Publications

2014

  • [PDF] D. R. Thompson, J. Di, and M. K. Daugherty, “Teaching RFID information systems security,” IEEE Trans. Education, vol. 57, iss. 1, pp. 42-47, 2014.
    [Bibtex]
    @ARTICLE{ 9046,
    AUTHOR    = {Dale R. Thompson and Jia Di and Michael K. Daugherty}, 
    TITLE     = {Teaching RFID information systems security},
    JOURNAL   = {IEEE Trans. Education},
    YEAR      = {2014},
    Volume    = {57},
    Number    = {1},
    Pages     = {42--47},
    Month     = {Feb.}
    %Note      = {},
    %Key       = {}
    }
  • [PDF] B. A. Alsaify, D. R. Thompson, and J. Di, “Exploiting hidden Markov Models in identifying passive UHF RFID tags,” in Proceedings of the IEEE Radio and Wireless Symposium (RWS), Newport Beach, California, USA, 2014, pp. 259-261.
    [Bibtex]
    @INPROCEEDINGS{9047,
        author={Baha A. Alsaify and Dale R. Thompson and Jia Di},
        title={Exploiting hidden {Markov} Models in identifying passive {UHF} {RFID} tags},
        booktitle={Proceedings of the IEEE Radio and Wireless Symposium (RWS)},
        year={2014},
        month={Jan. 19--22},
        volume={},
        number={},
        pages={259--261},
        address={Newport Beach, California, USA}}
  • [DOI] M. Rothmeyer, D. R. Thompson, and M. Moccaro, “The SMS Chaum Mix,” The Journal of Computer and Communications, vol. 2, iss. 4, pp. 66-76, 2014.
    [Bibtex]
    @ARTICLE{ 9048,
    AUTHOR    = {Matthew Rothmeyer and Dale R. Thompson and Matthew Moccaro}, 
    TITLE     = {The SMS Chaum Mix},
    JOURNAL   = {The Journal of Computer and Communications},
    YEAR      = {2014},
    Volume    = {2},
    Number    = {4},
    Pages     = {66--76},
    Month     = {Mar.},
    doi = {10.4236/jcc.2014.24010},
    url={http://dx.doi.org/10.4236/jcc.2014.24010}
    %Note      = {},
    %Key       = {}
    }

2013

  • W. Cilio, M. Linder, C. Porter, J. Di, D. R. Thompson, and S. C. Smith, “Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic,” Microelectronics Journal, vol. 44, iss. 3, pp. 258-269, 2013.
    [Bibtex]
    @ARTICLE{ 9045,
    AUTHOR    = {Washington Cilio and Michael Linder and Chris Porter and Jia Di and Dale R. Thompson and Scott C. Smith}, 
    TITLE     = {Mitigating power- and timing-based side-channel attacks using dual-spacer dual-rail delay-insensitive asynchronous logic},
    JOURNAL   = {Microelectronics Journal},
    YEAR      = {2013},
    Volume    = {44},
    Number    = {3},
    Pages     = {258--269},
    Month     = {Mar.}
    %Note      = {http://www.sciencedirect.com/science/article/pii/S0026269212002418},
    %Key       = {}
    }

2012

  • J. Di and D. R. Thompson, “Security for RFID tags,” in Introduction to Hardware Security and Trust, M. Tehranipoor and C. Wang, Eds., New York: Springer, 2012, pp. 283-304.
    [Bibtex]
    @InCollection{9040,
      author     =    {Jia Di and Dale R. Thompson},
      title      =    {Security for {RFID} tags},
      booktitle  =    {Introduction to Hardware Security and Trust},
      pages      =   {283--304},
      publisher  =   {Springer},
      year       =   2012,
      editor     =   {Mohammed Tehranipoor and Cliff Wang},
      address    =   {New York}
    }
  • [PDF] B. A. Alsaify, D. R. Thompson, and J. Di, “Identifying passive UHF RFID tags using signal features at different tari durations,” in Proceedings of the IEEE International Conference on RFID (IEEE RFID), Orlando, Florida, USA, 2012, pp. 40-46.
    [Bibtex]
    @INPROCEEDINGS{9043,
        author={Baha A. Alsaify and Dale R. Thompson and Jia Di},
        title={Identifying passive {UHF} {RFID} tags using signal features at different tari durations},
        booktitle={Proceedings of the IEEE International Conference on {RFID} (IEEE RFID)},
        year={2012},
        month={April 3--5},
        volume={},
        number={},
        pages={40 - 46},
        address={Orlando, Florida, USA}}
  • D. Banerjee, J. Li, J. Di, and D. R. Thompson, “Feature selection for RFID tag identification,” in Proceedings of the International Conference on Communications and Networking (Chinacom), Kunming, China, 2012.
    [Bibtex]
    @INPROCEEDINGS{9044,
        author={Debrup Banerjee and Jiang Li and Jia Di and Dale R. Thompson},
        title={Feature selection for {RFID} tag identification},
        booktitle={Proceedings of the International Conference on Communications and Networking (Chinacom)},
        year={2012},
        month={Aug. 8-10},
        volume={},
        number={},
        pages={},
        address={Kunming, China},
        note={Best paper}}

2011

  • [PDF] S. C. G. Periaswamy, D. R. Thompson, and J. Di, “Fingerprinting RFID Tags,” IEEE Trans. Dependable and Secure Computing, vol. 8, iss. 6, pp. 938-943, 2011.
    [Bibtex]
    @ARTICLE{9036,
      author = {Senthilkumar Chinnappa Gounder Periaswamy and Dale R. Thompson and Jia Di},
      title = {Fingerprinting {RFID} Tags},
      journal = {IEEE Trans. Dependable and Secure Computing},
      year = {2011},
      volume = {8},
      pages = {938-943},
      number = {6},
      month = {Nov./Dec.},
      doi = {},
      issn = {}
    }
  • [PDF] B. A. Alsaify and D. R. Thompson, Fingerprinting RFID tags using timing measurements, 2011.
    [Bibtex]
    @misc{9042,
      title = {Fingerprinting {RFID} tags using timing measurements},
      author = {Baha A. Alsaify and Dale R. Thompson},
      howpublished = {poster at {IEEE} {RFID}},
      year = {2011},
      month = {Apr. 12-14}
      %address = {Orlando, Florida, USA}
    }

2010

  • B. Alsaify and D. R. Thompson, “Pendulum: an energy efficient protocol for wireless sensor networks,” in Proceedings of IEEE Sensors Applications Symposium (SAS), Limerick, Ireland, 2010, pp. 273-277.
    [Bibtex]
    @INPROCEEDINGS{9037,
        author={Baha Alsaify and Dale R. Thompson},
        title={Pendulum: an energy efficient protocol for wireless sensor networks},
        booktitle={Proceedings of IEEE Sensors Applications Symposium (SAS)},
        year={2010},
        month={Feb. 23--25},
        volume={},
        number={},
        pages={273--277},
        address={Limerick, Ireland}
    }
  • [PDF] S. C. G. Periaswamy, D. R. Thompson, H. P. Romero, and J. Di, “Fingerprinting radio frequency identification tags using timing characteristics,” in Proceedings of the Workshop on RFID Security (RFIDsec’10), Singapore, 2010, pp. 73-82.
    [Bibtex]
    @INPROCEEDINGS{9038,
        author={Senthilkumar Chinnappa Gounder Periaswamy and Dale R. Thompson and Henry P. Romero and Jia Di},
        title={Fingerprinting radio frequency identification tags using timing characteristics},
        booktitle={Proceedings of the Workshop on {RFID} Security (RFIDsec'10)},
        year={2010},
        month={Feb. 22--23},
        volume={},
        number={},
        pages={73--82},
        address={Singapore}
    }
  • W. Cilio, M. Linder, C. Porter, J. Di, S. C. Smith, and D. R. Thompson, “Side-channel attack mitigation using dual-spacer dual-rail delay-insensitive logic (D3L),” in Proceedings of the IEEE SoutheastCon, Concord, NC, USA, 2010, pp. 471-474.
    [Bibtex]
    @INPROCEEDINGS{9039,
        author={Washington Cilio and Michael Linder and Chris Porter and Jia Di and Scott C. Smith and Dale R. Thompson},
        title={Side-channel attack mitigation using dual-spacer dual-rail delay-insensitive logic (D3L)},
        booktitle={Proceedings of the IEEE SoutheastCon},
        year={2010},
        month={Mar. 18--21},
        volume={},
        number={},
        pages={471--474},
        address={Concord, NC, USA}}

2009

  • [PDF] N. Saparkhojayev and D. R. Thompson, “Matching electronic fingerprints of RFID tags using the Hotelling’s algorithm,” in Proceedings of IEEE Sensors Applications Symposium (SAS), New Orleans, LA, USA, 2009, pp. 19-24.
    [Bibtex]
    @INPROCEEDINGS{9034,
        author={Nurbek Saparkhojayev and Dale R. Thompson},
        title={Matching electronic fingerprints of RFID tags using the Hotelling's algorithm},
        booktitle={Proceedings of IEEE Sensors Applications Symposium (SAS)},
        year={2009},
        month={Feb. 17--19},
        volume={},
        number={},
        pages={19--24},
        address={New Orleans, LA, USA}
    }
  • D. R. Thompson, “Teaching RFID information systems security to non-RF students,” in Proceedings of IEEE Wireless and Microwave Technology Conference (WAMICON), Clearwater, FL, USA, 2009, pp. 1-2.
    [Bibtex]
    @INPROCEEDINGS{9035,
        author={Dale R. Thompson},
        title={Teaching {RFID} information systems security to non-RF students},
        booktitle={Proceedings of IEEE Wireless and Microwave Technology Conference (WAMICON)},
        year={2009},
        month={Apr. 20--21},
        volume={},
        number={},
        pages={1--2},
        address={Clearwater, FL, USA}
    }

2008

  • RFID INFOSEC, 2008.
    [Bibtex]
    @misc{9032,
      title = {RFID INFOSEC},
      year = {2008},
      howpublished = {\url{http://rfidsecurity.uark.edu}},
      note = {Accessed: 2008}
    }
  • [PDF] S. C. G. Periaswamy, D. R. Thompson, and J. Di, “Ownership transfer RFID tags based on electronic fingerprint,” in Proceedings of the International Conference on Security and Management (SAM), Las Vegas, Nevada, USA, 2008, pp. 64-67.
    [Bibtex]
    @INPROCEEDINGS{9033,
        author={Senthilkumar Chinnappa Gounder Periaswamy and Dale R. Thompson and Jia Di},
        title={Ownership transfer RFID tags based on electronic fingerprint},
        booktitle={Proceedings of the International Conference on Security and Management (SAM)},
        year={2008},
        month={July 14--17},
        volume={},
        number={},
        pages={64--67},
        address={Las Vegas, Nevada, USA}
    }

2007

  • [PDF] J. Uudmae, H. Sunkara, D. R. Thompson, S. Bruce, and J. Penumarthi, “MIXNET for radio frequency identification,” in Proceedings of the IEEE Region 5 Technical Conference, Fayetteville, Arkansas, USA, 2007, pp. 382-385.
    [Bibtex]
    @INPROCEEDINGS{9028,
        author={Jaanus Uudmae and Harshitha Sunkara and Dale R. Thompson and Sean Bruce and Jayamadhuri Penumarthi},
        title={MIXNET for radio frequency identification},
        booktitle={Proceedings of the IEEE Region 5 Technical Conference},
        address={Fayetteville, Arkansas, USA},
        month={Apr. 20--21},
        year={2007},
        pages={382--385},
        volume={},
        number={}
    }
  • [PDF] M. Byers, A. Lofton, A. K. Vangari-Balraj, and D. R. Thompson, “Brute force attack of EPCglobal UHF class-1 generation-2 RFID tag,” in Proceedings of the IEEE Region 5 Technical Conference, Fayetteville, Arkansas, USA, 2007, pp. 386-390.
    [Bibtex]
    @INPROCEEDINGS{9029,
        author={Micah Byers and Anthony Lofton and Anil Kumar Vangari-Balraj and Dale R. Thompson},
        title={Brute force attack of EPCglobal UHF class-1 generation-2 RFID tag},
        booktitle={Proceedings of the IEEE Region 5 Technical Conference},
        address={Fayetteville, Arkansas, USA},
        month={Apr. 20--21},
        year={2007},
        pages={386--390},
        volume={},
        number={}
    }
  • [PDF] S. C. G. Periaswamy, S. Bharath, M. Chagarlamudi, S. Estes, and D. R. Thompson, “Attack graphs for EPCglobal RFID,” in Proceedings of the IEEE Region 5 Technical Conference, Fayetteville, Arkansas, USA, 2007, pp. 391-396.
    [Bibtex]
    @INPROCEEDINGS{9030,
        author={Senthilkumar Chinnappa Gounder Periaswamy and Suman Bharath and Manideep Chagarlamudi and Scott Estes and Dale R. Thompson},
        title={Attack graphs for EPCglobal RFID},
        booktitle={Proceedings of the IEEE Region 5 Technical Conference},
        address={Fayetteville, Arkansas, USA},
        month={Apr. 20--21},
        year={2007},
        pages={391--396},
        volume={},
        number={}
    }
  • C. Thompson and D. R. Thompson, “Identity Management,” IEEE Internet Computing Magazine, vol. 11, iss. 3, pp. 82-85, 2007.
    [Bibtex]
    @ARTICLE{ 9031,
    AUTHOR    = {Craig Thompson and Dale R. Thompson}, 
    TITLE     = {Identity Management},
    JOURNAL   = {{IEEE} Internet Computing Magazine},
    YEAR      = {2007},
    Volume    = {11},
    Number    = {3},
    Pages     = {82--85},
    Month     = {May/June}
    %Note      = {},
    %Key       = {}
    }

2006

  • D. R. Thompson and A. W. Apon, “Public Network Technologies and Security,” in The Handbook of Information Security, H. Bidgoli, Ed., Hoboken, NJ: John Wiley & Sons, 2006, vol. 1, pp. 473-488.
    [Bibtex]
    @incollection{9013,
      author     =    {Dale R. Thompson and Amy W. Apon},
      title      =    {Public Network Technologies and Security},
      booktitle  =    {The Handbook of Information Security},
      pages      =   {473--488},
      publisher  =   {John Wiley \& Sons},
      year       =   {2006},
      volume     =   {1},
      editor     =   {H. Bidgoli},
      address    =   {Hoboken, NJ}
    }
  • [PDF] D. R. Thompson, N. Chaudhry, and C. W. Thompson, “RFID security threat model,” in Proceedings of the Acxiom Laboratory for Applied Research (ALAR) Conference on Applied Research in Information Technology, Conway, Arkansas, USA, 2006.
    [Bibtex]
    @INPROCEEDINGS{9023,
        author={Dale R. Thompson and Neeraj Chaudhry and Craig W. Thompson},
        title={RFID security threat model},
        booktitle={Proceedings of the Acxiom Laboratory for Applied Research (ALAR) Conference on Applied Research in Information Technology},
        address={Conway, Arkansas, USA},
        month={Mar. 3},
        year={2006},
        pages={},
        volume={},
        number={}
    }
  • D. R. Thompson, “RFID technical tutorial,” The Journal of Computing Sciences in Colleges, vol. 21, iss. 5, pp. 8-9, 2006.
    [Bibtex]
    @ARTICLE{ 9024,
    AUTHOR    = {Dale R. Thompson}, 
    TITLE     = {RFID technical tutorial},
    JOURNAL   = {The Journal of Computing Sciences in Colleges},
    YEAR      = {2006},
    Volume    = {21},
    Number    = {5},
    Pages     = {8--9},
    Month     = {May},
    Note      = {presented at the Mid-South Consortium for Computing Sciences in Colleges}
    %Key       = {}
    }
  • [PDF] K. Al-Snaie and D. R. Thompson, “Cut saturation for p-cycle design,” in Proceedings of the IEEE Region 5 Technical, Professional, and Student Conference (TPSC), San Antonio, Texas, USA, 2006, pp. 236-242.
    [Bibtex]
    @INPROCEEDINGS{9025,
        author={Khalid Al-Snaie and Dale R. Thompson},
        title={Cut saturation for p-cycle design},
        booktitle={Proceedings of the IEEE Region 5 Technical, Professional, and Student Conference (TPSC)},
        address={San Antonio, Texas, USA},
        month={Apr. 7--9},
        year={2006},
        pages={236--242},
        volume={},
        number={}
    }
  • D. R. Thompson, J. Di, H. Sunkara, and C. Thompson, “Categorizing RFID privacy threats with STRIDE,” in Proceedings of the ACM Symposium on Usable Privacy and Security (SOUPS), Carnegie Mellon University, Pittsburgh, PA, USA, 2006.
    [Bibtex]
    @INPROCEEDINGS{9026,
        author={Dale R. Thompson and Jia Di and Harshitha Sunkara and Craig Thompson},
        title={Categorizing RFID privacy threats with STRIDE},
        booktitle={Proceedings of the ACM Symposium on Usable Privacy and Security (SOUPS)},
        address={Carnegie Mellon University, Pittsburgh, PA, USA},
        month={July 12--14},
        year={2006},
        pages={},
        volume={},
        number={}
    }
  • J. White and D. R. Thompson, “Using synthetic decoys to digitally watermark personally identifying data and to promote data security,” in Proceedings of the International Conference on Security & Management (SAM), Las Vegas, Nevada, USA, 2006, pp. 91-99.
    [Bibtex]
    @INPROCEEDINGS{9027,
        author={Jonathon White and Dale R. Thompson},
        title={Using synthetic decoys to digitally watermark personally identifying data and to promote data security},
        booktitle={Proceedings of the International Conference on Security \& Management (SAM)},
        address={Las Vegas, Nevada, USA},
        month={Jun. 26--29},
        year={2006},
        pages={91--99},
        volume={},
        number={}
    }

2005

  • [PDF] A. Khan and D. R. Thompson, “Solving the WDM network operation problem using dynamic synchronous parallel simulated annealing,” in Proceedings of the IEEE Southeastcon, Ft. Lauderdale, FL, USA, 2005, pp. 296-301.
    [Bibtex]
    @INPROCEEDINGS{9016,
        author={Asheq Khan and Dale R. Thompson},
        title={Solving the WDM network operation problem using dynamic synchronous parallel simulated annealing},
        booktitle={Proceedings of the IEEE Southeastcon},
        address={Ft. Lauderdale, FL, USA},
        month={Apr. 8--10},
        year={2005},
        pages={296--301},
        volume={},
        number={}
    }
  • [PDF] J. White and D. R. Thompson, “Load balancing on a grid using data characteristics,” in Proceedings of the International Conference on Grid Computing and Applications (GCA), Las Vegas, Nevada, USA, 2005, pp. 184-188.
    [Bibtex]
    @INPROCEEDINGS{9017,
        author={Jonathon White and Dale R. Thompson},
        title={Load balancing on a grid using data characteristics},
        booktitle={Proceedings of the International Conference on Grid Computing and Applications (GCA)},
        address={Las Vegas, Nevada, USA},
        month={Jun. 20--23},
        year={2005},
        pages={184--188},
        volume={},
        number={}
    }
  • [PDF] D. R. Thompson and G. L. Bilbro, “Sample-sort simulated annealing,” IEEE Trans. Systems, Man, and Cybernetics – Part B: Cybernetics, vol. 35, iss. 3, pp. 625-632, 2005.
    [Bibtex]
    @ARTICLE{ 9018,
    AUTHOR    = {Dale R. Thompson and Griff L. Bilbro}, 
    TITLE     = {Sample-sort simulated annealing},
    JOURNAL   = {IEEE Trans. Systems, Man, and Cybernetics - Part B: Cybernetics},
    YEAR      = {2005},
    Volume    = {35},
    Number    = {3},
    Pages     = {625--632},
    Month     = {Jun.}
    %Note      = {},
    %Key       = {}
    }
  • [PDF] D. R. Thompson and K. Al-Snaie, “Joint capacity and spare capacity placement with p-cycles,” IPSI BgD Transactions on Internet Research, vol. 1, iss. 2, pp. 34-37, 2005.
    [Bibtex]
    @ARTICLE{ 9019,
    AUTHOR    = {Dale R. Thompson and Khalid Al-Snaie}, 
    TITLE     = {Joint capacity and spare capacity placement with p-cycles},
    JOURNAL   = {IPSI BgD Transactions on Internet Research},
    YEAR      = {2005},
    Volume    = {1},
    Number    = {2},
    Pages     = {34--37},
    Month     = {July}
    %Note      = {},
    %Key       = {}
    }
  • [PDF] N. Chaudhry, D. R. Thompson, and C. Thompson, “RFID Technical Tutorial and Threat Modeling,” University of Arkansas, Department of Computer Science and Computer Engineering 2005.
    [Bibtex]
    @techreport{9020,
         title = {{{RFID} Technical Tutorial and Threat Modeling}},
         author = {Neeraj Chaudhry and Dale R. Thompson and Craig Thompson},
         year = {2005},
         institution = {University of Arkansas, Department of Computer Science and Computer Engineering},
         month = {12}}
  • [PDF] R. K. Ravalkol and D. R. Thompson, “Service restorability in degree-based wavelength division multiplexing networks,” in Proceedings of the IASTED International Conference on Optical Communications Systems and Networks (OCSN), Banff, Canada, 2005, pp. 50-55.
    [Bibtex]
    @INPROCEEDINGS{9021,
        author={Ram Kumar Ravalkol and Dale R. Thompson},
        title={Service restorability in degree-based wavelength division multiplexing networks},
        booktitle={Proceedings of the IASTED International Conference on Optical Communications Systems and Networks (OCSN)},
        address={Banff, Canada},
        month={July 19--21},
        year={2005},
        pages={50--55},
        volume={},
        number={}
    }
  • [PDF] D. R. Thompson, Sample-sort simulated annealing for parallel optimization, 2005.
    [Bibtex]
    @MISC{9022,
    author       = {Dale R. Thompson}, 
    title        = {Sample-sort simulated annealing for parallel optimization}, 
    howpublished = {Oklahoma Supercomputing Symposium}, 
    month        = {Oct. 4--5}, 
    year         = {2005}, 
    note         = {Poster at Univ. of Oklahoma in Norman, OK}, 
    key          = {}
    }

2004

  • D. R. Thompson and A. W. Apon, “Public Networks,” in The Internet Encyclopedia, H. Bidgoli, Ed., Hoboken, NJ: John Wiley & Sons, 2004, vol. 3, pp. 166-176.
    [Bibtex]
    @incollection{9008,
      author     =    {Dale R. Thompson and Amy W. Apon},
      title      =    {Public Networks},
      booktitle  =    {The Internet Encyclopedia},
      pages      =   {166--176},
      publisher  =   {John Wiley \& Sons},
      year       =   {2004},
      volume     =   {3},
      editor     =   {H. Bidgoli},
      address    =   {Hoboken, NJ}
    }
  • [PDF] D. R. Thompson and S. Shin, “Mean value analysis of a database grid application,” in Proceedings of the 3rd International Conference on Networking, Guadeloupe, French Caribbean, 2004, pp. 775-780.
    [Bibtex]
    @INPROCEEDINGS{9011,
        author={Dale R. Thompson and Seongjin Shin},
        title={Mean value analysis of a database grid application},
        booktitle={Proceedings of the 3rd International Conference on Networking},
        address={Guadeloupe, French Caribbean},
        month={Mar. 1--4},
        year={2004},
        pages={775--780},
        volume={},
        number={}
    }
  • [PDF] D. R. Thompson, B. Maxwell, and J. P. Parkerson, “Building the big message authentication code,” in Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004), Orlando, FL, USA, 2004, pp. 544-549.
    [Bibtex]
    @INPROCEEDINGS{9012,
        author={Dale R. Thompson and Brad Maxwell and James Pat Parkerson},
        title={Building the big message authentication code},
        booktitle={Proceedings of the 8th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2004)},
        address={Orlando, FL, USA},
        month={July 18--21},
        year={2004},
        pages={544--549},
        volume={},
        number={}
    }
  • J. White and D. R. Thompson, Using census data for grid partitioning, 2004.
    [Bibtex]
    @MISC{9015,
    author       = {Jonathon White and Dale R. Thompson}, 
    title        = {Using census data for grid partitioning}, 
    howpublished = {Oklahoma Supercomputing Symposium}, 
    month        = {Oct. 6--7}, 
    year         = {2004}, 
    note         = {Poster at Univ. of Oklahoma in Norman, OK}, 
    key          = {}
    }

2003

  • [PDF] D. R. Thompson and M. T. Anwar, “Parallel recombinative simulated annealing for wavelength division multiplexing,” in Proceedings of the 2003 International Conference on Communications in Computing (CIC), Las Vegas, NV, USA, 2003, pp. 212-217.
    [Bibtex]
    @INPROCEEDINGS{9009,
      author    = "Dale R. Thompson and Md. Tanveer Anwar",
      year      = 2003,
      month     = "June 23--26",
      title     = "Parallel recombinative simulated annealing for wavelength division multiplexing",
      booktitle = {Proceedings of the 2003 International Conference on Communications in Computing (CIC)},
            address   = {Las Vegas, NV, USA},
            pages     = {212--217}
            
    }
  • [PDF] B. Maxwell, D. R. Thompson, G. Amerson, and L. Johnson, “Analysis of CRC methods and potential data integrity exploits,” in Proceedings of the International Conference on Emerging Technologies, Minneapolis, MN, 2003.
    [Bibtex]
    @INPROCEEDINGS{9010,
        author={Brad Maxwell and Dale R. Thompson and Greg Amerson and Lance Johnson},
        title={Analysis of CRC methods and potential data integrity exploits},
        booktitle={Proceedings of the International Conference on Emerging Technologies},
        address={Minneapolis, MN},
        month={Aug. 25--26},
        year={2003},
        pages={},
        volume={},
        number={}
    }
  • D. R. Thompson, A. Apon, Y. Yara, J. Mache, and R. Deaton, Training a grid workforce, 2003.
    [Bibtex]
    @MISC{9014,
    author       = {Dale R. Thompson and Amy Apon and Yuriko Yara and Jens Mache and Russell Deaton}, 
    title        = {Training a grid workforce}, 
    howpublished = {Oklahoma Supercomputing Symposium}, 
    month        = {Sep. 25}, 
    year         = {2003}, 
    note         = {Poster at Univ. of Oklahoma in Norman, OK}, 
    key          = {}
    }

2001

  • E. Ward, D. S. Blank, D. Rolniak, and D. R. Thompson, “Complexity as fitness for evolved cellular automata update rules,” in Proceedings of the 2001 Genetic and Evolutionary Computation Conference Late-Breaking Papers, San Francisco, CA, USA, 2001, pp. 463-468.
    [Bibtex]
    @INPROCEEDINGS{9007,
      author    = "Em Ward and Douglas S. Blank and Douglas Rolniak and Dale R. Thompson",
      year      = 2001,
      month     = "July 9-11",
      title     = "Complexity as fitness for evolved cellular automata update rules",
      booktitle = "Proceedings of the 2001 Genetic and Evolutionary Computation Conference Late-Breaking Papers",
          address = "San Francisco, CA, USA",
      pages     = "463--468"}

2000

  • [PDF] D. R. Thompson, “Genetic Algorithm with Population Sizing for the Concentrator Location Problem,” PhD Thesis, Raleigh, North Carolina, USA, 2000.
    [Bibtex]
    @phdthesis{9005,
      author       = {Dale R. Thompson}, 
      title        = {Genetic Algorithm with Population Sizing for the Concentrator Location Problem},
      school       = {North Carolina State University},
      year         = 2000,
      address      = {Raleigh, North Carolina, USA},
      month        = 5,
      note         = {Electrical Engineering},
      filename  = "Dissertation.pdf and DissTitle.pdf (original signatures scanned)"
    }
  • [PDF] D. R. Thompson and G. L. Bilbro, “Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an ATM network,” IEEE Communications Letters, vol. 4, iss. 8, pp. 267-269, 2000.
    [Bibtex]
    @ARTICLE{9006, 
      author    = "Dale R. Thompson and Griff L. Bilbro",
      title     = "Comparison of a genetic algorithm with a simulated annealing algorithm for the design of an {ATM} network",
      journal   = "IEEE Communications Letters",
      year      = 2000,
            month     = {Aug.},
      volume    = 4, 
      number    = 8, 
      pages     = "267--269", 
      filename  = "paper3.pdf"}

1998

  • [PDF] D. R. Thompson and G. L. Bilbro, “Comparison of two swap heuristics with a genetic algorithm for the design of an ATM network,” in Proceedings of the Seventh International Conference on Computer Communications and Networks, 1998, pp. 833-837.
    [Bibtex]
    @INPROCEEDINGS{9004,
      author    = "Dale R. Thompson and Griff L. Bilbro",
      year      = 1998,
      month     = "Oct.",
      title     = "Comparison of two swap heuristics with a genetic algorithm for the design of an {ATM} network",
      booktitle = "Proceedings of the Seventh International Conference on Computer Communications and Networks",
      publisher = "Piscataway, NJ: IEEE Press",
      pages     = "833--837", 
      filename  = "paper1.pdf"}

1992

  • D. R. Thompson, “Advanced solid rocket motor (ASRM) communications network analysis,” Master Thesis, Starkville, MS, USA, 1992.
    [Bibtex]
    @MastersThesis{9001,
        author     =     {Dale R. Thompson},
        title     =     {Advanced solid rocket motor {(ASRM)} communications network analysis},
        school     =     {Mississippi State University},
        address     =     {Starkville, MS, USA},
        year     =     {1992},
        }
  • [PDF] D. R. Thompson, R. J. Moorhead, and W. D. Smith, “Advanced solid rocket motor (ASRM) communications network analysis,” in Proceedings of the International Conference on Computer Communications and Networks (IC3N), San Diego, CA, USA, 1992, pp. 107-111.
    [Bibtex]
    @INPROCEEDINGS{9002,
      author    = "Dale R. Thompson and Robert J. Moorhead and Wayne D. Smith",
      year      = 1992,
      month     = "June 8-10",
      title     = "Advanced solid rocket motor (ASRM) communications network analysis",
      booktitle = "Proceedings of the International Conference on Computer Communications and Networks (IC3N)",
      %publisher = "Piscataway, NJ: IEEE Press",
          address = "San Diego, CA, USA",
      pages     = "107--111", 
      filename  = "IC3N_1992.pdf"}
  • [PDF] D. R. Thompson, R. J. Moorhead, and W. D. Smith, “Advanced solid rocket motor (ASRM) communications network analysis using BONeS,” in Proceedings of the IEEE Southeastcon, Birmingham, AL, USA, 1992, pp. 276-282.
    [Bibtex]
    @INPROCEEDINGS{9003,
      author    = "Dale R. Thompson and Robert J. Moorhead and Wayne D. Smith",
      year      = 1992,
      month     = "April 12-15",
      title     = "Advanced solid rocket motor (ASRM) communications network analysis using BONeS",
      booktitle = "Proceedings of the IEEE Southeastcon",
      %publisher = "Piscataway, NJ: IEEE Press",
          address = "Birmingham, AL, USA",
      pages     = "276--282"
    }

Print pagePDF pageEmail page