default search action
Bill Kay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Eric O. Scott, Mark Coletti, Catherine D. Schuman, Bill Kay, Shruti R. Kulkarni, Maryam Parsa, Chathika Gunaratne, Kenneth A. De Jong:
Avoiding excess computation in asynchronous evolutionary algorithms. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [c17]Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff A. Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine:
Malicious Cyber Activity Detection using Zigzag Persistence. DSC 2023: 1-8 - [c16]Audun Myers, Cliff A. Joslyn, Bill Kay, Emilie Purvine, Gregory Roek, Madelyn Shapiro:
Topological Analysis of Temporal Hypergraphs. WAW 2023: 127-146 - [i13]Audun Myers, Cliff A. Joslyn, Bill Kay, Emilie Purvine, Gregory Roek, Madelyn Shapiro:
Topological Analysis of Temporal Hypergraphs. CoRR abs/2302.02857 (2023) - [i12]Sinan G. Aksoy, Ryan S. Bennink, Yuzhou Chen, José Frías, Yulia R. Gel, Bill Kay, Uwe Naumann, Carlos Ortiz Marrero, Anthony V. Petyuk, Sandip Roy, Ignacio Segovia-Dominguez, Nate Veldt, Stephen J. Young:
Seven open problems in applied combinatorics. CoRR abs/2303.11464 (2023) - [i11]Jürgen Kritschgau, Daniel Kaiser, Oliver Alvarado Rodriguez, Ilya Amburg, Jessalyn Bolkema, Thomas Grubb, Fangfei Lan, Sepideh Maleki, Phil Chodrow, Bill Kay:
Community Detection in Hypergraphs via Mutual Information Maximization. CoRR abs/2308.04537 (2023) - [i10]Audun Myers, Alyson Bittner, Sinan Aksoy, Daniel M. Best, Gregory Henselman-Petrusek, Helen Jenne, Cliff A. Joslyn, Bill Kay, Garret Seppala, Stephen J. Young, Emilie Purvine:
Malicious Cyber Activity Detection Using Zigzag Persistence. CoRR abs/2309.08010 (2023) - [i9]Helen Jenne, Sinan G. Aksoy, Daniel M. Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff A. Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine:
Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs. CoRR abs/2311.16154 (2023) - [i8]Bill Kay, Sinan G. Aksoy, Molly Baird, Daniel M. Best, Helen Jenne, Cliff A. Joslyn, Christopher Potvin, Gregory Henselman-Petrusek, Garret Seppala, Stephen J. Young, Emilie Purvine:
Hypergraph Topological Features for Autoencoder-Based Intrusion Detection for Cybersecurity Data. CoRR abs/2312.00023 (2023) - [i7]Bill Kay, Audun Myers, Thad Boydston, Emily Ellwein, Cameron Mackenzie, Erik Lentz:
Permutation Entropy for Signal Analysis. CoRR abs/2312.00964 (2023) - 2022
- [j14]Catherine D. Schuman, Shruti R. Kulkarni, Maryam Parsa, J. Parker Mitchell, Prasanna Date, Bill Kay:
Opportunities for neuromorphic computing algorithms and applications. Nat. Comput. Sci. 2(1): 10-19 (2022) - [j13]Catherine D. Schuman, Shruti R. Kulkarni, Maryam Parsa, J. Parker Mitchell, Prasanna Date, Bill Kay:
Publisher Correction: Opportunities for neuromorphic computing algorithms and applications. Nat. Comput. Sci. 2(3): 205 (2022) - [j12]James B. Aimone, Prasanna Date, Gabriel A. Fonseca Guerra, Kathleen E. Hamilton, Kyle Henke, Bill Kay, Garrett T. Kenyon, Shruti R. Kulkarni, Susan M. Mniszewski, Maryam Parsa, Sumedh R. Risbud, Catherine D. Schuman, William Severa, J. Darby Smith:
A review of non-cognitive applications for neuromorphic computing. Neuromorph. Comput. Eng. 2(2): 32003 (2022) - [c15]Prasanna Date, Thomas E. Potok, Catherine D. Schuman, Bill Kay:
Neuromorphic Computing is Turing-Complete. ICONS 2022: 16:1-16:10 - 2021
- [j11]Anthony Bonato, Sean English, Bill Kay, Daniel Moghbel:
Improved Bounds for Burning Fence Graphs. Graphs Comb. 37(6): 2761-2773 (2021) - [c14]Anika Tabassum, Supriya Chinthavali, Sangkeun Lee, Nils M. Stenvig, Bill Kay, P. Teja Kuruganti, B. Aditya Prakash:
Efficient Contingency Analysis in Power Systems via Network Trigger Nodes. IEEE BigData 2021: 1964-1973 - [c13]Bill Kay, Hao Lu, Pravallika Devineni, Anika Tabassum, Supriya Chinthavali, Sangkeun Matt Lee:
Identification of Critical Infrastructure via PageRank. IEEE BigData 2021: 3685-3690 - [c12]Prasanna Date, Bill Kay, Catherine D. Schuman, Robert M. Patton, Thomas E. Potok:
Computational Complexity of Neuromorphic Algorithms. ICONS 2021: 8:1-8:7 - [c11]Maryam Parsa, Catherine D. Schuman, Nitin Rathi, Amirkoushyar Ziabari, Derek C. Rose, J. Parker Mitchell, J. Travis Johnston, Bill Kay, Steven R. Young, Kaushik Roy:
Accurate and Accelerated Neuromorphic Network Design Leveraging A Bayesian Hyperparameter Pareto Optimization Approach. ICONS 2021: 14:1-14:8 - [c10]Bill Kay, Catherine D. Schuman, Jade O'Connor, Prasanna Date, Thomas E. Potok:
Neuromorphic Graph Algorithms: Cycle Detection, Odd Cycle Detection, and Max Flow. ICONS 2021: 24:1-24:7 - [c9]Catherine D. Schuman, Bill Kay, Prasanna Date, Ramakrishnan Kannan, Piyush Sao, Thomas E. Potok:
Sparse Binary Matrix-Vector Multiplication on Neuromorphic Computers. IPDPS Workshops 2021: 308-311 - [c8]Pravallika Devineni, Panchapakesan Ganesh, Nikhil Sivadas, Abhijeet Dhakane, Ketan Maheshwari, Drahomira Herrmannova, Ramakrishnan Kannan, Seung-Hwan Lim, Thomas E. Potok, Jordan B. Chipka, Priyantha Mudalige, Mark Coletti, Sajal Dash, Arnab Kumar Paul, Sarp Oral, Feiyi Wang, Bill Kay, Melissa R. Allen-Dumas, Christa Brelsford, Joshua R. New, Andy Berres, Kuldeep R. Kurte, Jibonananda Sanyal, Levi Sweet, Chathika Gunaratne, Maxim A. Ziatdinov, Rama K. Vasudevan, Sergei V. Kalinin, Olivera Kotevska, Jean C. Bilheux, Hassina Z. Bilheux, Garrett E. Granroth, Thomas Proffen, Rick Riedel, Peter F. Peterson, Shruti R. Kulkarni, Kyle P. Kelley, Stephen Jesse, Maryam Parsa:
Smoky Mountain Data Challenge 2021: An Open Call to Solve Scientific Data Challenges Using Advanced Data Analytics and Edge Computing. SMC 2021: 361-382 - [c7]Eric O. Scott, Mark Coletti, Catherine D. Schuman, Bill Kay, Shruti R. Kulkarni, Maryam Parsa, Kenneth A. De Jong:
Avoiding Excess Computation in Asynchronous Evolutionary Algorithms. UKCI 2021: 71-82 - [i6]Prasanna Date, Catherine D. Schuman, Bill Kay, Thomas E. Potok:
Neuromorphic Computing is Turing-Complete. CoRR abs/2104.13983 (2021) - 2020
- [j10]Anthony Bonato, Huda Chuangpishit, Sean English, Bill Kay, Erin Meger:
The iterated local model for social networks. Discret. Appl. Math. 284: 556-571 (2020) - [c6]Pravallika Devineni, Bill Kay, Hao Lu, Anika Tabassum, Supriya Chinthavali, Sangkeun Matt Lee:
Toward Quantifying Vulnerabilities in Critical Infrastructure Systems. IEEE BigData 2020: 2884-2890 - [c5]Kathleen E. Hamilton, Prasanna Date, Bill Kay, Catherine D. Schuman:
Modeling epidemic spread with spike-based models. ICONS 2020: 28:1-28:5 - [c4]Maryam Parsa, Catherine D. Schuman, Prasanna Date, Derek C. Rose, Bill Kay, J. Parker Mitchell, Steven R. Young, Ryan Dellana, William Severa, Thomas E. Potok, Kaushik Roy:
Hyperparameter Optimization in Binary Communication Networks for Neuromorphic Deployment. IJCNN 2020: 1-9 - [c3]Catherine D. Schuman, J. Parker Mitchell, J. Travis Johnston, Maryam Parsa, Bill Kay, Prasanna Date, Robert M. Patton:
Resilience and Robustness of Spiking Neural Networks for Neuromorphic Systems. IJCNN 2020: 1-10 - [c2]Bill Kay, Prasanna Date, Catherine D. Schuman:
Neuromorphic Graph Algorithms: Extracting Longest Shortest Paths and Minimum Spanning Trees. NICE 2020: 6:1-6:6 - [i5]Maryam Parsa, Catherine D. Schuman, Prasanna Date, Derek C. Rose, Bill Kay, J. Parker Mitchell, Steven R. Young, Ryan Dellana, William Severa, Thomas E. Potok, Kaushik Roy:
Hyperparameter Optimization in Binary Communication Networks for Neuromorphic Deployment. CoRR abs/2005.04171 (2020) - [i4]Miki E. Verma, Michael D. Iannacone, Robert A. Bridges, Samuel C. Hollifield, Bill Kay, Frank L. Combs:
ROAD: The Real ORNL Automotive Dynamometer Controller Area Network Intrusion Detection Dataset (with a comprehensive CAN IDS dataset survey & guide). CoRR abs/2012.14600 (2020)
2010 – 2019
- 2019
- [j9]Andrii Arman, Bill Kay, Vojtech Rödl:
A note on weak delta systems. Discret. Math. 342(11): 3034-3042 (2019) - [c1]Steven R. Young, Pravallika Devineni, Maryam Parsa, J. Travis Johnston, Bill Kay, Robert M. Patton, Catherine D. Schuman, Derek C. Rose, Thomas E. Potok:
Evolving Energy Efficient Convolutional Neural Networks. IEEE BigData 2019: 4479-4485 - [i3]Anthony Bonato, Huda Chuangpishit, Sean English, Bill Kay, Erin Meger:
The Iterated Local Model for Social Networks. CoRR abs/1903.04523 (2019) - 2018
- [j8]Dwight Duffus, Bill Kay, Vojtech Rödl:
The Minimum Number of Edges in Uniform Hypergraphs with Property O. Comb. Probab. Comput. 27(4): 531-538 (2018) - 2017
- [j7]Michael Ferrara, Bill Kay, Lucas Kramer, Ryan R. Martin, Benjamin Reiniger, Heather C. Smith, Eric Sullivan:
The saturation number of induced subposets of the Boolean lattice. Discret. Math. 340(10): 2479-2487 (2017) - [j6]Christian Avart, Bill Kay, Christian Reiher, Vojtech Rödl:
The chromatic number of finite type-graphs. J. Comb. Theory B 122: 877-896 (2017) - 2016
- [j5]Aaron Dutle, Bill Kay:
Graph odometry. Discret. Appl. Math. 214: 108-115 (2016) - [j4]Samuel Connolly, Zachary Gabor, Anant P. Godbole, Bill Kay, Thomas Kelly:
Bounds on the maximum number of minimum dominating sets. Discret. Math. 339(5): 1537-1542 (2016) - 2014
- [j3]André Alexander Campbell, Anant P. Godbole, Bill Kay:
Contributions to the Theory of de Bruijn Cycle. Integers 14A: A2 (2014) - 2013
- [j2]Taylor F. Allison, Anant P. Godbole, Kathryn M. Hawley, Bill Kay:
Covering n-Permutations with (n+1)-Permutations. Electron. J. Comb. 20(1): 6 (2013) - 2012
- [i2]Aaron Dutle, Bill Kay:
Graph Odometry. CoRR abs/1211.2151 (2012) - 2011
- [i1]Joshua N. Cooper, Bill Kay:
Graham's Tree Reconstruction Conjecture and a Waring-Type Problem on Partitions. CoRR abs/1109.0522 (2011) - 2010
- [j1]Greg Brockman, Bill Kay, Emma E. Snively:
On Universal Cycles of Labeled Graphs. Electron. J. Comb. 17(1) (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint