On the Frequency of Severe Terrorist Events

Kristian Skrede Gleditsch , Aaron Clauset , Maxwell Young
Journal of Conflict Resolution 51 ( 1) 58 -87

262
2007
How to scale exponential backoff: constant throughput, polylog access attempts, and robustness

Seth Gilbert , Jeremy T. Fineman , Maxwell Young , Michael A. Bender
symposium on discrete algorithms 636 -654

22
2016
Making Evildoers Pay: Resource-Competitive Broadcast in Sensor Networks

Seth Gilbert , Maxwell Young
arXiv: Distributed, Parallel, and Cluster Computing

7
2012
Resource Burning for Permissionless Systems.

Jared Saia , Maxwell Young , Diksha Gupta
arXiv: Distributed, Parallel, and Cluster Computing

2020
Adversarial indoor signal detection

Surya Kodipaka , Ajaya Dahal , Logan Smith , Nicholas Smith
Signal Processing, Sensor/Information Fusion, and Target Recognition XXX 11756 1175615

2021
Effect of the short time fourier transform on the classification of complex-valued mobile signals

Logan Smith , Nicholas Smith , Surya Kodipaka , Ajaya Dahal
Signal Processing, Sensor/Information Fusion, and Target Recognition XXX 11756

2021
Real-time location fingerprinting for mobile devices in an indoor prison setting

Nicolas Smith , Logan Smith , Surya Kodipaka , Ajaya Dahal
Signal Processing, Sensor/Information Fusion, and Target Recognition XXX 11756 1175612

2
2021
Choosing a Random Peer in Chord

Valerie King , Scott Lewis , Jared Saia , Maxwell Young
Algorithmica 49 ( 2) 147 -169

12
2007
Conflict on a communication channel

Valerie King , Jared Saia , Maxwell Young
principles of distributed computing 277 -286

21
2011
A Heuristic for Fair Correlation-Aware Resource Placement

Raouf Boutaba , Martin Karsten , Maxwell Young
Experimental Algorithms 89 -100

2
2009
Nonnegative integral subset representations of integer sets

Michael J. Collins , David Kempe , Jared Saia , Maxwell Young
Information Processing Letters 101 ( 3) 129 -133

22
2007
Approximation algorithms for minimizing segments in radiation therapy

Shuang Luan , Jared Saia , Maxwell Young ,
Information Processing Letters 101 ( 6) 239 -244

13
2007
Reducing communication costs in robust peer-to-peer networks

Jared Saia , Maxwell Young
Information Processing Letters 106 ( 4) 152 -158

22
2008
A note on improving the performance of approximation algorithms for radiation therapy

Therese Biedl , Stephane Durocher , Holger H Hoos , Shuang Luan
Information Processing Letters 111 ( 7) 326 -333

5
2011
The strategic calculus of terrorism: Substitution and competition in the Israel—Palestine conflict

Aaron Clauset , Lindsay Heger , Maxwell Young , Kristian Skrede Gleditsch
Cooperation and Conflict 45 ( 1) 6 -33

24
2010
Identifying unlabeled WiFi devices with zero-shot learning

Logan Smith , Nicholas Smith , Daniel Rayborn , Bo Tang
Automatic Target Recognition XXX 11394

2020
Classifying WiFi "physical fingerprints" using complex deep learning

Logan Smith , Nicholas Smith , Joshua Hopkins , Daniel Rayborn
Automatic Target Recognition XXX 11394

2020
Towards simulating multipath interference at detectors: a tool for validating location fingerprinting methods

Daniel Rayborn , Logan Smith , Surya Kodipaka , Nicholas Smith
Signal Processing, Sensor/Information Fusion, and Target Recognition XXIX 11423

2020
Contention Resolution with Constant Throughput and Log-Logstar Channel Accesses

Michael A. Bender , Tsvi Kopelowitz , Seth Pettie , Maxwell Young
SIAM Journal on Computing 47 ( 5) 1735 -1754

3
2018
A resource-competitive jamming defense

Valerie King , Seth Pettie , Jared Saia , Maxwell Young
Distributed Computing 31 ( 6) 419 -439

5
2018