default search action
Isaac Amundson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Jason Belt, John Hatcliff, Robby, John Shackleton, Jim Carciofini, Todd Carpenter, Eric Mercer, Isaac Amundson, Junaid Babar, Darren D. Cofer, David S. Hardin, Karl Hoech, Konrad Slind, Ihor Kuz, Kent McLeod:
Model-driven development for the seL4 microkernel using the HAMR framework. J. Syst. Archit. 134: 102789 (2023) - [j6]Eric Mercer, Konrad Slind, Isaac Amundson, Darren D. Cofer, Junaid Babar, David S. Hardin:
Synthesizing verified components for cyber assured systems engineering. Softw. Syst. Model. 22(5): 1451-1471 (2023) - [c18]Timothy E. Wang, Chanwook Oh, Matthew Low, Isaac Amundson, Zamira Daw, Alessandro Pinto, Massimiliano L. Chiodo, Guoqiang Wang, Saqib Hasan, Ryan Melville, Pierluigi Nuzzo:
Computer-Aided Generation of Assurance Cases. SAFECOMP Workshops 2023: 135-148 - 2022
- [j5]Darren D. Cofer, Isaac Amundson, Junaid Babar, David S. Hardin, Konrad Slind, Perry Alexander, John Hatcliff, Robby, Gerwin Klein, Corey Lewis, Eric Mercer, John Shackleton:
Cyberassured Systems Engineering at Scale. IEEE Secur. Priv. 20(3): 52-64 (2022) - [c17]Cong Liu, Junaid Babar, Isaac Amundson, Karl Hoech, Darren D. Cofer, Eric Mercer:
Assume-Guarantee Reasoning with Scheduled Components. NFM 2022: 355-372 - 2021
- [c16]Eric Mercer, Konrad Slind, Isaac Amundson, Darren D. Cofer, Junaid Babar, David S. Hardin:
Synthesizing Verified Components for Cyber Assured Systems Engineering. MoDELS 2021: 205-215 - 2020
- [c15]Darren D. Cofer, Isaac Amundson, Ramachandra Sattigeri, Arjun Passi, Christopher Boggs, Eric Smith, Limei Gilham, Taejoon Byun, Sanjai Rayadurgam:
Run-Time Assurance for Learning-Enabled Systems. NFM 2020: 361-368
2010 – 2019
- 2014
- [c14]Dongjiang You, Isaac Amundson, Scott Hareland, Sanjai Rayadurgam:
Practical aspects of building a constrained random test framework for safety-critical embedded systems. MoSEMInA 2014: 17-25 - 2013
- [j4]Isaac Amundson, Manish Kushwaha, Xenofon D. Koutsoukos:
A Method for Estimating Angular Separation in Mobile Wireless Sensor Networks. J. Intell. Robotic Syst. 71(3-4): 273-286 (2013) - 2012
- [j3]Isaac Amundson, János Sallai, Xenofon D. Koutsoukos, Ákos Lédeczi:
Mobile Sensor Waypoint Navigation via RF-Based Angle of Arrival Localization. Int. J. Distributed Sens. Networks 8 (2012) - 2011
- [j2]Isaac Amundson, János Sallai, Xenofon D. Koutsoukos, Ákos Lédeczi, Miklos Maroti:
RF angle of arrival-based node localisation. Int. J. Sens. Networks 9(3/4): 209-224 (2011) - [c13]Isaac Amundson, Xenofon D. Koutsoukos, János Sallai, Ákos Lédeczi:
Mobile Sensor Navigation Using Rapid RF-Based Angle of Arrival Localization. IEEE Real-Time and Embedded Technology and Applications Symposium 2011: 316-325 - 2010
- [j1]Branislav Kusy, Isaac Amundson, János Sallai, Péter Völgyesi, Ákos Lédeczi, Xenofon D. Koutsoukos:
RF doppler shift-based mobile sensor tracking and navigation. ACM Trans. Sens. Networks 7(1): 1:1-1:32 (2010) - [c12]János Sallai, Ákos Lédeczi, Isaac Amundson, Xenofon D. Koutsoukos, Miklós Maróti:
Using RF received phase for indoor tracking. HotEmNets 2010: 13:1-13:5 - [c11]Isaac Amundson, János Sallai, Xenofon D. Koutsoukos, Ákos Lédeczi:
Radio Interferometric Angle of Arrival Estimation. EWSN 2010: 1-16 - [p1]Manish Kushwaha, Songhwai Oh, Isaac Amundson, Xenofon D. Koutsoukos, Ákos Lédeczi:
Tracking in Urban Environments Using Sensor Networks Based on Audio-Video Fusion. Handbook of Ambient Intelligence and Smart Environments 2010: 117-148
2000 – 2009
- 2009
- [c10]Isaac Amundson, Manish Kushwaha, Xenofon D. Koutsoukos:
On the Feasibility of Determining Angular Separation in Mobile Wireless Sensor Networks. MELT 2009: 115-127 - [c9]Isaac Amundson, Xenofon D. Koutsoukos:
A Survey on Localization for Mobile Wireless Sensor Networks. MELT 2009: 235-254 - 2008
- [c8]Manish Kushwaha, Songhwai Oh, Isaac Amundson, Xenofon D. Koutsoukos, Ákos Lédeczi:
Target tracking in urban environments using audio-video signal processing in heterogeneous wireless sensor networks. ACSCC 2008: 1606-1610 - [c7]Isaac Amundson, Branislav Kusy, Péter Völgyesi, Xenofon D. Koutsoukos, Ákos Lédeczi:
Time Synchronization in Heterogeneous Sensor Networks. DCOSS 2008: 17-31 - [c6]Manish Kushwaha, Isaac Amundson, Péter Völgyesi, Parvez Ahammad, Gyula Simon, Xenofon D. Koutsoukos, Ákos Lédeczi, Shankar Sastry:
Multi-Modal Target Tracking Using Heterogeneous Sensor Networks. ICCCN 2008: 136-143 - [c5]Manish Kushwaha, Songhwai Oh, Isaac Amundson, Xenofon D. Koutsoukos, Ákos Lédeczi:
Target tracking in heterogeneous sensor networks using audio and video sensor fusion. MFI 2008: 14-19 - [c4]Isaac Amundson, Xenofon D. Koutsoukos, János Sallai:
Mobile sensor localization and navigation using RF doppler shifts. MELT 2008: 97-102 - 2007
- [c3]Manish Kushwaha, Isaac Amundson, Xenofon D. Koutsoukos, Sandeep Neema, Janos Sztipanovits:
OASiS: A Programming Framework for Service-Oriented Sensor Networks. COMSWARE 2007 - 2006
- [c2]Isaac Amundson, Manish Kushwaha, Xenofon D. Koutsoukos, Sandeep Neema, Janos Sztipanovits:
Efficient Integration of Web Services in Ambient-aware Sensor Network Applications. BROADNETS 2006 - [c1]Xenofon D. Koutsoukos, Manish Kushwaha, Isaac Amundson, Sandeep Neema, Janos Sztipanovits:
OASiS: A Service-Oriented Architecture for Ambient-Aware Sensor Networks. Monterey Workshop 2006: 125-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint