default search action
John Wagner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j9]Jasbir Dhaliwal, John Wagner:
A novel feature extraction method based on highly expressed SNPs for tissue-specific gene prediction. J. Big Data 8(1): 109 (2021) - 2020
- [j8]Jasbir Dhaliwal, John Wagner, Shu Ling Leong, Chern Hong Lim:
Facial Anthropometric Measurements and Photographs - An Interdisciplinary Study. IEEE Access 8: 181998-182013 (2020)
2010 – 2019
- 2019
- [c12]Nebula Alam, Khoi-Nguyen Tran, Sue Ann Chen, John Wagner, Josh Andres, Mukesh K. Mohania:
Towards a Predictive Patent Analytics and Evaluation Platform. ECML/PKDD (3) 2019: 773-776 - [i4]Nebula Alam, Khoi-Nguyen Tran, Sue Ann Chen, John Wagner, Josh Andres, Mukesh K. Mohania:
Towards a Predictive Patent Analytics and Evaluation Platform. CoRR abs/1910.14258 (2019) - 2018
- [c11]Hoang Tam Vo, Ziyuan Wang, Dileban Karunamoorthy, John Wagner, Ermyas Abebe, Mukesh K. Mohania:
Internet of Blockchains: Techniques and Challenges Ahead. iThings/GreenCom/CPSCom/SmartData 2018: 1574-1581 - 2017
- [j7]Shabnam Khatibi, Hong-Jian Zhu, John Wagner, Chin Wee Tan, Jonathan H. Manton, Antony W. Burgess:
Mathematical model of TGF-βsignalling: feedback coupling is consistent with signal switching. BMC Syst. Biol. 11(1): 48:1-48:15 (2017) - [j6]Tuan M. Hoang Trong, Sarah E. Motley, John Wagner, Robert R. Kerr, James R. Kozloski:
Dendritic spines modify action potential back-propagation in a multicompartment neuronal model. IBM J. Res. Dev. 61(2/3): 11:1-11:13 (2017) - 2016
- [j5]Shane E. Gordon, Daniel K. Weber, Matthew T. Downton, John Wagner, Matthew A. Perugini:
Dynamic Modelling Reveals 'Hotspots' on the Pathway to Enzyme-Substrate Complex Formation. PLoS Comput. Biol. 12(3) (2016) - 2015
- [j4]Benjamin Goudey, Mani Abedini, John L. Hopper, Michael Inouye, Enes Makalic, Daniel F. Schmidt, John Wagner, Zeyu Zhou, Justin Zobel, Matthias Reumann:
High performance computing enabling exhaustive analysis of higher order single nucleotide polymorphism interaction in Genome Wide Association Studies. Health Inf. Sci. Syst. 3(1) (2015) - 2014
- [c10]Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf:
JSAI: a static analysis platform for JavaScript. SIGSOFT FSE 2014: 121-132 - [i3]Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf:
JSAI: Designing a Sound, Configurable, and Efficient Static Analyzer for JavaScript. CoRR abs/1403.3996 (2014) - 2013
- [c9]Vineeth Kashyap, John Sarracino, John Wagner, Ben Wiedermann, Ben Hardekopf:
Type refinement for static analysis of JavaScript. DLS 2013: 17-26 - [c8]Shreyas Patel, David Moline, John Wagner:
Modeling and analysis of an atmospheric driven Atmos clock with mechanical escapement control. ECC 2013: 281-287 - 2012
- [c7]Matthias Reumann, Enes Makalic, Benjamin W. Goudey, Michael Inouye, Adrian Bickerstaffe, Minh Bui, Daniel J. Park, Miroslaw K. Kapuscinski, Daniel F. Schmidt, Zeyu Zhou, Guoqi Q. Qian, Justin Zobel, John Wagner, John L. Hopper:
Supercomputing enabling exhaustive statistical analysis of genome wide association study data: Preliminary results. EMBC 2012: 1258-1261 - 2011
- [j3]James R. Kozloski, John Wagner:
An Ultrascalable Solution to Large-scale Neural Tissue Simulation. Frontiers Neuroinformatics 5: 15 (2011)
2000 – 2009
- 2008
- [j2]John Wagner, Gustavo Stolovitzky:
Stability and Time-Delay Modeling of Negative Feedback Loops. Proc. IEEE 96(8): 1398-1410 (2008) - [c6]Jintai Ding, John Wagner:
Cryptanalysis of Rational Multivariate Public Key Cryptosystems. PQCrypto 2008: 124-136 - 2007
- [c5]Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. ACNS 2007: 104-115 - [c4]Chris Forsythe, Chris Berka, Robert Matthews, John Wagner:
Making the Giant Leap with Augmented Cognition Technologies: What Will Be the First "Killer App"? HCI (16) 2007: 434-438 - [c3]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Public Key Cryptography 2007: 233-248 - [i2]Jintai Ding, John Wagner:
Cryptanalysis of Rational Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2007: 367 (2007) - 2006
- [i1]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2006: 336 (2006) - 2000
- [c2]John Wagner, X. Liu:
Nonlinear modeling and control of automotive vibration isolation systems. ACC 2000: 564-568
1990 – 1999
- 1992
- [j1]John Wagner, Rahmat Shoureshi:
A robust failure diagnostic system for thermofluid processes. Autom. 28(2): 375-381 (1992) - 1991
- [c1]Steve Plimpton, Isaac Shokair, John Wagner, Jeff Jortner:
Load-Balancing and Performance of a Gridless Particle Simulation on MIMD, SIMD, and Vector Supercomputers. PP 1991: 507-512
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint