David J. Thuente

2023 journal article

Better health - A comprehensive and profound research about physical strength consumption estimation methods using machine learning

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 45(6), 9387–9402.

By: L. Lang*, D. Thuente n & X. Ma

co-author countries: China 🇨🇳
author keywords: Human health; intelligent wearable devices; strength consumption estimation; pattern recognition
Source: Web Of Science
Added: February 12, 2024

2017 conference paper

Extensions and improvements of jump-stay rendezvous algorithms for cognitive radios

International conference on selected topics in mobile and wireless, 77–84.

By: Z. Li n & D. Thuente n

co-author countries: China 🇨🇳
Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

NEAT: Network link emulation with adaptive time dilation

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 104, 88–98.

By: H. Lee n, M. Sichitiu n & D. Thuente n

author keywords: Network emulation; Time dilation; Virtual time; Distributed system; Virtual machines; KVM; QEMU
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 conference paper

Rain gardens: understanding their benefits and their beauty (c)

Proceedings of the 2015 annual meeting of the international plant propagators' society, 1140, 409–412.

By: E. Riley & H. Kraus

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

High-performance emulation of heterogeneous systems using adaptive time dilation

INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 29(2), 166–183.

By: H. Lee n, M. Sichitiu n & D. Thuente n

author keywords: Emulation; time dilation; virtual time; virtualization; virtual machines; testbeds; heterogeneous systems; distributed applications
Sources: Web Of Science, ORCID
Added: August 6, 2018

2013 conference paper

Priority inversion and queue management for 802.11 priority WLANs

2013 IEEE Consumer Communications and Networking Conference (CCNC), 565–573.

By: W. Formyduval n & D. Thuente n

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Enhanced security of random seed DSSS algorithms against seed jamming attacks

2012 ieee global communications conference (globecom), 801–806.

By: Y. Oh n & D. Thuente n

Source: NC State University Libraries
Added: August 6, 2018

2011 article

Contextual Decision Making in General Game Playing

2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011), pp. 679–684.

By: X. Sheng n & D. Thuente n

author keywords: General Game Playing; decision tree; machine learning; decision making
Source: Web Of Science
Added: August 6, 2018

2011 conference paper

Jamming attacks in 802.11g-a cognitive radio based approach

2011 - Milcom 2011 Military Communications Conference, 1219–1224.

By: S. Prasad n & D. Thuente n

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.