<?xml version="1.0"?>
<dblpperson name="John Hale" pid="76/2017" n="88">
<person key="homepages/76/2017" mdate="2009-06-09">
<author pid="76/2017">John Hale</author>
</person>
<r><inproceedings key="conf/sigcse/CrispH26" mdate="2026-02-25">
<author orcid="0009-0007-0266-6542" pid="427/0870">Timothy Crisp</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Words Matter: Integrating Adaptive Cybersecurity Phraseology in K-12 Education Subjects to Improve Cyber Hygiene.</title>
<pages>239-245</pages>
<year>2026</year>
<booktitle>SIGCSE (1)</booktitle>
<ee>https://doi.org/10.1145/3770762.3772600</ee>
<crossref>conf/sigcse/2026-1</crossref>
<url>db/conf/sigcse/sigcse2026-1.html#CrispH26</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dtpi/HartKTH25" mdate="2025-07-30">
<author pid="332/5946">Jacob Hart</author>
<author pid="369/0334">Bridget Kurr</author>
<author pid="213/1707">Akram Taghavi-Burris</author>
<author pid="76/2017">John Hale</author>
<title>See Spot Run: Real-Time Monitoring and Control of Boston Dynamics Spot from Virtual Reality.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>DTPI</booktitle>
<ee>https://doi.org/10.1109/DTPI65196.2025.11088828</ee>
<crossref>conf/dtpi/2025</crossref>
<url>db/conf/dtpi/dtpi2025.html#HartKTH25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2508-12161" mdate="2025-09-16">
<author pid="181/2821">Ming Li</author>
<author pid="76/2017">John Hale</author>
<title>Attack Graph Generation on HPC Clusters.</title>
<year>2025</year>
<month>August</month>
<volume>abs/2508.12161</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2508.12161</ee>
<url>db/journals/corr/corr2508.html#abs-2508-12161</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/coling/ZhangHRVL24" mdate="2024-05-23">
<author pid="47/4989">Shulin Zhang</author>
<author pid="76/2017">John Hale</author>
<author pid="140/2687">Margaret E. L. Renwick</author>
<author pid="375/7314">Zvjezdana Vrzic</author>
<author pid="375/6818">Keith Langston</author>
<title>An Evaluation of Croatian ASR Models for &#268;akavian Transcription.</title>
<pages>1098-1104</pages>
<year>2024</year>
<booktitle>LREC/COLING</booktitle>
<ee type="oa">https://aclanthology.org/2024.lrec-main.98</ee>
<crossref>conf/coling/2024</crossref>
<url>db/conf/coling/coling2024.html#ZhangHRVL24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2310-19626" mdate="2026-02-23">
<author pid="242/6218">Zhengliang Liu</author>
<author pid="48/9884-2">Yiwei Li 0002</author>
<author pid="88/8174">Qian Cao</author>
<author pid="89/5032">Junwen Chen</author>
<author pid="342/2844">Tianze Yang</author>
<author pid="185/2651-1">Zihao Wu 0001</author>
<author pid="76/2017">John Hale</author>
<author pid="184/7223">John Gibbs</author>
<author pid="r/KhaledRasheed">Khaled Rasheed</author>
<author pid="145/4489-1">Ninghao Liu 0001</author>
<author pid="151/5583">Gengchen Mai</author>
<author pid="96/5013-1">Tianming Liu 0001</author>
<title>Transformation vs Tradition: Artificial General Intelligence (AGI) for Arts and Humanities.</title>
<year>2023</year>
<volume>abs/2310.19626</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2310.19626</ee>
<url>db/journals/corr/corr2310.html#abs-2310-19626</url>
</article>
</r>
<r><article key="journals/dtrap/LiHH22" mdate="2026-03-24">
<author pid="181/2821">Ming Li</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Strategies for Practical Hybrid Attack Graph Generation and Analysis.</title>
<pages>41:1-41:24</pages>
<year>2022</year>
<volume>3</volume>
<journal>DTRAP</journal>
<number>4</number>
<ee>https://doi.org/10.1145/3491257</ee>
<ee>https://www.wikidata.org/entity/Q131122043</ee>
<url>db/journals/dtrap/dtrap3.html#LiHH22</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2209-07961" mdate="2026-04-07">
<author pid="47/4989">Shulin Zhang</author>
<author orcid="0000-0002-5210-6224" pid="88/3600">Jixing Li</author>
<author pid="76/2017">John Hale</author>
<title>Quantifying Discourse Support for Omitted Pronouns.</title>
<year>2022</year>
<volume>abs/2209.07961</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2209.07961</ee>
<url>db/journals/corr/corr2209.html#abs-2209-07961</url>
</article>
</r>
<r><inproceedings key="conf/ipps/LiHH20" mdate="2024-10-06">
<author pid="181/2821">Ming Li</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Implementing an Attack Graph Generator in CUDA.</title>
<pages>730-738</pages>
<year>2020</year>
<booktitle>IPDPS Workshops</booktitle>
<ee>https://doi.org/10.1109/IPDPSW50202.2020.00128</ee>
<crossref>conf/ipps/2020w</crossref>
<url>db/conf/ipps/ipdps2020w.html#LiHH20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/HillHPH19" mdate="2024-10-06">
<author pid="215/2405">Zachary Hill</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<title>Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor.</title>
<pages>22-27</pages>
<year>2019</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2019.00011</ee>
<crossref>conf/icdis/2019</crossref>
<url>db/conf/icdis/icdis2019.html#HillHPH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/HillHPH19a" mdate="2024-10-06">
<author pid="215/2405">Zachary Hill</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<title>Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols.</title>
<pages>82-88</pages>
<year>2019</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2019.00020</ee>
<crossref>conf/icdis/2019</crossref>
<url>db/conf/icdis/icdis2019.html#HillHPH19a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/LiHH19" mdate="2024-10-06">
<author pid="181/2821">Ming Li</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Concurrency Strategies for Attack Graph Generation.</title>
<pages>174-179</pages>
<year>2019</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2019.00033</ee>
<crossref>conf/icdis/2019</crossref>
<url>db/conf/icdis/icdis2019.html#LiHH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/WestHPH19" mdate="2024-10-06">
<author orcid="0009-0008-6891-7516" pid="94/6464">Jonathan West</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<title>Automatic Identification of Critical Digital Assets.</title>
<pages>219-224</pages>
<year>2019</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2019.00040</ee>
<crossref>conf/icdis/2019</crossref>
<url>db/conf/icdis/icdis2019.html#WestHPH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/xsede/LiHH19" mdate="2024-10-06">
<author pid="181/2821">Ming Li</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster.</title>
<pages>5:1-5:6</pages>
<year>2019</year>
<booktitle>PEARC</booktitle>
<ee>https://doi.org/10.1145/3332186.3333059</ee>
<crossref>conf/xsede/2019</crossref>
<url>db/conf/xsede/pearc2019.html#LiHH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/xsede/HawrylakLHP19" mdate="2024-10-06">
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author pid="06/7508">George Louthan</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<title>Practical Cyber-Security Solutions for the Science DMZ.</title>
<pages>50:1-50:6</pages>
<year>2019</year>
<booktitle>PEARC</booktitle>
<ee>https://doi.org/10.1145/3332186.3332213</ee>
<crossref>conf/xsede/2019</crossref>
<url>db/conf/xsede/pearc2019.html#HawrylakLHP19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acl/ClarkDBYKH18" mdate="2021-08-06">
<author pid="176/5185">Adhiguna Kuncoro</author>
<author pid="41/6895">Chris Dyer</author>
<author pid="76/2017">John Hale</author>
<author pid="08/8178">Dani Yogatama</author>
<author pid="12/336">Stephen Clark</author>
<author pid="96/4705">Phil Blunsom</author>
<title>LSTMs Can Learn Syntax-Sensitive Dependencies Well, But Modeling Structure Makes Them Better.</title>
<pages>1426-1436</pages>
<year>2018</year>
<booktitle>ACL (1)</booktitle>
<ee type="oa">https://aclanthology.org/P18-1132/</ee>
<ee type="oa">https://doi.org/10.18653/v1/P18-1132</ee>
<crossref>conf/acl/2018-1</crossref>
<url>db/conf/acl/acl2018-1.html#ClarkDBYKH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acllaw/BhattasaliFH18" mdate="2021-08-06">
<author pid="166/1718">Shohini Bhattasali</author>
<author pid="225/5863">Murielle Fabre</author>
<author pid="76/2017">John Hale</author>
<title>Processing MWEs: Neurocognitive Bases of Verbal MWEs and Lexical Cohesiveness within MWEs.</title>
<pages>6-17</pages>
<year>2018</year>
<booktitle>LAW-MWE-CxG@COLING</booktitle>
<ee type="oa">https://aclanthology.org/W18-4904/</ee>
<crossref>conf/acllaw/2018</crossref>
<url>db/conf/acllaw/law2018.html#BhattasaliFH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/RavalMSDHH18" mdate="2024-10-06">
<author pid="238/4590">Rujit Raval</author>
<author pid="238/4595">Alison Maskus</author>
<author pid="238/4583">Benjamin Saltmiras</author>
<author pid="238/4575">Morgan Dunn</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Competitive Learning Environment for Cyber-Physical System Security Experimentation.</title>
<pages>211-218</pages>
<year>2018</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2018.00042</ee>
<crossref>conf/icdis/2018</crossref>
<url>db/conf/icdis/icdis2018.html#RavalMSDHH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/TaylorKSCAH18" mdate="2024-10-06">
<author pid="207/6561">Shay Taylor</author>
<author pid="238/4579">Tabor Kvasnicka</author>
<author pid="87/3716">Thomas Shaw</author>
<author pid="178/3642">Kyle Cook</author>
<author pid="207/6606">Jim Arrowood</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>A Platform for Experimentation with and Measurement of Reflective Deception.</title>
<pages>242-245</pages>
<year>2018</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2018.00046</ee>
<crossref>conf/icdis/2018</crossref>
<url>db/conf/icdis/icdis2018.html#TaylorKSCAH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/NicholsHHHP18" mdate="2024-10-06">
<author pid="172/4798">Will Nichols</author>
<author pid="215/2405">Zachary Hill</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<title>Automatic Generation of Attack Scripts from Attack Graphs.</title>
<pages>267-274</pages>
<year>2018</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2018.00050</ee>
<crossref>conf/icdis/2018</crossref>
<url>db/conf/icdis/icdis2018.html#NicholsHHHP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/ShawAKTCH17" mdate="2024-10-06">
<author pid="87/3716">Thomas Shaw</author>
<author pid="207/6606">James Arrowood</author>
<author pid="207/6579">Michael Kvasnicka</author>
<author pid="207/6561">Shay Taylor</author>
<author pid="178/3642">Kyle Cook</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>POSTER: Evaluating Reflective Deception as a Malware Mitigation Strategy.</title>
<pages>2575-2577</pages>
<year>2017</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3133956.3138833</ee>
<crossref>conf/ccs/2017</crossref>
<url>db/conf/ccs/ccs2017.html#ShawAKTCH17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/HillCWPHH17" mdate="2024-10-06">
<author pid="215/2405">Zachary Hill</author>
<author pid="49/8561">Samuel Chen</author>
<author pid="215/2404">Donald Wall</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<title>Simulation and analysis framework for cyber-physical systems.</title>
<pages>7:1-7:4</pages>
<year>2017</year>
<booktitle>CISRC</booktitle>
<ee>https://doi.org/10.1145/3064814.3064827</ee>
<crossref>conf/csiirw/2017</crossref>
<url>db/conf/csiirw/cisrc2017.html#HillCWPHH17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/NicholsHHP17" mdate="2024-10-06">
<author pid="172/4798">Will Nichols</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<title>Introducing priority into hybrid attack graphs.</title>
<pages>12:1-12:4</pages>
<year>2017</year>
<booktitle>CISRC</booktitle>
<ee>https://doi.org/10.1145/3064814.3064826</ee>
<crossref>conf/csiirw/2017</crossref>
<url>db/conf/csiirw/cisrc2017.html#NicholsHHP17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/xsede/HawrylakHP17" mdate="2025-01-19">
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<title>Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.</title>
<pages>53:1-53:4</pages>
<year>2017</year>
<booktitle>PEARC</booktitle>
<ee>https://doi.org/10.1145/3093338.3093355</ee>
<ee>https://www.wikidata.org/entity/Q131126713</ee>
<crossref>conf/xsede/2017</crossref>
<url>db/conf/xsede/pearc2017.html#HawrylakHP17</url>
</inproceedings>
</r>
<r><article key="journals/llc/Hale16" mdate="2020-06-05">
<author pid="76/2017">John Hale</author>
<title>Information-theoretical Complexity Metrics.</title>
<pages>397-412</pages>
<year>2016</year>
<volume>10</volume>
<journal>Lang. Linguistics Compass</journal>
<number>9</number>
<ee>https://doi.org/10.1111/lnc3.12196</ee>
<url>db/journals/llc/llc10.html#Hale16</url>
</article>
</r>
<r><inproceedings key="conf/csiirw/CookSHH16" mdate="2024-10-06">
<author pid="178/3642">Kyle Cook</author>
<author pid="87/3716">Thomas Shaw</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Scalable Attack Graph Generation.</title>
<pages>21:1-21:4</pages>
<year>2016</year>
<booktitle>CISRC</booktitle>
<ee>https://doi.org/10.1145/2897795.2897821</ee>
<crossref>conf/csiirw/2016</crossref>
<url>db/conf/csiirw/cisrc2016.html#CookSHH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/SmithCSHH16" mdate="2024-10-06">
<author pid="178/3739">Bailey Smith</author>
<author pid="178/3659">Whitney Caruthers</author>
<author pid="178/3670">Dalton Stewart</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Network Modeling for Security Analytics.</title>
<pages>22:1-22:4</pages>
<year>2016</year>
<booktitle>CISRC</booktitle>
<ee>https://doi.org/10.1145/2897795.2897817</ee>
<crossref>conf/csiirw/2016</crossref>
<url>db/conf/csiirw/cisrc2016.html#SmithCSHH16</url>
</inproceedings>
</r>
<r><article key="journals/concurrency/KongBH15" mdate="2024-10-06">
<author pid="18/4891-2">Liang Kong 0002</author>
<author pid="148/1314">Gavin Bauer</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Robust wireless signal indoor localization.</title>
<pages>2839-2850</pages>
<year>2015</year>
<volume>27</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>11</number>
<ee>https://doi.org/10.1002/cpe.3443</ee>
<url>db/journals/concurrency/concurrency27.html#KongBH15</url>
</article>
</r>
<r><inproceedings key="conf/icws/HaleGHHLW15" mdate="2024-10-06">
<author pid="98/9655">Matthew L. Hale</author>
<author pid="25/2193">Rose F. Gamble</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="191/3747">Charles Haney</author>
<author pid="167/3743">Jessica Lin</author>
<author pid="191/3733">Charles Walter</author>
<title>Measuring the Potential for Victimization in Malicious Content.</title>
<pages>305-312</pages>
<year>2015</year>
<booktitle>ICWS</booktitle>
<ee>https://doi.org/10.1109/ICWS.2015.49</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICWS.2015.49</ee>
<crossref>conf/icws/2015</crossref>
<url>db/conf/icws/icws2015.html#HaleGHHLW15</url>
</inproceedings>
</r>
<r><incollection key="books/sp/15/HillWH15" mdate="2024-10-06">
<author pid="176/2616">Dalvin Hill</author>
<author pid="176/2618">Joseph Walker</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Privacy Considerations for Health Information Exchanges.</title>
<pages>289-311</pages>
<year>2015</year>
<booktitle>Medical Data Privacy Handbook</booktitle>
<ee>https://doi.org/10.1007/978-3-319-23633-9_12</ee>
<crossref>books/sp/GL2015</crossref>
<url>db/books/collections/GL2015.html#HillWH15</url>
</incollection>
</r>
<r><incollection key="books/sp/15/SchimkeH15" mdate="2017-05-16">
<author pid="67/9838">Nakeisha Schimke</author>
<author pid="76/2017">John Hale</author>
<title>Privacy Considerations and Techniques for Neuroimages.</title>
<pages>527-547</pages>
<year>2015</year>
<booktitle>Medical Data Privacy Handbook</booktitle>
<ee>https://doi.org/10.1007/978-3-319-23633-9_20</ee>
<crossref>books/sp/GL2015</crossref>
<url>db/books/collections/GL2015.html#SchimkeH15</url>
</incollection>
</r>
<r><incollection key="books/sp/15/HawrylakH15" mdate="2017-06-14">
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author pid="76/2017">John Hale</author>
<title>Data Privacy Issues with RFID in Healthcare.</title>
<pages>549-567</pages>
<year>2015</year>
<booktitle>Medical Data Privacy Handbook</booktitle>
<ee>https://doi.org/10.1007/978-3-319-23633-9_21</ee>
<crossref>books/sp/GL2015</crossref>
<url>db/books/collections/GL2015.html#HawrylakH15</url>
</incollection>
</r>
<r><inproceedings key="conf/csiirw/LouthanHHHH14" mdate="2024-10-06">
<author pid="06/7508">George Louthan</author>
<author pid="47/1666">Michael Haney</author>
<author pid="124/0400">Phoebe Hardwicke</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Hybrid extensions for stateful attack graphs.</title>
<pages>101-104</pages>
<year>2014</year>
<booktitle>CISR</booktitle>
<ee>https://doi.org/10.1145/2602087.2602106</ee>
<crossref>conf/csiirw/2014</crossref>
<url>db/conf/csiirw/cisr2014.html#LouthanHHHH14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/KongBH14" mdate="2024-10-06">
<author pid="18/4891-2">Liang Kong 0002</author>
<author pid="148/1314">Gavin Bauer</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Location-based device grouping for function restriction.</title>
<pages>113-116</pages>
<year>2014</year>
<booktitle>CISR</booktitle>
<ee>https://doi.org/10.1145/2602087.2602099</ee>
<crossref>conf/csiirw/2014</crossref>
<url>db/conf/csiirw/cisr2014.html#KongBH14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/ButlerRHH13" mdate="2024-10-06">
<author pid="92/4404-3">Matthew Butler 0003</author>
<author pid="141/1891">Steven Reed</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Implementing graceful RFID privilege reduction.</title>
<pages>54</pages>
<year>2013</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/2459976.2460037</ee>
<crossref>conf/csiirw/2013</crossref>
<url>db/conf/csiirw/csiirw2013.html#ButlerRHH13</url>
</inproceedings>
</r>
<r><article key="journals/ijcmam/MatlockSKMH12" mdate="2022-11-17">
<author orcid="0000-0003-3087-4027" pid="157/4319">Matt Matlock</author>
<author pid="67/9838">Nakeisha Schimke</author>
<author pid="18/4891-2">Liang Kong 0002</author>
<author pid="128/6254">Stephen Macke</author>
<author pid="76/2017">John Hale</author>
<title>Systematic Redaction for Neuroimage Data.</title>
<pages>63-75</pages>
<year>2012</year>
<volume>3</volume>
<journal>Int. J. Comput. Model. Algorithms Medicine</journal>
<number>2</number>
<ee>https://doi.org/10.4018/jcmam.2012040104</ee>
<ee>https://www.wikidata.org/entity/Q30687499</ee>
<url>db/journals/ijcmam/ijcmam3.html#MatlockSKMH12</url>
</article>
</r>
<r><article key="journals/jms/HawrylakSHP12" mdate="2024-10-06">
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author pid="67/9838">Nakeisha Schimke</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<title>Security Risks Associated with Radio Frequency Identification in Medical Environments.</title>
<pages>3491-3505</pages>
<year>2012</year>
<volume>36</volume>
<journal>J. Medical Syst.</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s10916-011-9792-0</ee>
<ee>https://www.wikidata.org/entity/Q82317303</ee>
<url>db/journals/jms/jms36.html#HawrylakSHP12</url>
</article>
</r>
<r><inproceedings key="conf/cts/KongHG12" mdate="2024-10-06">
<author pid="18/4891-2">Liang Kong 0002</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="18/5586">David Greer</author>
<title>Spatial identity awareness: Towards secure collaborative environments.</title>
<pages>478-484</pages>
<year>2012</year>
<booktitle>CTS</booktitle>
<ee>https://doi.org/10.1109/CTS.2012.6261093</ee>
<crossref>conf/cts/2012</crossref>
<url>db/conf/cts/cts2012.html#KongHG12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fg/KobeleGH12" mdate="2018-11-02">
<author pid="53/606">Gregory M. Kobele</author>
<author orcid="0000-0001-5989-1360" pid="86/9061">Sabrina Gerth</author>
<author pid="76/2017">John Hale</author>
<title>Memory Resource Allocation in Top-Down Minimalist Parsing.</title>
<pages>32-51</pages>
<year>2012</year>
<booktitle>FG</booktitle>
<ee>https://doi.org/10.1007/978-3-642-39998-5_3</ee>
<crossref>conf/fg/2013</crossref>
<url>db/conf/fg/fg2013.html#KobeleGH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/SchimkeH12" mdate="2021-02-01">
<author pid="67/9838">Nakeisha Schimke</author>
<author pid="76/2017">John Hale</author>
<title>Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes.</title>
<year>2012</year>
<booktitle>HealthSec</booktitle>
<ee type="oa">https://www.usenix.org/conference/healthsec12/workshop-program/presentation/le</ee>
<crossref>conf/uss/2012healthsec</crossref>
<url>db/conf/uss/healthsec2012.html#SchimkeH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/ButlerHH11" mdate="2024-10-06">
<author pid="92/4404-3">Matthew Butler 0003</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Graceful privilege reduction in RFID security.</title>
<pages>47</pages>
<year>2011</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/2179298.2179349</ee>
<crossref>conf/csiirw/2011</crossref>
<url>db/conf/csiirw/csiirw2011.html#ButlerHH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/LouthanHHH11" mdate="2024-10-06">
<author pid="06/7508">George Louthan</author>
<author pid="124/0400">Phoebe Hardwicke</author>
<author orcid="0000-0003-3268-7452" pid="77/3519">Peter J. Hawrylak</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Toward hybrid attack dependency graphs.</title>
<pages>62</pages>
<year>2011</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/2179298.2179368</ee>
<crossref>conf/csiirw/2011</crossref>
<url>db/conf/csiirw/csiirw2011.html#LouthanHHH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/HarbortLH11" mdate="2024-10-06">
<author pid="124/0363">Zach Harbort</author>
<author pid="06/7508">George Louthan</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Techniques for attack graph visualization and interaction.</title>
<pages>74</pages>
<year>2011</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/2179298.2179383</ee>
<crossref>conf/csiirw/2011</crossref>
<url>db/conf/csiirw/csiirw2011.html#HarbortLH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/SchimkeKH11" mdate="2024-10-06">
<author pid="67/9838">Nakeisha Schimke</author>
<author pid="79/9838">Mary Kuehler</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Preserving Privacy in Structural Neuroimages.</title>
<pages>301-308</pages>
<year>2011</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2011</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-22348-8_26</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2011/SchimkeKH11.pdf</ee>
<url>db/conf/dbsec/dbsec2011.html#SchimkeKH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/SchimkeH11" mdate="2021-02-01">
<author pid="67/9838">Nakeisha Schimke</author>
<author pid="76/2017">John Hale</author>
<title>Quickshear Defacing for Neuroimages.</title>
<year>2011</year>
<booktitle>HealthSec</booktitle>
<ee type="oa">https://www.usenix.org/conference/healthsec11/quickshear-defacing-neuroimages</ee>
<crossref>conf/uss/2011healthsec</crossref>
<url>db/conf/uss/healthsec2011.html#SchimkeH11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/LouthanRBH10" mdate="2021-02-01">
<author pid="06/7508">George Louthan</author>
<author pid="145/3000">Warren Roberts</author>
<author pid="92/4404-3">Matthew Butler 0003</author>
<author pid="76/2017">John Hale</author>
<title>The Blunderdome: An Offensive Exercise for Building Network, Systems, and Web Security Awareness.</title>
<year>2010</year>
<booktitle>CSET</booktitle>
<ee type="oa">https://www.usenix.org/conference/cset10/blunderdome-offensive-exercise-building-network-systems-and-web-security-awareness</ee>
<crossref>conf/uss/2010cset</crossref>
<url>db/conf/uss/cset2010.html#LouthanRBH10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/SchimkeKH10" mdate="2021-02-01">
<author pid="67/9838">Nakeisha Schimke</author>
<author pid="79/9838">Mary Kuehler</author>
<author pid="76/2017">John Hale</author>
<title>On Resolving the Privacy Debate in Deidentified Neuroimages.</title>
<year>2010</year>
<booktitle>HealthSec</booktitle>
<ee type="oa">https://www.usenix.org/conference/healthsec10/resolving-privacy-debate-deidentified-neuroimages</ee>
<crossref>conf/uss/2010healthsec</crossref>
<url>db/conf/uss/healthsec2010.html#SchimkeKH10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wikis/GehresSLH10" mdate="2024-10-06">
<author pid="85/8308">Peter Gehres</author>
<author pid="78/6707">Nathan Singleton</author>
<author pid="06/7508">George Louthan</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Toward sensitive information redaction in a collaborative, multilevel security environment.</title>
<year>2010</year>
<booktitle>Int. Sym. Wikis</booktitle>
<ee>https://doi.org/10.1145/1832772.1832793</ee>
<ee>https://www.wikidata.org/entity/Q66709307</ee>
<crossref>conf/wikis/2010</crossref>
<url>db/conf/wikis/wikis2010.html#GehresSLH10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/bicob/TyreeKSFH09" mdate="2024-10-06">
<author pid="60/1032">Stephen Tyree</author>
<author pid="43/5519">Rayus Kuplicki</author>
<author pid="17/6706">Trevor Sarratt</author>
<author pid="42/157">Scott Fujan</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>GridSPiM: A Framework for Simple Locality and Containment in the Stochastic pi-Calculus.</title>
<pages>409-423</pages>
<year>2009</year>
<booktitle>BICoB</booktitle>
<ee>https://doi.org/10.1007/978-3-642-00727-9_38</ee>
<crossref>conf/bicob/2009</crossref>
<url>db/conf/bicob/bicob2009.html#TyreeKSFH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/LouthanDWH09" mdate="2024-10-06">
<author pid="06/7508">George Louthan</author>
<author pid="124/0937">Brady Deetz</author>
<author pid="89/4318">Matthew Walker</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Content-based alternatives to conventional network monitoring systems.</title>
<pages>67</pages>
<year>2009</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/1558607.1558684</ee>
<crossref>conf/csiirw/2009</crossref>
<url>db/conf/csiirw/csiirw2009.html#LouthanDWH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ic/LouthanMJH09" mdate="2016-09-20">
<author pid="06/7508">George Louthan</author>
<author pid="78/7505">Collin McMillan</author>
<author pid="92/4840-4">Christopher Johnson 0004</author>
<author pid="76/2017">John Hale</author>
<title>Toward Robust and Extensible Automatic Protocol Identification.</title>
<pages>104-108</pages>
<year>2009</year>
<booktitle>International Conference on Internet Computing</booktitle>
<crossref>conf/ic/2009</crossref>
<url>db/conf/ic/icomp2009.html#LouthanMJH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwpt/Hale09" mdate="2021-08-06">
<author pid="76/2017">John Hale</author>
<title>Heuristic search in a cognitive model of human parsing.</title>
<pages>230-233</pages>
<year>2009</year>
<booktitle>IWPT</booktitle>
<ee type="oa">https://aclanthology.org/W09-3837/</ee>
<crossref>conf/iwpt/2009</crossref>
<url>db/conf/iwpt/iwpt2009.html#Hale09</url>
</inproceedings>
</r>
<r><article key="journals/jdfp/ManesJBHDH08" mdate="2024-10-06">
<author pid="27/4947">Gavin Wylie Manes</author>
<author pid="40/1898">James Johnson</author>
<author pid="91/5581">Alex Barclay</author>
<author pid="89/4658">Michael Harvey</author>
<author pid="01/3882">Elizabeth Downing</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Issues and Techniques for Redacting PDF Files.</title>
<pages>113-116</pages>
<year>2008</year>
<volume>2</volume>
<journal>J. Digit. Forensic Pract.</journal>
<number>3</number>
<ee>https://doi.org/10.1080/15567280802385485</ee>
<url>db/journals/jdfp/jdfp2.html#ManesJBHDH08</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ClarkSTH08" mdate="2024-10-06">
<author pid="78/6661">Kevin Clark</author>
<author pid="43/329">Ethan Singleton</author>
<author pid="60/1032">Stephen Tyree</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>Strata-Gem: risk assessment through mission modeling.</title>
<pages>51-58</pages>
<year>2008</year>
<booktitle>QoP</booktitle>
<ee>https://doi.org/10.1145/1456362.1456374</ee>
<crossref>conf/ccs/2008qop</crossref>
<url>db/conf/ccs/qop2008.html#ClarkSTH08</url>
</inproceedings>
</r>
<r><article key="journals/jnsm/HaleB07" mdate="2024-10-06">
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="22/6781">Paul Brusil</author>
<title>Secur(e/ity) Management: A Continuing Uphill Climb.</title>
<pages>525-553</pages>
<year>2007</year>
<volume>15</volume>
<journal>J. Netw. Syst. Manag.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10922-007-9079-4</ee>
<url>db/journals/jnsm/jnsm15.html#HaleB07</url>
</article>
</r>
<r><article key="journals/jolli/Hale07" mdate="2020-09-17">
<author pid="76/2017">John Hale</author>
<title>Book Review.</title>
<pages>217-220</pages>
<year>2007</year>
<volume>16</volume>
<journal>J. Log. Lang. Inf.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10849-006-9027-9</ee>
<url>db/journals/jolli/jolli16.html#Hale07</url>
</article>
</r>
<r><inproceedings key="conf/ifip11-9/BarclayWGHM07" mdate="2024-10-06">
<author pid="91/5581">Alex Barclay</author>
<author pid="33/4303">L. Watson</author>
<author pid="18/5586">David Greer</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="27/4947">Gavin Manes</author>
<title>Redacting Digital Information from Electronic Devices.</title>
<pages>205-214</pages>
<year>2007</year>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<ee type="oa">https://doi.org/10.1007/978-0-387-73742-3_14</ee>
<ee type="oa">http://dl.ifip.org/db/conf/ifip11-9/df2007/BarclayWGHM07.pdf</ee>
<crossref>conf/ifip11-9/2007</crossref>
<url>db/conf/ifip11-9/df2007.html#BarclayWGHM07</url>
</inproceedings>
</r>
<r><article key="journals/cogsci/Hale06" mdate="2020-06-04">
<author pid="76/2017">John Hale</author>
<title>Uncertainty About the Rest of the Sentence.</title>
<pages>643-672</pages>
<year>2006</year>
<volume>30</volume>
<journal>Cogn. Sci.</journal>
<number>4</number>
<ee>https://doi.org/10.1207/s15516709cog0000_64</ee>
<ee>https://www.wikidata.org/entity/Q46170028</ee>
<url>db/journals/cogsci/cogsci30.html#Hale06</url>
</article>
</r>
<r><inproceedings key="conf/acl/HaleSYDHKLLRSS06" mdate="2024-08-04">
<author pid="76/2017">John Hale</author>
<author pid="66/3591">Izhak Shafran</author>
<author pid="87/1851">Lisa Yung</author>
<author orcid="0000-0003-4356-5813" pid="d/BonnieJDorr">Bonnie J. Dorr</author>
<author pid="h/MPHarper">Mary P. Harper</author>
<author pid="96/6622">Anna Krasnyanskaya</author>
<author orcid="0000-0002-0056-2834" pid="29/239">Matthew Lease</author>
<author pid="51/3710-4">Yang Liu 0004</author>
<author pid="09/246">Brian Roark</author>
<author pid="92/2011">Matthew G. Snover</author>
<author pid="80/6220">Robin Stewart</author>
<title>PCFGs with Syntactic and Prosodic Indicators of Speech Repairs.</title>
<year>2006</year>
<crossref>conf/acl/2006</crossref>
<booktitle>ACL</booktitle>
<ee type="oa">https://aclanthology.org/P06-1021/</ee>
<ee>https://doi.org/10.3115/1220175.1220196</ee>
<ee>https://www.wikidata.org/entity/Q60143200</ee>
<url>db/conf/acl/acl2006.html#HaleSYDHKLLRSS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icassp/RoarkLHSLSSDHKY06" mdate="2020-06-22">
<author pid="09/246">Brian Roark</author>
<author pid="51/3710-4">Yang Liu 0004</author>
<author pid="h/MPHarper">Mary P. Harper</author>
<author pid="80/6220">Robin Stewart</author>
<author pid="29/239">Matthew Lease</author>
<author pid="92/2011">Matthew G. Snover</author>
<author pid="66/3591">Izhak Shafran</author>
<author pid="d/BonnieJDorr">Bonnie J. Dorr</author>
<author pid="76/2017">John Hale</author>
<author pid="96/6622">Anna Krasnyanskaya</author>
<author pid="87/1851">Lisa Yung</author>
<title>Reranking for Sentence Boundary Detection in Conversational Speech.</title>
<pages>545-548</pages>
<year>2006</year>
<booktitle>ICASSP (1)</booktitle>
<ee>https://doi.org/10.1109/ICASSP.2006.1660078</ee>
<crossref>conf/icassp/2006</crossref>
<url>db/conf/icassp/icassp2006.html#RoarkLHSLSSDHKY06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lrec/RoarkHCDJK0OHKL06" mdate="2019-08-19">
<author pid="09/246">Brian Roark</author>
<author pid="h/MPHarper">Mary P. Harper</author>
<author pid="c/ECharniak">Eugene Charniak</author>
<author pid="d/BonnieJDorr">Bonnie J. Dorr</author>
<author pid="75/6632-1">Mark Johnson 0001</author>
<author pid="03/6339">Jeremy G. Kahn</author>
<author pid="51/3710-4">Yang Liu 0004</author>
<author pid="85/2189">Mari Ostendorf</author>
<author pid="76/2017">John Hale</author>
<author pid="96/6622">Anna Krasnyanskaya</author>
<author pid="29/239">Matthew Lease</author>
<author pid="66/3591">Izhak Shafran</author>
<author pid="92/2011">Matthew G. Snover</author>
<author pid="80/6220">Robin Stewart</author>
<author pid="87/1851">Lisa Yung</author>
<title>SParseval: Evaluation Metrics for Parsing Speech.</title>
<pages>333-338</pages>
<year>2006</year>
<booktitle>LREC</booktitle>
<ee type="oa">http://www.lrec-conf.org/proceedings/lrec2006/summaries/116.html</ee>
<crossref>conf/lrec/2006</crossref>
<url>db/conf/lrec/lrec2006.html#RoarkHCDJK0OHKL06</url>
</inproceedings>
</r>
<r><article key="journals/jnsm/BrusilH05" mdate="2024-10-06">
<author pid="22/6781">Paul Brusil</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>The Shifting Sands of Security Management.</title>
<pages>241-245</pages>
<year>2005</year>
<volume>13</volume>
<journal>J. Netw. Syst. Manag.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10922-005-6261-5</ee>
<url>db/journals/jnsm/jnsm13.html#BrusilH05</url>
</article>
</r>
<r><article key="journals/jnsm/HaleB04" mdate="2020-09-24">
<author pid="76/2017">John Hale</author>
<author pid="22/6781">Paul Brusil</author>
<title>Secur(e/ity) Management: Two Sides of the Same Coin.</title>
<year>2004</year>
<volume>12</volume>
<journal>J. Netw. Syst. Manag.</journal>
<number>1</number>
<url>db/journals/jnsm/jnsm12.html#HaleB04</url>
<ee>https://doi.org/10.1023/B:JONS.0000015933.75374.77</ee>
<pages>1-8</pages>
</article>
</r>
<r><inproceedings key="conf/iwia/DawkinsH04" mdate="2024-10-06">
<author pid="97/303">Jerald Dawkins</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>A Systematic Approach to Multi-Stage Network Attack Analysis.</title>
<pages>48-58</pages>
<year>2004</year>
<crossref>conf/iwia/2004</crossref>
<booktitle>IWIA</booktitle>
<ee>https://doi.org/10.1109/IWIA.2004.1288037</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IWIA.2004.1288037</ee>
<url>db/conf/iwia/iwia2004.html#DawkinsH04</url>
</inproceedings>
</r>
<r><article key="journals/jcs/HalePS03" mdate="2024-10-06">
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Programmable Access Control.</title>
<pages>331-352</pages>
<year>2003</year>
<volume>11</volume>
<journal>J. Comput. Secur.</journal>
<number>3</number>
<url>db/journals/jcs/jcs11.html#HalePS03</url>
<ee>https://doi.org/10.3233/jcs-2003-11304</ee>
<ee>https://www.wikidata.org/entity/Q114944214</ee>
</article>
</r>
<r><inproceedings key="conf/sec/PapaBHS03" mdate="2003-04-25">
<author pid="46/4926">Mauricio Papa</author>
<author pid="63/5782">Oliver Bremer</author>
<author pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Integrating Logics and Process Calculi for Cryptographic Protocol Analysis.</title>
<pages>349-360</pages>
<year>2003</year>
<crossref>conf/sec/2003</crossref>
<booktitle>SEC</booktitle>
<url>db/conf/sec/sec2003.html#PapaBHS03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/CampbellDPFHP02" mdate="2003-08-27">
<author pid="21/1672">Clinton Campbell</author>
<author pid="97/303">Jerald Dawkins</author>
<author pid="32/1745">Brandon Pollet</author>
<author pid="62/6984">Kenneth Fitch</author>
<author pid="76/2017">John Hale</author>
<author pid="46/4926">Mauricio Papa</author>
<title>On Modeling Computer Networks for Vulnerability Analysis.</title>
<pages>233-244</pages>
<year>2002</year>
<crossref>conf/dbsec/2002</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2002.html#CampbellDPFHP02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/MagillSPH02" mdate="2003-08-27">
<author pid="30/5360">Stephen Magill</author>
<author pid="05/2708">Bradley Skaggs</author>
<author pid="46/4926">Mauricio Papa</author>
<author pid="76/2017">John Hale</author>
<title>Implementation and Verification of Programmable Security.</title>
<pages>285-299</pages>
<year>2002</year>
<crossref>conf/dbsec/2002</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2002.html#MagillSPH02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/LorenzKMHS01" mdate="2005-04-08">
<author pid="70/1329">G. Lorenz</author>
<author pid="45/3473">J. Keller</author>
<author pid="27/4947">Gavin Manes</author>
<author pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Public Telephone Network Vulnerabilities.</title>
<pages>151-164</pages>
<year>2001</year>
<crossref>conf/dbsec/2001</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2001.html#LorenzKMHS01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isads/PapaBHS01" mdate="2024-10-06">
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author pid="63/5782">Oliver Bremer</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Formal Analysis of E-Commerce Protocols.</title>
<pages>19-28</pages>
<year>2001</year>
<crossref>conf/isads/2001</crossref>
<booktitle>ISADS</booktitle>
<ee>https://doi.org/10.1109/ISADS.2001.917391</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISADS.2001.917391</ee>
<url>db/conf/isads/isads2001.html#PapaBHS01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/naacl/Hale01" mdate="2021-08-06">
<author pid="76/2017">John Hale</author>
<title>A Probabilistic Earley Parser as a Psycholinguistic Model.</title>
<year>2001</year>
<crossref>conf/naacl/2001</crossref>
<booktitle>NAACL</booktitle>
<ee type="oa">https://aclanthology.org/N01-1021/</ee>
<url>db/conf/naacl/naacl2001.html#Hale01</url>
</inproceedings>
</r>
<r><article key="journals/jcs/HaleTS00" mdate="2024-10-06">
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="80/126">Jody Threet</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>A Ticket-Based Access Control Architecture for Object Systems.</title>
<year>2000</year>
<volume>8</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<url>db/journals/jcs/jcs8.html#HaleTS00</url>
<ee>https://doi.org/10.3233/jcs-2000-8103</ee>
<ee>https://www.wikidata.org/entity/Q114944353</ee>
<pages>43-65</pages>
</article>
</r>
<r><inproceedings key="conf/acsac/HalePBCS00" mdate="2024-10-06">
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author pid="63/5782">Oliver Bremer</author>
<author pid="80/668">Rodrigo Chandia</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Extending Java for Package based Access Control.</title>
<pages>67-76</pages>
<year>2000</year>
<crossref>conf/acsac/2000</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/ACSAC.2000.898859</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ACSAC.2000.898859</ee>
<url>db/conf/acsac/acsac2000.html#HalePBCS00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/GaliassoBHSFH00" mdate="2024-10-06">
<author pid="95/1819">Pablo Galiasso</author>
<author pid="63/5782">Oliver Bremer</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<author pid="38/4159">David F. Ferraiolo</author>
<author pid="46/5248">Vincent C. Hu</author>
<title>Policy Mediation for Multi-Enterprise Environments.</title>
<pages>100-106</pages>
<year>2000</year>
<crossref>conf/acsac/2000</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/ACSAC.2000.898863</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ACSAC.2000.898863</ee>
<url>db/conf/acsac/acsac2000.html#GaliassoBHSFH00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/PapaBMHS00" mdate="2017-05-26">
<author pid="46/4926">Mauricio Papa</author>
<author pid="63/5782">Oliver Bremer</author>
<author pid="30/5360">Stephen Magill</author>
<author pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Simulation and Analysis of Cryptographic Protocols.</title>
<pages>89-100</pages>
<year>2000</year>
<crossref>conf/dbsec/2000</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2000.html#PapaBMHS00</url>
<ee>https://doi.org/10.1007/0-306-47008-X_8</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/HaleCCS00" mdate="2017-05-26">
<author pid="76/2017">John Hale</author>
<author pid="80/668">Rodrigo Chandia</author>
<author pid="21/1672">Clinton Campbell</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Language Extensions for Programmable Security.</title>
<pages>221-232</pages>
<year>2000</year>
<crossref>conf/dbsec/2000</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2000.html#HaleCCS00</url>
<ee>https://doi.org/10.1007/0-306-47008-X_20</ee>
</inproceedings>
</r>
<r><proceedings key="conf/dbsec/1999" mdate="2002-01-03">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="76/2017">John Hale</editor>
<title>Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA</title>
<booktitle>DBSec</booktitle>
<series href="db/series/ifip/index.html">IFIP Conference Proceedings</series>
<volume>171</volume>
<publisher>Kluwer</publisher>
<year>2000</year>
<isbn>0-7923-7848-2</isbn>
<url>db/conf/dbsec/dbsec99.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/acsac/HaleGPS99" mdate="2024-10-06">
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="95/1819">Pablo Galiasso</author>
<author orcid="0009-0000-5628-0548" pid="46/4926">Mauricio Papa</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Security Policy Coordination for Heterogeneous Information Systems.</title>
<pages>219-228</pages>
<year>1999</year>
<crossref>conf/acsac/1999</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1999.816031</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.1999.816031</ee>
<url>db/conf/acsac/acsac1999.html#HaleGPS99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acl-vlc/GeHC98" mdate="2021-08-06">
<author pid="36/5940">Niyu Ge</author>
<author pid="76/2017">John Hale</author>
<author pid="c/ECharniak">Eugene Charniak</author>
<title>A Statistical Approach to Anaphora Resolution.</title>
<year>1998</year>
<booktitle>VLC@COLING/ACL</booktitle>
<ee type="oa">https://aclanthology.org/W98-1119/</ee>
<crossref>conf/acl-vlc/1998</crossref>
<url>db/conf/acl-vlc/acl-vlc1998.html#GeHC98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/HalePS98" mdate="2002-10-21">
<author pid="76/2017">John Hale</author>
<author pid="46/4926">Mauricio Papa</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Programmable Security for Object-Oriented Systems.</title>
<pages>109-123</pages>
<year>1998</year>
<crossref>conf/dbsec/1998</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec98.html#HalePS98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/HaleTS97" mdate="2002-10-24">
<author pid="76/2017">John Hale</author>
<author pid="80/126">Jody Threet</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Capability-Based Primitives for Access Control in Object-Oriented Systems.</title>
<pages>134-148</pages>
<year>1997</year>
<crossref>conf/dbsec/1997</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec97.html#HaleTS97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/BerrymanRPHTS97" mdate="2002-10-24">
<author pid="72/389">M. Berryman</author>
<author pid="38/6947">C. Rummel</author>
<author pid="46/4926">Mauricio Papa</author>
<author pid="76/2017">John Hale</author>
<author pid="80/126">Jody Threet</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.</title>
<pages>385-388</pages>
<year>1997</year>
<crossref>conf/dbsec/1997</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec97.html#BerrymanRPHTS97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/HaleS97" mdate="2023-09-21">
<author pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.</title>
<pages>188-199</pages>
<year>1997</year>
<crossref>conf/sp/1997</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.1997.601333</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1997.601333</ee>
<url>db/conf/sp/sp1997.html#HaleS97</url>
</inproceedings>
</r>
<r><article key="journals/dke/HaleS96" mdate="2024-10-06">
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>Analyzing FD Inference in Relational Databases.</title>
<pages>167-183</pages>
<year>1996</year>
<volume>18</volume>
<journal>Data Knowl. Eng.</journal>
<number>2</number>
<url>db/journals/dke/dke18.html#HaleS96</url>
<ee>https://doi.org/10.1016/0169-023X(95)00033-O</ee>
</article>
</r>
<r><inproceedings key="conf/dbsec/HalleTS96" mdate="2010-09-04">
<author pid="76/2017">John Hale</author>
<author pid="80/126">Jody Threet</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>A Framework for High Assurance Security of Distributed Objects.</title>
<pages>101-119</pages>
<year>1996</year>
<crossref>conf/dbsec/1996</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec96.html#HalleTS96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/RathJHS95" mdate="2002-10-24">
<author pid="67/3181">Surath Rath</author>
<author pid="23/5285">Dominic Jones</author>
<author pid="76/2017">John Hale</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>A Tool for Inference Detection and Knowledge Discovery in Databases.</title>
<pages>317-332</pages>
<year>1995</year>
<crossref>conf/dbsec/1995</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec95.html#RathJHS95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aaai/SenSH94" mdate="2023-09-04">
<author pid="19/1004">Sandip Sen</author>
<author pid="08/1783">Mahendra Sekaran</author>
<author pid="76/2017">John Hale</author>
<title>Learning to Coordinate without Sharing Information.</title>
<pages>426-431</pages>
<year>1994</year>
<crossref>conf/aaai/1994-1</crossref>
<booktitle>AAAI</booktitle>
<url>db/conf/aaai/aaai94-1.html#SenSH94</url>
<ee type="archive">http://www.aaai.org/Library/AAAI/1994/aaai94-065.php</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/HaleTS94" mdate="2002-01-03">
<author pid="76/2017">John Hale</author>
<author pid="80/126">Jody Threet</author>
<author pid="72/2300">Sujeet Shenoi</author>
<title>A Practical Formalism for Imprecise Inference Control.</title>
<pages>139-156</pages>
<year>1994</year>
<crossref>conf/dbsec/1994</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec94.html#HaleTS94</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/CorcoranH94" mdate="2024-10-06">
<author pid="84/94">Arthur L. Corcoran</author>
<author orcid="0000-0002-5956-8093" pid="76/2017">John Hale</author>
<title>A genetic algorithm for fragment allocation in a distributed database system.</title>
<pages>247-250</pages>
<year>1994</year>
<crossref>conf/sac/1994</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/326619.326738</ee>
<url>db/conf/sac/sac1994.html#CorcoranH94</url>
</inproceedings>
</r>
<coauthors n="128" nc="9">
<co c="0" n="2"><na f="a/Arrowood:James" pid="207/6606">James Arrowood</na><na>Jim Arrowood</na></co>
<co c="0"><na f="a/Atluri:Vijayalakshmi" pid="a/VAtluri">Vijayalakshmi Atluri</na></co>
<co c="0"><na f="b/Barclay:Alex" pid="91/5581">Alex Barclay</na></co>
<co c="0"><na f="b/Bauer:Gavin" pid="148/1314">Gavin Bauer</na></co>
<co c="0"><na f="b/Berryman:M=" pid="72/389">M. Berryman</na></co>
<co c="7"><na f="b/Bhattasali:Shohini" pid="166/1718">Shohini Bhattasali</na></co>
<co c="1"><na f="b/Blunsom:Phil" pid="96/4705">Phil Blunsom</na></co>
<co c="0"><na f="b/Bremer:Oliver" pid="63/5782">Oliver Bremer</na></co>
<co c="-1"><na f="b/Brusil:Paul" pid="22/6781">Paul Brusil</na></co>
<co c="0"><na f="b/Butler_0003:Matthew" pid="92/4404-3">Matthew Butler 0003</na></co>
<co c="0"><na f="c/Campbell:Clinton" pid="21/1672">Clinton Campbell</na></co>
<co c="2"><na f="c/Cao:Qian" pid="88/8174">Qian Cao</na></co>
<co c="0"><na f="c/Caruthers:Whitney" pid="178/3659">Whitney Caruthers</na></co>
<co c="0"><na f="c/Chandia:Rodrigo" pid="80/668">Rodrigo Chandia</na></co>
<co c="1"><na f="c/Charniak:Eugene" pid="c/ECharniak">Eugene Charniak</na></co>
<co c="2"><na f="c/Chen:Junwen" pid="89/5032">Junwen Chen</na></co>
<co c="0"><na f="c/Chen:Samuel" pid="49/8561">Samuel Chen</na></co>
<co c="3"><na f="c/Clark:Kevin" pid="78/6661">Kevin Clark</na></co>
<co c="1"><na f="c/Clark:Stephen" pid="12/336">Stephen Clark</na></co>
<co c="0"><na f="c/Cook:Kyle" pid="178/3642">Kyle Cook</na></co>
<co c="0"><na f="c/Corcoran:Arthur_L=" pid="84/94">Arthur L. Corcoran</na></co>
<co c="-1"><na f="c/Crisp:Timothy" pid="427/0870">Timothy Crisp</na></co>
<co c="0"><na f="d/Dawkins:Jerald" pid="97/303">Jerald Dawkins</na></co>
<co c="0"><na f="d/Deetz:Brady" pid="124/0937">Brady Deetz</na></co>
<co c="1"><na f="d/Dorr:Bonnie_J=" pid="d/BonnieJDorr">Bonnie J. Dorr</na></co>
<co c="0"><na f="d/Downing:Elizabeth" pid="01/3882">Elizabeth Downing</na></co>
<co c="0"><na f="d/Dunn:Morgan" pid="238/4575">Morgan Dunn</na></co>
<co c="1"><na f="d/Dyer:Chris" pid="41/6895">Chris Dyer</na></co>
<co c="7"><na f="f/Fabre:Murielle" pid="225/5863">Murielle Fabre</na></co>
<co c="0"><na f="f/Ferraiolo:David_F=" pid="38/4159">David F. Ferraiolo</na></co>
<co c="0"><na f="f/Fitch:Kenneth" pid="62/6984">Kenneth Fitch</na></co>
<co c="3"><na f="f/Fujan:Scott" pid="42/157">Scott Fujan</na></co>
<co c="0"><na f="g/Galiasso:Pablo" pid="95/1819">Pablo Galiasso</na></co>
<co c="0"><na f="g/Gamble:Rose_F=" pid="25/2193">Rose F. Gamble</na></co>
<co c="1"><na f="g/Ge:Niyu" pid="36/5940">Niyu Ge</na></co>
<co c="0"><na f="g/Gehres:Peter" pid="85/8308">Peter Gehres</na></co>
<co c="8"><na f="g/Gerth:Sabrina" pid="86/9061">Sabrina Gerth</na></co>
<co c="2"><na f="g/Gibbs:John" pid="184/7223">John Gibbs</na></co>
<co c="0"><na f="g/Greer:David" pid="18/5586">David Greer</na></co>
<co c="0"><na f="h/Hale:Matthew_L=" pid="98/9655">Matthew L. Hale</na></co>
<co c="0"><na f="h/Haney:Charles" pid="191/3747">Charles Haney</na></co>
<co c="0"><na f="h/Haney:Michael" pid="47/1666">Michael Haney</na></co>
<co c="0"><na f="h/Harbort:Zach" pid="124/0363">Zach Harbort</na></co>
<co c="0"><na f="h/Hardwicke:Phoebe" pid="124/0400">Phoebe Hardwicke</na></co>
<co c="1"><na f="h/Harper:Mary_P=" pid="h/MPHarper">Mary P. Harper</na></co>
<co c="5"><na f="h/Hart:Jacob" pid="332/5946">Jacob Hart</na></co>
<co c="0"><na f="h/Harvey:Michael" pid="89/4658">Michael Harvey</na></co>
<co c="0"><na f="h/Hawrylak:Peter_J=" pid="77/3519">Peter J. Hawrylak</na></co>
<co c="6"><na f="h/Hill:Dalvin" pid="176/2616">Dalvin Hill</na></co>
<co c="0"><na f="h/Hill:Zachary" pid="215/2405">Zachary Hill</na></co>
<co c="0"><na f="h/Hu:Vincent_C=" pid="46/5248">Vincent C. Hu</na></co>
<co c="0"><na f="j/Johnson:James" pid="40/1898">James Johnson</na></co>
<co c="1"><na f="j/Johnson_0001:Mark" pid="75/6632-1">Mark Johnson 0001</na></co>
<co c="0"><na f="j/Jones:Dominic" pid="23/5285">Dominic Jones</na></co>
<co c="1"><na f="k/Kahn:Jeremy_G=" pid="03/6339">Jeremy G. Kahn</na></co>
<co c="0"><na f="k/Keller:J=" pid="45/3473">J. Keller</na></co>
<co c="8"><na f="k/Kobele:Gregory_M=" pid="53/606">Gregory M. Kobele</na></co>
<co c="0"><na f="k/Kong_0002:Liang" pid="18/4891-2">Liang Kong 0002</na></co>
<co c="1"><na f="k/Krasnyanskaya:Anna" pid="96/6622">Anna Krasnyanskaya</na></co>
<co c="0"><na f="k/Kuehler:Mary" pid="79/9838">Mary Kuehler</na></co>
<co c="1"><na f="k/Kuncoro:Adhiguna" pid="176/5185">Adhiguna Kuncoro</na></co>
<co c="3"><na f="k/Kuplicki:Rayus" pid="43/5519">Rayus Kuplicki</na></co>
<co c="5"><na f="k/Kurr:Bridget" pid="369/0334">Bridget Kurr</na></co>
<co c="0"><na f="k/Kvasnicka:Michael" pid="207/6579">Michael Kvasnicka</na></co>
<co c="0"><na f="k/Kvasnicka:Tabor" pid="238/4579">Tabor Kvasnicka</na></co>
<co c="4"><na f="l/Langston:Keith" pid="375/6818">Keith Langston</na></co>
<co c="1"><na f="l/Lease:Matthew" pid="29/239">Matthew Lease</na></co>
<co c="4"><na f="l/Li:Jixing" pid="88/3600">Jixing Li</na></co>
<co c="0"><na f="l/Li:Ming" pid="181/2821">Ming Li</na></co>
<co c="2"><na f="l/Li_0002:Yiwei" pid="48/9884-2">Yiwei Li 0002</na></co>
<co c="0"><na f="l/Lin:Jessica" pid="167/3743">Jessica Lin</na></co>
<co c="2"><na f="l/Liu_0001:Ninghao" pid="145/4489-1">Ninghao Liu 0001</na></co>
<co c="2"><na f="l/Liu_0001:Tianming" pid="96/5013-1">Tianming Liu 0001</na></co>
<co c="1"><na f="l/Liu_0004:Yang" pid="51/3710-4">Yang Liu 0004</na></co>
<co c="2"><na f="l/Liu:Zhengliang" pid="242/6218">Zhengliang Liu</na></co>
<co c="0"><na f="l/Lorenz:G=" pid="70/1329">G. Lorenz</na></co>
<co c="0"><na f="l/Louthan:George" pid="06/7508">George Louthan</na></co>
<co c="0"><na f="m/Macke:Stephen" pid="128/6254">Stephen Macke</na></co>
<co c="0"><na f="m/Magill:Stephen" pid="30/5360">Stephen Magill</na></co>
<co c="2"><na f="m/Mai:Gengchen" pid="151/5583">Gengchen Mai</na></co>
<co c="0" n="2"><na f="m/Manes:Gavin_Wylie" pid="27/4947">Gavin Wylie Manes</na><na>Gavin Manes</na></co>
<co c="0" n="2"><na f="m/Markiewicz:Christopher_J=" pid="92/4840-4">Christopher J. Markiewicz</na><na>Christopher Johnson 0004</na></co>
<co c="0"><na f="m/Maskus:Alison" pid="238/4595">Alison Maskus</na></co>
<co c="0" n="2"><na f="m/Matlock:Matthew_K=" pid="157/4319">Matthew K. Matlock</na><na>Matt Matlock</na></co>
<co c="0"><na f="m/McMillan:Collin" pid="78/7505">Collin McMillan</na></co>
<co c="0"><na f="n/Nichols:Will" pid="172/4798">Will Nichols</na></co>
<co c="1"><na f="o/Ostendorf:Mari" pid="85/2189">Mari Ostendorf</na></co>
<co c="0"><na f="p/Papa:Mauricio" pid="46/4926">Mauricio Papa</na></co>
<co c="0"><na f="p/Pollet:Brandon" pid="32/1745">Brandon Pollet</na></co>
<co c="2"><na f="r/Rasheed:Khaled" pid="r/KhaledRasheed">Khaled Rasheed</na></co>
<co c="0"><na f="r/Rath:Surath" pid="67/3181">Surath Rath</na></co>
<co c="0"><na f="r/Raval:Rujit" pid="238/4590">Rujit Raval</na></co>
<co c="0"><na f="r/Reed:Steven" pid="141/1891">Steven Reed</na></co>
<co c="4"><na f="r/Renwick:Margaret_E=_L=" pid="140/2687">Margaret E. L. Renwick</na></co>
<co c="1"><na f="r/Roark:Brian" pid="09/246">Brian Roark</na></co>
<co c="0"><na f="r/Roberts:Warren" pid="145/3000">Warren Roberts</na></co>
<co c="0"><na f="r/Rummel:C=" pid="38/6947">C. Rummel</na></co>
<co c="0"><na f="s/Saltmiras:Benjamin" pid="238/4583">Benjamin Saltmiras</na></co>
<co c="3"><na f="s/Sarratt:Trevor" pid="17/6706">Trevor Sarratt</na></co>
<co c="0"><na f="s/Schimke:Nakeisha" pid="67/9838">Nakeisha Schimke</na></co>
<co c="0"><na f="s/Sekaran:Mahendra" pid="08/1783">Mahendra Sekaran</na></co>
<co c="0"><na f="s/Sen:Sandip" pid="19/1004">Sandip Sen</na></co>
<co c="1"><na f="s/Shafran:Izhak" pid="66/3591">Izhak Shafran</na></co>
<co c="0"><na f="s/Shaw:Thomas" pid="87/3716">Thomas Shaw</na></co>
<co c="0"><na f="s/Shenoi:Sujeet" pid="72/2300">Sujeet Shenoi</na></co>
<co c="3"><na f="s/Singleton:Ethan" pid="43/329">Ethan Singleton</na></co>
<co c="0"><na f="s/Singleton:Nathan" pid="78/6707">Nathan Singleton</na></co>
<co c="0"><na f="s/Skaggs:Bradley" pid="05/2708">Bradley Skaggs</na></co>
<co c="0"><na f="s/Smith:Bailey" pid="178/3739">Bailey Smith</na></co>
<co c="1"><na f="s/Snover:Matthew_G=" pid="92/2011">Matthew G. Snover</na></co>
<co c="0"><na f="s/Stewart:Dalton" pid="178/3670">Dalton Stewart</na></co>
<co c="1"><na f="s/Stewart:Robin" pid="80/6220">Robin Stewart</na></co>
<co c="5"><na f="t/Taghavi=Burris:Akram" pid="213/1707">Akram Taghavi-Burris</na></co>
<co c="0"><na f="t/Taylor:Shay" pid="207/6561">Shay Taylor</na></co>
<co c="0"><na f="t/Threet:Jody" pid="80/126">Jody Threet</na></co>
<co c="3"><na f="t/Tyree:Stephen" pid="60/1032">Stephen Tyree</na></co>
<co c="4"><na f="v/Vrzic:Zvjezdana" pid="375/7314">Zvjezdana Vrzic</na></co>
<co c="6"><na f="w/Walker:Joseph" pid="176/2618">Joseph Walker</na></co>
<co c="0"><na f="w/Walker:Matthew" pid="89/4318">Matthew Walker</na></co>
<co c="0"><na f="w/Wall:Donald" pid="215/2404">Donald Wall</na></co>
<co c="0"><na f="w/Walter:Charles" pid="191/3733">Charles Walter</na></co>
<co c="0"><na f="w/Watson:L=" pid="33/4303">L. Watson</na></co>
<co c="0"><na f="w/West:Jonathan" pid="94/6464">Jonathan West</na></co>
<co c="2"><na f="w/Wu_0001:Zihao" pid="185/2651-1">Zihao Wu 0001</na></co>
<co c="2"><na f="y/Yang:Tianze" pid="342/2844">Tianze Yang</na></co>
<co c="1"><na f="y/Yogatama:Dani" pid="08/8178">Dani Yogatama</na></co>
<co c="1"><na f="y/Yung:Lisa" pid="87/1851">Lisa Yung</na></co>
<co c="4"><na f="z/Zhang:Shulin" pid="47/4989">Shulin Zhang</na></co>
</coauthors>
</dblpperson>

