service constraint optimization. ICITST 2013: 270-275 - [c4]Aspen Olmsted, Csilla Farkas:
Coarse Grained Web Service Availability, Consistency, and Durability. ICWS 2013: 619-620 - 2012
- [c3]Edward Pharr, Aspen Olmsted, Paul E. Anderson:
gLIMS: Google cloud-based laboratory information management system for NMR metabolomics. BCB 2012: 595-597 - [c2]Aspen Olmsted, Csilla Farkas:
High volume web service resource consumption. ICITST 2012: 275-280 - [c1]Aspen Olmsted, Csilla Farkas:
The cost of increased transactional correctness and durability in distributed databases. IRI 2012: 441-448
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint