default search action
Clark D. Thomborson
Person information
- affiliation: University of Auckland, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c53]Clark D. Thomborson, Marc Jeanmougin:
Stegogames. ACISP (2) 2017: 414-421 - 2016
- [j28]Yu-Cheng Tu, Ewan D. Tempero, Clark D. Thomborson:
An experiment on the impact of transparency on the effectiveness of requirements documents. Empir. Softw. Eng. 21(3): 1035-1066 (2016) - [c52]Clark D. Thomborson:
Privacy patterns. PST 2016: 656-663 - [i2]Clark D. Thomborson:
Privacy Patterns. CoRR abs/1612.01553 (2016) - 2015
- [c51]Yuichiro Kanzaki, Clark D. Thomborson, Akito Monden, Christian S. Collberg:
Pinpointing and Hiding Surprising Fragments in an Obfuscated Program. PPREW@ACSAC 2015: 8:1-8:9 - [i1]Clark D. Thomborson:
Benchmarking Obfuscators of Functionality. CoRR abs/1501.02885 (2015) - 2014
- [c50]Yu-Cheng Tu, Ewan D. Tempero, Clark D. Thomborson:
Evaluating Presentation of Requirements Documents: Results of an Experiment. APRES 2014: 120-134 - 2013
- [c49]Pita Jarupunphol, Clark D. Thomborson:
The dhammic framework for understanding the cause of system project failures from Buddhist insights. ICCI*CC 2013: 387-396 - [e2]Clark D. Thomborson, Udaya Parampalli:
Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. CRPIT 138, Australian Computer Society 2013, ISBN 978-1-921770-23-4 [contents] - 2012
- [j27]Zhiwei Yu, Chaokun Wang, Clark D. Thomborson, Jianmin Wang, Shiguo Lian, Athanasios V. Vasilakos:
Multimedia Applications and Security in MapReduce: Opportunities and Challenges. Concurr. Comput. Pract. Exp. 24(17): 2083-2101 (2012) - [j26]Zhiwei Yu, Chaokun Wang, Clark D. Thomborson, Jianmin Wang, Shiguo Lian, Athanasios V. Vasilakos:
A novel watermarking method for software protection in the cloud. Softw. Pract. Exp. 42(4): 409-430 (2012) - [c48]Clark D. Thomborson:
The Art and Science of Obfuscation. ICISTM 2012: 445-450 - [c47]Zhiwei Yu, Clark D. Thomborson, Chaokun Wang, Jianmin Wang, Rui Li:
A cloud-based watermarking method for health data security. HPCS 2012: 642-647 - [e1]Josef Pieprzyk, Clark D. Thomborson:
Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012. CRPIT 125, Australian Computer Society 2012, ISBN 978-1-921770-06-7 [contents] - 2011
- [c46]Yu-Cheng Tu, Clark D. Thomborson, Ewan D. Tempero:
Illusions and Perceptions of Transparency in Software Engineering. APSEC 2011: 365-372 - 2010
- [c45]Clark D. Thomborson:
Axiomatic and Behavioural Trust. TRUST 2010: 352-366 - [p1]Clark D. Thomborson:
A Framework for System Security. Handbook of Information and Communication Security 2010: 3-20
2000 – 2009
- 2009
- [c44]Clark D. Thomborson:
Foundation for Systems Security. AISC 2009: 3 - [c43]Gilbert Notoatmodjo, Clark D. Thomborson:
Passwords and Perceptions. AISC 2009: 71-78 - [c42]Yu-Cheng Tu, Clark D. Thomborson:
Preliminary Security Specification for New Zealand's igovt System. AISC 2009: 79-88 - [c41]Changjiang Zhang, Jianmin Wang, Clark D. Thomborson, Chaokun Wang, Christian S. Collberg:
A semi-dynamic multiple watermarking schemefor java applications. Digital Rights Management Workshop 2009: 59-72 - 2008
- [c40]Clark D. Thomborson:
A Model for New Zealand's Identity Verification Service. TRUST 2008: 92-106 - 2007
- [j25]Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend:
Dynamic graph-based software fingerprinting. ACM Trans. Program. Lang. Syst. 29(6): 35 (2007) - [c39]Stephen Drape, Anirban Majumdar, Clark D. Thomborson:
Slicing Aided Design of Obfuscating Transforms. ACIS-ICIS 2007: 1019-1024 - [c38]Anirban Majumdar, Stephen Drape, Clark D. Thomborson:
Metrics-based Evaluation of Slicing Obfuscations. IAS 2007: 472-477 - [c37]Anirban Majumdar, Stephen Drape, Clark D. Thomborson:
Slicing obfuscations: design, correctness, and evaluation. Digital Rights Management Workshop 2007: 70-81 - [c36]Stephen Drape, Clark D. Thomborson, Anirban Majumdar:
Specifying Imperative Data Obfuscations. ISC 2007: 299-314 - 2006
- [c35]Anirban Majumdar, Clark D. Thomborson:
Manufacturing opaque predicates in distributed systems for code obfuscation. ACSC 2006: 187-196 - [c34]Matt Barrett, Clark D. Thomborson:
Frameworks Built on the Trusted Platform Module. COMPSAC (2) 2006: 59-62 - [c33]William Zhu, Clark D. Thomborson, Fei-Yue Wang:
Obfuscate arrays by homomorphic functions. GrC 2006: 770-773 - [c32]Anirban Majumdar, Clark D. Thomborson, Stephen Drape:
A Survey of Control-Flow Obfuscations. ICISS 2006: 353-356 - [c31]William Zhu, Clark D. Thomborson:
Extraction in software watermarking. MM&Sec 2006: 175-181 - [c30]William Zhu, Clark D. Thomborson, Fei-Yue Wang:
Applications of Homomorphic Functions to Software Obfuscation. WISI 2006: 152-153 - 2005
- [j24]Akito Monden, Antoine Monsifrot, Clark D. Thomborson:
Tamper-Resistant Software System Based on a Finite State Machine. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 112-122 (2005) - [c29]William Zhu, Clark D. Thomborson:
Algorithms to Watermark Software Through Register Allocation. DRMTICS 2005: 180-191 - [c28]William Zhu, Clark D. Thomborson, Fei-Yue Wang:
A Survey of Software Watermarking. ISI 2005: 454-458 - [c27]William Zhu, Clark D. Thomborson:
On the QP Algorithm in Software Watermarking. ISI 2005: 646-647 - [c26]Anirban Majumdar, Clark D. Thomborson:
On the Use of Opaque Predicates in Mobile Agent Code Obfuscation. ISI 2005: 648-649 - [c25]Anirban Majumdar, Clark D. Thomborson:
Securing Mobile Agents Control Flow Using Opaque Predicates. KES (3) 2005: 1065-1071 - 2004
- [c24]Akito Monden, Antoine Monsifrot, Clark D. Thomborson:
A Framework for Obfuscated Interpretation. ACSW 2004: 7-16 - [c23]Clark D. Thomborson, Jasvir Nagra, Ram Somaraju, Charles He:
Tamper-proo ng Software Watermarks. ACSW 2004: 27-36 - [c22]Andrew M. Colarik, Clark D. Thomborson, Lech J. Janczewski:
Update/Patch Management Systems: A Protocol Taxonomy with Security Implications. International Information Security Workshops 2004: 67-80 - [c21]Jasvir Nagra, Clark D. Thomborson:
Threading Software Watermarks. Information Hiding 2004: 208-223 - 2003
- [c20]Larry Carter, Jeanne Ferrante, Clark D. Thomborson:
Folklore confirmed: reducible flow graphs are exponentially larger. POPL 2003: 106-114 - [c19]Christian S. Collberg, Stephen G. Kobourov, Edward Carter, Clark D. Thomborson:
Graph-Based Approaches to Software Watermarking. WG 2003: 156-167 - 2002
- [j23]Christian S. Collberg, Clark D. Thomborson:
Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. IEEE Trans. Software Eng. 28(8): 735-746 (2002) - [c18]Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg:
A Functional Taxonomy for Software Watermarking. ACSC 2002: 177-186
1990 – 1999
- 1999
- [c17]Christian S. Collberg, Clark D. Thomborson:
Software Watermarking: Models and Dynamic Embeddings. POPL 1999: 311-324 - 1998
- [j22]Clark D. Thomborson:
The Economics of Large-Memory Computations. Inf. Process. Lett. 66(5): 263-268 (1998) - [c16]Enyou Li, Clark D. Thomborson:
Data cache parameter measurements. ICCD 1998: 376-383 - [c15]Christian S. Collberg, Clark D. Thomborson, Douglas Low:
Breaking Abstractions and Unstructuring Data Structures. ICCL 1998: 28-38 - [c14]Christian S. Collberg, Clark D. Thomborson, Douglas Low:
Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. POPL 1998: 184-196 - 1994
- [j21]Linda L. Deneen, Gary M. Shute, Clark D. Thomborson:
A Probaby Fast, Provably Optimal Algorithm for Rectilinear Steiner Trees. Random Struct. Algorithms 5(4): 535-558 (1994) - 1993
- [j20]Clark D. Thomborson:
Does Your Workstation Computation Belong on a Vector Supercomputer? Commun. ACM 36(11): 41-49 (1993) - [j19]Clark D. Thomborson:
Why are fewer females obtaining bachelor's degrees in computer science? SIGACT News 24(3): 114-116 (1993) - [c13]Clark D. Thomborson, Yi Sun:
Optimizing carry lookahead adders for semicustom CMOS. Great Lakes Symposium on VLSI 1993: 119-122 - 1992
- [j18]Clark D. Thomborson:
The V.42bis standard for data-compressing modems. IEEE Micro 12(5): 41-53 (1992) - [j17]Pak K. Chan, Martine D. F. Schlag, Clark D. Thomborson, Vojin G. Oklobdzija:
Delay Optimization of Carry-Skip Adders and Block Carry-Lookahead Adders Using Multidimensional Dynamic Programming. IEEE Trans. Computers 41(8): 920-930 (1992) - [c12]Clark D. Thomborson, Bowen Alpern, Larry Carter:
Rectilinear Steiner Tree Minimization on a Workstation. Computational Support for Discrete Mathematics 1992: 119-136 - 1991
- [j16]Prabhakar Raghavan, Clark D. Thompson:
Multiterminal Global Routing: A Deterministic Approximation Scheme. Algorithmica 6(1): 73-82 (1991) - [j15]Gary M. Shute, Linda L. Deneen, Clark D. Thomborson:
An O(n log n) Plane-Sweep Algorithm for L_1 and L_\infty Delaunay Triangulations. Algorithmica 6(2): 207-221 (1991) - [j14]Clark D. Thomborson, Belle W. Y. Wei:
Systolic implementations of a move-to-front text compressor. SIGARCH Comput. Archit. News 19(1): 53-60 (1991) - [c11]Pak K. Chan, Martine D. F. Schlag, Clark D. Thomborson, Vojin G. Oklobdzija:
Delay optimization of carry-skip adders and block carry-lookahead adders. IEEE Symposium on Computer Arithmetic 1991: 154-164 - 1990
- [j13]Belle W. Y. Wei, Clark D. Thompson:
Area-Time Optimal Adder Design. IEEE Trans. Computers 39(5): 666-675 (1990) - [c10]Christos Kaklamanis, Anna R. Karlin, Frank Thomson Leighton, Victor Milenkovic, Prabhakar Raghavan, Satish Rao, Clark D. Thomborson, A. Tsantilas:
Asymptotically Tight Bounds for Computing with Faulty Arrays of Processors (Extended Abstract). FOCS 1990: 285-296
1980 – 1989
- 1989
- [c9]Clyde Rogers, Clark D. Thomborson:
Enhancements to Ziv-Lempel data compression. COMPSAC 1989: 324-330 - [c8]Clark D. Thomborson, Belle W. Y. Wei:
Systolic Implementations of a Move-to-Front Text Compressor. SPAA 1989: 283-290 - 1987
- [j12]Richard M. Karp, Frank Thomson Leighton, Ronald L. Rivest, Clark D. Thompson, Umesh V. Vazirani, Vijay V. Vazirani:
Global Wire Routing in Two-Dimensional Arrays. Algorithmica 2: 113-129 (1987) - [j11]Pavol Duris, Ondrej Sýkora, Clark D. Thompson, Imrich Vrto:
A Minimum-Area Circuit for l-Selection. Algorithmica 2: 251-265 (1987) - [j10]Prabhakar Raghavan, Clark D. Thompson:
Randomized rounding: a technique for provably good algorithms and algorithmic proofs. Comb. 7(4): 365-374 (1987) - [c7]Clark D. Thomborson, Linda L. Deneen, Gary M. Shute:
Computing a Rectilinear Steiner Minimal Tree in nO(sqrt(n)) Time. Parallel Algorithms and Architectures 1987: 176-183 - 1986
- [j9]Clark D. Thompson:
Military Direction of Academic CS Research (Viewpoint). Commun. ACM 29(7): 583-585 (1986) - [c6]Antony P.-C. Ng, Clark D. Thompson, Prabhakar Raghavan:
A language for describing rectilinear Steiner tree configurations. DAC 1986: 659-662 - 1985
- [j8]Clark D. Thompson:
VLSI Design With Multiple Active Layers. Inf. Process. Lett. 21(3): 109-111 (1985) - [j7]Pavol Duris, Ondrej Sýkora, Imrich Vrto, Clark D. Thompson:
Tight Chip Area Lower Bounds for Discrete Fourier and Walsh-Hadamard Transformations. Inf. Process. Lett. 21(5): 245-247 (1985) - [c5]Prabhakar Raghavan, Clark D. Thompson:
Provably Good Routing in Graphs: Regular Arrays. STOC 1985: 79-87 - 1984
- [j6]Michael J. Carey, Clark D. Thompson:
An Efficient Implementation of Search Trees on (lg N + 1) Processors. IEEE Trans. Computers 33(11): 1038-1041 (1984) - 1983
- [j5]Clark D. Thompson:
Fourier Transforms in VLSI. IEEE Trans. Computers 32(11): 1047-1057 (1983) - [j4]Clark D. Thompson:
The VLSI Complexity of Sorting. IEEE Trans. Computers 32(12): 1171-1184 (1983) - [c4]Richard M. Karp, Frank Thomson Leighton, Ronald L. Rivest, Clark D. Thompson, Umesh V. Vazirani, Vijay V. Vazirani:
Global Wire Routing in Two-Dimensional Arrays (Extended Abstract). FOCS 1983: 453-459 - [c3]Clark D. Thomborson:
On the Energy-Time-Area Cost of a Memory Access. WG 1983: 354-369 - 1980
- [b1]Clark D. Thomborson:
A Complexity Theory for VLSI. Carnegie Mellon University, USA, 1980
1970 – 1979
- 1979
- [c2]Clark D. Thompson:
Area-Time Complexity for VLSI. STOC 1979: 81-88 - 1978
- [j3]Jon Louis Bentley, H. T. Kung, Mario Schkolnick, Clark D. Thompson:
On the Average Number of Maxima in a Set of Vectors and Applications. J. ACM 25(4): 536-543 (1978) - [j2]Clark D. Thompson:
Generalized Connection Networks for Parallel Processor Intercommunication. IEEE Trans. Computers 27(12): 1119-1125 (1978) - 1977
- [j1]Clark D. Thompson, H. T. Kung:
Sorting on a Mesh-Connected Parallel Computer. Commun. ACM 20(4): 263-271 (1977) - 1976
- [c1]Clark D. Thompson, H. T. Kung:
Sorting on a Mesh-Connected Parallel Computer. STOC 1976: 58-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint