default search action
Cynthia Hood 0001
Person information
- affiliation: Illinois Institute of Technology, Department of Computer Science, Chicago, IL, USA
Other persons with the same name
- Cynthia Hood — disambiguation page
- Cynthia S. Hood — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j5]Ezzat Kirmani, Cynthia S. Hood:
On a cumulative performance function with Poisson-driven changes in the mean and variance of a performance metric. Perform. Evaluation 109: 23-33 (2017) - 2011
- [j4]Jeffrey J. Evans, Cynthia S. Hood:
A network performance sensitivity metric for parallel applications. Int. J. High Perform. Comput. Netw. 7(1): 8-18 (2011) - 2006
- [j3]Cindy Hood, Dennis Roberson:
Management of interference in wireless networks. Int. J. Netw. Manag. 16(2): 85-87 (2006) - 2003
- [j2]Jeffrey J. Evans, Cynthia S. Hood:
Modeling and simulation of mixed traffic on a prioritized shared medium. Int. J. Netw. Manag. 13(1): 11-31 (2003) - [j1]Jeffrey J. Evans, Cynthia S. Hood, Phillip M. Dickens:
Traffic Analysis and Simulation of a Prioritized Shared Medium. Simul. 79(4): 211-231 (2003)
Conference and Workshop Papers
- 2023
- [c29]Udayan Das, Cynthia S. Hood, Vaishali Nagpure:
A Reasoning System Architecture for Spectrum Decision Making. ISNCC 2023: 1-10 - 2021
- [c28]Vaishali Nagpure, Udayan Das, Cynthia Hood:
Methodology for Characterizing Spectrum Data by Combining Quantitative and Qualitative Information. CrownCom/WiCON 2021: 24-38 - 2019
- [c27]Vaishali Nagpure, Stephanie Vaccaro, Cynthia Hood:
Spectrum Analysis Using Semantic Models for Context. CrownCom 2019: 126-139 - [c26]Vaishali Nagpure, Stephanie Vaccaro, Cynthia Hood:
A Case Study of Spectrum Analysis Using Unsupervised Machine Learning. DySPAN 2019: 1-2 - 2018
- [c25]Vaishali Nagpure, Cynthia Hood, Stephanie Vaccaro:
Semantic Models for Labeling Spectrum Data. AIAI (Workshops) 2018: 3-12 - 2017
- [c24]Jacek Dzikowski, Cynthia Hood:
Lessons Learned from Long-Term and Imperfect Sensing in 2.4 GHz Unlicensed Band. CrownCom 2017: 140-150 - 2015
- [c23]Udayan Das, Jacek Dzikowski, Cynthia S. Hood:
Evaluating Cognitive Radio Networks an agent based modeling approach. DySPAN 2015: 305-308 - [c22]Jacek Dzikowski, Cynthia Hood:
Modeling cognitive radio networks in NetLogo. SummerSim 2015: 15:1-15:11 - 2012
- [c21]Alana Platt, Cynthia Hood:
Understanding user's needs in information gathering in social networks. MSM 2012: 9-12 - [c20]Joseph Kroculick, Cynthia Hood:
A Dependability Assessment Process for Ensuring Consistent Provisioning of Network Recovery. CSER 2012: 177-183 - 2011
- [c19]Alana Platt, Cynthia Hood, Levi Citrin:
Organization of social network messages to improve understanding of an evolving crisis. ISI 2011: 230 - [c18]Alana Platt, Cynthia Hood, Levi Citrin:
From Earthquakes to "#morecowbell": Identifying Sub-topics in Social Network Communications. SocialCom/PASSAT 2011: 541-544 - 2009
- [c17]Jacek Dzikowski, Cynthia Hood:
An agent-based simulation framework for cognitive radio studies. SimuTools 2009: 18 - 2007
- [c16]Jeffrey J. Evans, Cynthia S. Hood:
A Network Performance Sensitivity Metric for Parallel Applications. ISPA 2007: 920-931 - 2006
- [c15]M. Derya Tetiker, Arsun Artel, Eric Tatara, Fouad Teymour, Michael J. North, Cindy Hood, Ali Cinar:
Agent-based system for reconfiguration of distributed chemical reactor network operation. ACC 2006: 1-6 - [c14]Jeffrey J. Evans, Cynthia S. Hood:
PARSE: A Tool for Parallel Application Run Time Sensitivity Evaluation. ICPADS (1) 2006: 475-484 - [c13]Dennis J. Hood, Cynthia S. Hood:
Teaching software project management using simulations. ITiCSE 2006: 289-293 - 2005
- [c12]Eric Tatara, Michael J. North, Cindy Hood, Fouad Teymour, Ali Cinar:
Agent-Based Control of Spatially Distributed Chemical Reactor Networks. Engineering Self-Organising Systems 2005: 222-231 - [c11]Jeffrey J. Evans, Cynthia S. Hood:
Network performance variability in NOW clusters. CCGRID 2005: 1047-1054 - [c10]Cynthia S. Hood, Dennis J. Hood:
Teaching programming and language concepts using LEGOs. ITiCSE 2005: 19-23 - [c9]Cynthia S. Hood, Dennis J. Hood:
Toward integrating computing concepts into the K-12 curriculum. ITiCSE 2005: 375 - 2004
- [c8]Joseph Kroculick, Cynthia Hood:
Avoiding blocking in multilayer recovery. ICC 2004: 1659-1663 - [c7]Michael J. North, Cynthia S. Hood:
Users Matter: A Multi-agent Systems Model of High Performance Computing Cluster Users. MABS 2004: 99-113 - 2003
- [c6]Jeffrey J. Evans, Seongbok Baik, Cynthia S. Hood, William Gropp:
Toward Understanding Soft Faults in High Performance Cluster Networks. Integrated Network Management 2003: 117-120 - [c5]Jeffrey J. Evans, Cynthia S. Hood, William Gropp:
Exploring the Relationship Between Parallel Application Run-Time Variability and Network Performance in Clusters. LCN 2003: 538-547 - 2002
- [c4]Seongbok Baik, Cynthia S. Hood, William Gropp:
Prototype of AM3: Active Mapper and Monitoring Module for Myrinet Environments. LCN 2002: 703-707 - [c3]Joseph Kroculick, Cynthia Hood:
Provisioning consistent policies in multilayer restoration. NOMS 2002: 951-953 - 2000
- [c2]Joseph Kroculick, Cynthia Hood:
Provisioning Multilayer Restoration for Convergence. LCN 2000: 108-115 - 1998
- [c1]Joseph Kroculick, Cynthia Hood:
Using inheritance to derive non-conflicting survivability strategies. ICC 1998: 1145-1149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint