2004 |
6 | EE | Mark Foster,
Joseph N. Wilson,
Shigang Chen:
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.
ISC 2004: 183-194 |
5 | EE | Mark Foster,
Joseph N. Wilson:
Process Forensics: A Pilot Study on the Use of Checkpointing Technology in Computer Forensics.
IJDE 3(1): (2004) |
2003 |
4 | EE | Pradeep Padala,
Joseph N. Wilson:
GridOS: Operating System Services for Grid Architectures.
HiPC 2003: 353-362 |
1997 |
3 | EE | Hongchi Shi,
Gerhard X. Ritter,
Joseph N. Wilson:
A fast general algorithm for extracting image features on SIMD mesh-connected computers.
Pattern Recognition 30(7): 1205-1211 (1997) |
1995 |
2 | EE | Hongchi Shi,
Gerhard X. Ritter,
Joseph N. Wilson:
Simulations Between Two Reconfigurable Mesh Models.
Inf. Process. Lett. 55(3): 137-142 (1995) |
1990 |
1 | | Gerhard X. Ritter,
Joseph N. Wilson,
J. L. Davidson:
Image Algebra: An Overview.
Computer Vision, Graphics, and Image Processing 49(3): 297-331 (1990) |