Method and system for analyzing advertisements delivered to a mobile unit GR Hendrey, HA Tanaka, PJ Koopman Jr US Patent 6,647,269, 2003 | 952 | 2003 |
Challenges in autonomous vehicle testing and validation P Koopman, M Wagner SAE International Journal of Transportation Safety 4 (1), 15-24, 2016 | 734 | 2016 |
Autonomous vehicle safety: An interdisciplinary challenge P Koopman, M Wagner IEEE Intelligent Transportation Systems Magazine 9 (1), 90-96, 2017 | 667 | 2017 |
Method and system for connecting mobile users based on degree of separation GR Hendrey, HA Tanaka, PJ Koopman Jr, JD King US Patent 6,539,232, 2003 | 613 | 2003 |
Method and system for selectively connecting mobile users based on physical proximity GR Hendrey, HA Tanaka, PJ Koopman Jr US Patent 6,542,750, 2003 | 583 | 2003 |
Cyclic redundancy code (CRC) polynomial selection for embedded networks P Koopman, T Chakravarty International Conference on Dependable Systems and Networks, 2004, 145-154, 2004 | 547 | 2004 |
Method and system for connecting proximately located mobile users based on compatible attributes HA Tanaka, GR Hendrey, PJ Koopman Jr, JD King US Patent 6,542,749, 2003 | 510 | 2003 |
Pseudorandom number generation and cryptographic authentication PJ Koopman Jr, AM Finn US Patent 5,363,448, 1994 | 359 | 1994 |
Pseudorandom number generation and cryptographic authentication PJ Koopman Jr, AM Finn US Patent 5,363,448, 1994 | 359 | 1994 |
32-bit cyclic redundancy codes for internet applications P Koopman Proceedings International Conference on Dependable Systems and Networks, 459-468, 2002 | 334 | 2002 |
Automated robustness testing of off-the-shelf software components NP Kropp, PJ Koopman, DP Siewiorek Digest of papers. twenty-eighth annual international symposium on fault …, 1998 | 319 | 1998 |
Method and system for automatically initiating a telecommunications connection based on distance GR Hendrey, P Koopman Jr, JD King, HA Tanaka US Patent 6,542,748, 2003 | 255 | 2003 |
Stack Computers: the new wave PJ Koopman Jr Halsted Press, 1989 | 255 | 1989 |
Comparing operating systems using robustness benchmarks P Koopman, J Sung, C Dingman, D Siewiorek, T Marz Proceedings of SRDS'97: 16th IEEE Symposium on Reliable Distributed Systems …, 1997 | 252 | 1997 |
Comparing the robustness of POSIX operating systems P Koopman, J DeVale Digest of Papers. Twenty-Ninth Annual International Symposium on Fault …, 1999 | 245 | 1999 |
Embedded system security P Koopman Computer 37 (7), 95-97, 2004 | 225 | 2004 |
Cryptographic authentication of transmitted messages using pseudorandom numbers PJ Koopman Jr, AM Finn US Patent 5,377,270, 1994 | 217 | 1994 |
Work-arounds, make-work, and kludges P Koopman, RR Hoffman IEEE Intelligent Systems 18 (6), 70-75, 2003 | 216 | 2003 |
The exception handling effectiveness of POSIX operating systems P Koopman, J DeVale IEEE Transactions on Software Engineering 26 (9), 837-848, 2000 | 194 | 2000 |
Method of generating secret identification numbers PJ Koopman Jr US Patent 5,757,923, 1998 | 180 | 1998 |