default search action
Jason King
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j2]Maria Chudnovsky, Jason King, Michal Pilipczuk, Pawel Rzazewski, Sophie Spirkl:
Finding Large H-Colorable Subgraphs in Hereditary Graph Classes. SIAM J. Discret. Math. 35(4): 2357-2386 (2021) - [c10]Jason King:
Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report. SIGCSE 2021: 959-965 - 2020
- [c9]Maria Chudnovsky, Jason King, Michal Pilipczuk, Pawel Rzazewski, Sophie Spirkl:
Finding Large H-Colorable Subgraphs in Hereditary Graph Classes. ESA 2020: 35:1-35:17 - [c8]Sarah Heckman, Jessica Young Schmidt, Jason King:
Integrating Testing Throughout the CS Curriculum. ICST Workshops 2020: 441-444 - [i1]Maria Chudnovsky, Jason King, Michal Pilipczuk, Pawel Rzazewski, Sophie Spirkl:
Finding large $H$-colorable subgraphs in hereditary graph classes. CoRR abs/2004.09425 (2020)
2010 – 2019
- 2018
- [c7]Casey Lorenzen, Rajeev Agrawal, Jason King:
Determining Viability of Deep Learning on Cybersecurity Log Analytics. IEEE BigData 2018: 4806-4811 - [c6]Sarah Heckman, Jason King:
Developing Software Engineering Skills using Real Tools for Automated Grading. SIGCSE 2018: 794-799 - 2016
- [j1]Jason King, Dan Evans:
Key criteria for selecting a secure cloud wireless net work. Netw. Secur. 2016(1): 17-20 (2016) - [c5]Jeffrey C. Carver, Morgan Burcham, Sedef Akinli Koçak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, Laurie A. Williams:
Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. HotSoS 2016: 38-51 - [c4]Sarah Heckman, Jason King:
Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only). SIGCSE 2016: 696-697 - 2015
- [c3]Jason King, Rahul Pandita, Laurie A. Williams:
Enabling forensics by proposing heuristics to identify mandatory log events. HotSoS 2015: 6:1-6:11 - [c2]Sarah Heckman, Jason King, Michael Winters:
Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only). SIGCSE 2015: 677 - 2013
- [c1]Jason King:
Measuring the forensic-ability of audit logs for nonrepudiation. ICSE 2013: 1419-1422
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint