{"id":38,"date":"2024-02-29T00:27:59","date_gmt":"2024-02-29T06:27:59","guid":{"rendered":"https:\/\/s2.smu.edu\/~mitch\/DDI\/?page_id=38"},"modified":"2024-11-10T18:51:51","modified_gmt":"2024-11-11T00:51:51","slug":"publications","status":"publish","type":"page","link":"https:\/\/s2.smu.edu\/~mitch\/DDI\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Publications<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#CC0035&#8243; divider_weight=&#8221;4px&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;25%&#8221; module_alignment=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Journal Articles&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>Journal Articles<\/h2>\n<ul>\n<li>D.L. MacFarlane and M.A. Thornton, &#8220;Higher-radix Quantum Photonic Informatics in Quantum Photonic Circuits,&#8221; Journal of Multiple-Valued Logic and Soft Computing (to appear).<\/li>\n<li>C. Hong, W. Chen, X. Wen, T.W. Manikas, P. Gui, and M.A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/Chips2024.pdf\">Controller Area Network (CAN) Bus Transceiver with Authentication Support and Enhanced Rail Converters<\/a>,&#8221; Chips, 2024.<\/li>\n<li>M. A. Taylor, A. Sinha, E. C. Larson and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jct24.pdf\">General Process Detection Through Side Channel Characterization<\/a>,&#8221; Journal of Cyber Security Technology, 2024.<\/li>\n<li>C. A. Harper, M. A. Thornton, and E. C. Larson, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/electronics-12-03962.pdf\">Automatic Modulation Classification with Deep Neural Networks<\/a>,&#8221; Electronics, 2023.<\/li>\n<li>H. Shahoei, I. G. Achu, E. J. Stewart, U. Tariq, W. V. Oxford, M. A. Thornton, and D. L. MacFarlane, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/app-optics22.pdf\">Silicon Photonics 2&#215;2 Trench Coupler Design and Foundry Fabrication<\/a>,&#8221; Applied Optics, 2022.<\/li>\n<li>H. Tian, X. Jiang, F. Trozzi, S. Xiao, E. C. Larson, and P. Tao, \u201c<a href=\"https:\/\/www.frontiersin.org\/journals\/molecular-biosciences\/articles\/10.3389\/fmolb.2021.781635\/full\">Explore Protein Conformational Space With Variational Autoencoder<\/a>,\u201d Journal on Frontiers in Molecular Biosciences, section Biological Modeling and Simulation 2021.<\/li>\n<li>Y. Wang, J. Dai, T. Morgan, M. Elsaid, A. Garbens, X. Qu, R. Steinberg, J. Gahan, and E. C. Larson, \u201c<a href=\"https:\/\/pubmed.ncbi.nlm.nih.gov\/34709538\/\">Evaluating Robotic-Assisted Surgery Training Videos with Multi-task Convolutional Neural Networks<\/a>,\u201d Journal of Robotic Surgery (JORS), 2021.<\/li>\n<li>M. Makos, N. Verma, E. C. Larson, and E. Kraka, \u201c<a href=\"https:\/\/pubs.aip.org\/aip\/jcp\/article\/155\/2\/024116\/1065040\/Generative-adversarial-networks-for-transition\">Generative Adversarial Networks for Transition State Geometry Prediction<\/a>,\u201d The Journal of Chemical Physics, 2021.<\/li>\n<li>R. Srinivas, N. Verma, E. Kraka, and E. C. Larson, \u201c<a href=\"https:\/\/pubs.acs.org\/doi\/10.1021\/acs.jcim.0c01355\">Deep Learning-Based Ligand Design Using Shared Latent Implicit Fingerprints from Collaborative Filtering<\/a>,\u201d Journal of Chemical Information and Modeling, 2021.<\/li>\n<li>N. Verma, X. Qu, F. Trozzi, M. Elsaied, N. Karki, P. Tao, B. Zoltowski, E. C. Larson, and E. Kraka, \u201c<a href=\"https:\/\/pubmed.ncbi.nlm.nih.gov\/33573266\/\">SSnet: A Deep Learning Approach for Protein-Ligand Interaction Prediction<\/a>,\u201d International Journal of Molecular Sciences, 2021.<\/li>\n<li>J. Wilson, S. Nair, S. Scielzo, and E. C. Larson, \u201c<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3448111\">Objective Measures of Cognitive Load Using Deep Multi-Modal Learning: A Use-Case in Aviation<\/a>,\u201d Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2021.<\/li>\n<li>S. Alhelaly, J. Dworak, K. Nepal, T. Manikas, P. Gui and A. L. Crouch, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9054929\">3D Ring Oscillator Based Test Structures to Detect a Trojan Die in a 3D Die Stack in the Presence of Process Variations<\/a>,&#8221; in IEEE Transactions on Emerging Topics in Computing, 2021.<\/li>\n<li>X. Ding and E. C. Larson, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0925231220308705\">Incorporating Uncertainties in Student Response Modeling by Loss Function Regularization<\/a>,\u201d Journal of Neurocomputing, 2020.<\/li>\n<li>J. Wilson, S. Nair, S. Scielzo, and E. C. Larson, \u201c<a href=\"https:\/\/commons.erau.edu\/ijaaa\/vol7\/iss3\/7\/\">Automatic Gaze Classification for Aviators: Using Multi-task Convolutional Networks as a Proxy for Flight Instructor Observation<\/a>,\u201d International Journal of Aviation, Aeronautics, and Aerospace, 2020.<\/li>\n<li>X. Ding, Z. Raziei, E. C. Larson, E. Olinick, P. Krueger, and M. Hahsler, \u201c<a href=\"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-020-00109-8\">Swapped Face Detection using Deep Learning and Subjective Assessment<\/a>,\u201d EURASIP Journal on Information Security, 2020.<\/li>\n<li>X. Wang, T. Liu, S. Guo, M. A. Thornton, and P. Gui, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8794767\">A 2.56 Gb\/s Serial Wireline Transceiver that Supports an Auxiliary Channel in 65-nm CMOS<\/a>,\u201d IEEE Transactions on VLSI, 2019.<\/li>\n<li>Y. Sun, F. Zhang, H. Jiang, K. Nepal, J. Dworak, T. W. Manikas, and R. I. Bahar, \u201c<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10836-019-05845-5\">Repurposing FPGAs for Tester Design to Enhance Field-Testing in a 3D Stack<\/a>,\u201d Journal of Electronic Testing: Theory and Applications (JETTA), 2019.<\/li>\n<li>K. N. Smith and M. A. Thornton, \u201c<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3345501\">Higher Dimension Quantum Entanglement Generators<\/a>,\u201d ACM Journal on Emerging Technologies in Computing Systems, 2019.<\/li>\n<li>J. M. Medellin and M. A. Thornton, \u201c<a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3543874\">Consideration of Quality Attribute Tradeoffs of the Blockchain Pattern in the Software Development Process<\/a>,\u201d Annals of Emerging Technologies in Computing, 2019.<\/li>\n<li>T. Giallanza, T. Siems, E. Sharp, E. Gabrielsen, I. Johnson, M. A. Thornton, and E. C. Larson, \u201c<a href=\"https:\/\/s2.smu.edu\/~eclarson\/pubs\/2019Keyboard.pdf\">Keyboard Snooping from Mobile Phone Arrays with Mixed Convolutional and Recurrent Neural Networks<\/a>,\u201d Proc. of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019.<\/li>\n<li>K. N. Smith, T. P. LaFave Jr., D. L. MacFarlane, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jal18.pdf\">Higher-Radix Chrestenson Gates for Photonic Quantum Computation<\/a>,\u201d Journal of Applied Logics, 2018.<\/li>\n<li>X. Ding, D. Nassehi, and E. C. Larson, \u201c<a href=\"https:\/\/s2.smu.edu\/~eclarson\/pubs\/2018pulseox.pdf\">Measuring Oxygen Saturation using Convolutional Neural Networks on Smartphones<\/a>,\u201d IEEE Journal of Biomedical and Health Informatics, 2018.<\/li>\n<li>C. Wang, X. Ding, and E. C. Larson. \u201c<a href=\"https:\/\/s2.smu.edu\/~eclarson\/pubs\/2017.PupilNet.IMWUT.pdf\">PupilNet, Measuring Task Evoked Pupillary Response using Commodity RGB Tablet Cameras: Comparison to Mobile, Infrared Gaze Trackers for Inferring Cognitive Load<\/a>,\u201d 2017.<\/li>\n<li>S. D. Gupta and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jetcas16.pdf\">A Fixed-Point Squaring Algorithm Using an Implicit Radix Number System<\/a>,\u201d IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2016.<\/li>\n<li>P. Niemann, R. Wille, D. M. Miller, M. A. Thornton, and R. Drechsler, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/tcad16.pdf\">QMDDs: Efficient Quantum Function Representation and Manipulation<\/a>,\u201d IEEE Transactions on Computer-Aided Design, 2016.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7035026\">Simulation and Implication Using a Transfer Function Model for Switching Logic<\/a>,\u201d IEEE Transactions on Computers, 2015.<\/li>\n<li>K. Nepal, S. Alhelaly, J. Dworak, R. I. Bahar, T. W. Manikas, and P. Gui, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7031420\">Repairing a 3D Die-Stack Using Available Programmable Logic<\/a>,\u201d IEEE Trans. Computer-Aided Design of Integrated Circuits, 2015.<\/li>\n<li>D. Y. Feinstein and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jmvl15a.pdf\">Quantum Multiple-Valued Decision Diagrams Containing Skipped Variables<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2015.<\/li>\n<li>T. W. Manikas, M. A. Thornton, and D. Y. Feinstein, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jmvl15b.pdf\">Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision Diagrams<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2015 (Invited Paper).<\/li>\n<li>S. Nagayama, T. Sasao, J. Butler, M. Thornton, and T. W. Manikas, \u201cOn Optimizations of Edge-Valued MDDs for Fast Analysis of Multi-State Systems,\u201d IEICE Transactions on Information and Systems, 2014.<\/li>\n<li>R. P. Menon and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jmvl14a.pdf\">Clock Distribution Area Reduction Using a Multiple-Valued Clocking Approach<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2014.<\/li>\n<li>P. Laplante, B. Kalinowski, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/sqp12.pdf\">A Principles and Practices Exam Specification to Support Software Engineering Licensure in the USA<\/a>,\u201d Software Quality Professional, 2012.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/www.computer.org\/csdl\/magazine\/cs\/2012\/05\/mcs2012050085\/13rRUxbTMt9\">Professional Licensure for Software Engineers: An Update<\/a>,\u201d IEEE Computing in Science and Engineering, IEEE Computer Society Press and American Institute of Physics, 2012.<\/li>\n<li>D. Y. Feinstein and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jmvl12.pdf\">Reversible Logic Synthesis Based on Decision Diagram Variable Ordering<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2012.<\/li>\n<li>D. Easton and M. A. Thornton, \u201cBusiness Process Development Through the Use of a Modified Axiomatic Design Methodology,\u201d Journal of International Business Management &amp; Research, 2011.<\/li>\n<li>T. W. Manikas, L. L. Spenner, P. D. Krier, M. A. Thornton, S. Nair, and S. A. Szygenda, \u201cAn Axiomatic Analysis Approach for Large-Scale Disaster-Tolerant Systems Modeling,\u201d Journal of Systematics, Cybernetics and Informatics, 2011.<\/li>\n<li>S. Barrett and M. A. Thornton, \u201c<a href=\"https:\/\/www.computer.org\/csdl\/magazine\/cs\/2010\/04\/mcs2010040062\/13rRUxD9h15\">To PE or not to PE: The Sequel<\/a>,\u201d IEEE Computing in Science and Engineering, IEEE Computer Society Press and American Institute of Physics, 2010.<\/li>\n<li>D. Y. Feinstein, M. A. Thornton, and D.M. Miller, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jmvl09.pdf\">Minimization of Quantum Multiple-Valued Decision Diagrams Using Data Structure Metrics<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2009.<\/li>\n<li>W. Chen, M. A. Thornton, and P. Gui, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/eleclet09.pdf\">A Redundant Signed Binary Addition Based Digital-to-Frequency Converter<\/a>,\u201d IET Electronics Letters, 2009.<\/li>\n<li>A. Fit-Florea, L. Li, M. A. Thornton, and D. W. Matula, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/4663061\">A Discrete Logarithm Number System for Integer Arithmetic Modulo 2k: Algorithms and Lookup Structures<\/a>,\u201d IEEE Transactions on Computers, 2009.<\/li>\n<li>D. Easton, M. A. Thornton, V.S.S. Nair, and S. A. Szygenda, \u201c<a href=\"https:\/\/www.iiisci.org\/journal\/pdv\/sci\/pdfs\/S683SZB.pdf\">A Methodology for Disaster Tolerance Utilizing the Concepts of Axiomatic Design<\/a>,\u201d IIIS Journal of Systemics, Cybernetics and Informatics, 2008.<\/li>\n<li>C. M. Lawler, M. A. Harper, S. A. Szygenda, and M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/4197953\">Components of Disaster Tolerant Computing: Analysis of Disaster Recovery, IT Application Downtime &amp; Executive Visibility<\/a>,\u201d International Journal of Business Information Systems, 2008.<\/li>\n<li>D. M. Miller, D. Y. Feinstein, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/jmvl07.pdf\">QMDD Minimization using Sifting for Variable Reordering<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2007.<\/li>\n<li>L. Li, M. A. Thornton, and S. Szygenda, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iiis06.pdf\">Integrated Design Validation: Combining Simulation and Formal Verification in Integrated Circuit Design<\/a>,\u201d IIIS Journal of Systemics, Cybernetics and Informatics, 2006.<\/li>\n<li>R. B. Reese, M. A. Thornton, and C. Traver, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/toc05.pdf\">A Coarse-Grain Phased Logic CPU<\/a>,\u201d IEEE Transactions on Computers, 2005.<\/li>\n<li>R. B. Reese, M. A. Thornton, C. Traver, and D. Hemmendinger, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/1411932\">Early Evaluation for Performance Enhancement in Phased Logic<\/a>,\u201d IEEE Transactions on Computer Aided Design, 2005.<\/li>\n<li>A. Fit-Florea, D.W. Matula, and M. A. Thornton \u201cAdditive Bit-serial Algorithm for the Discrete Logarithm Modulo 2k,\u201d IET Electronics Letters, 2005.<\/li>\n<li>A. Fit-Florea, D.W. Matula, and M. A. Thornton \u201cAddition-based Exponentiation Modulo 2k,\u201d IET Electronics Letters, 2005.<\/li>\n<li>M. A. Thornton and D. M. Miller, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/mvljourn.pdf\">Computation of Discrete Function Chrestenson Spectrum Using Cayley Color Graphs<\/a>,\u201d Journal of Multiple-Valued Logic and Soft Computing, 2004.<\/li>\n<li>M. A. Thornton, \u201cMixed-radix MVL Function Spectral and Decision Diagram Representation,\u201d Automation and Remote Control, 2004 (Invited paper, in English and Russian).<\/li>\n<li>R. B. Reese, M. A. Thornton, and C. Traver, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/eleclet204.pdf\">A Two-phase Micropipeline Control Wrapper with Early Evaluation<\/a>,\u201d IET Electronics Letters, 2004.<\/li>\n<li>R. B. Reese, M. A. Thornton, and C. Traver, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/eleclet04.pdf\">A Fast Two-phase Micropipeline Control Wrapper for Standard Cell Implementation<\/a>,\u201d IET Electronics Letters, 2004.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/pplet.pdf\">Performance Evaluation of a Parallel Decoupled Data Driven Multiprocessor<\/a>,\u201d Parallel Processing Letters, 2003.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0045790601000271\">A Signed Binary Addition Circuit Based on an Alternative Class of Addition Tables<\/a>,\u201d Computers &amp; Electrical Engineering, 2003.<\/li>\n<li>R. Drechsler, M. Kerttu, P. Lindgren, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/cjece.pdf\">Low Power Optimization Techniques for BDD Mapped Circuits Using Temporal Correlation<\/a>,\u201d Canadian Journal of Electrical and Computer Engineering, 2002 (Invited Paper).<\/li>\n<li>M. A. Thornton, R. Drechsler, and W. G\u00fcnther, \u201cLogic Circuit Equivalence Checking Using Haar Spectral Coefficients and Partial BDDs,\u201d VLSI Design, 2002.<\/li>\n<li>A. \u017du\u017eek, R. Drechsler, and M. A. Thornton, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167926000000031\">Boolean Function Representation and Spectral Characterization Using AND\/OR Graphs<\/a>,\u201d Integration, The VLSI Journal, 2000.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/307988.308000\">Behavioral Synthesis of Combinational Logic Using Spectral Based Heuristics<\/a>,\u201d ACM Transactions on Design Automation of Electronic Systems, 1999.<\/li>\n<li>M. A. Thornton and D. L. Andrews, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/cit98.pdf\">Resource Estimation for Parallel Architectures with Distributed Processor\/Memory Nodes<\/a>,\u201d Journal of Computing and Information Technology, 1998.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/599901\/\">Signed Binary Addition Circuitry with Inherent Even Parity Outputs<\/a>,\u201d IEEE Transactions on Computers, 1997.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201cBDD Based Spectral Approach for Reed-Muller Circuit Realisation,\u201d IET Proceedings-Computers and Digital Techniques, 1996.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/469660\/\">Efficient Calculation of Spectral Coefficients and their Application<\/a>,\u201d IEEE Transactions on Computer Aided Design, 1995.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/dspjrn94.pdf\">Efficient Spectral Coefficient Calculation Using Circuit Output Probabilities<\/a>,\u201d Digital Signal Processing: A Review Journal, 1994.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Conferences&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>&nbsp;<\/p>\n<h2>Conferences<\/h2>\n<ul>\n<li>W. Chen, C. Hong, X. Wen, P. Gui, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/mwscas24.pdf\">Controller Area Network (CAN) Bus Transceiver with Enhanced Rail Converter<\/a>,&#8221; IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2024.<em><br \/><\/em><\/li>\n<li>S. Gibbs, V. Tanner, E. Larson, S. Scielzo, A. Abraham, &#8220;Towards a Real-Time Model of Trust in Human-Machine Team Paradigms,&#8221; NTSA Interservice\/Industry Training, Simulation, and Education Conference (I\/ITSEC), 2024.<\/li>\n<li>J. M. Henderson, E. R. Henderson, C. A. Harper, H. Shahoei, W. V. Oxford, E. C. Larson, D. L. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl24.pdf\">A Photonic Physically Unclonable Function&#8217;s Resilience to Multiple-Valued Machine Learning Attacks<\/a>,&#8221; IEEE Symposium on Multiple-Valued Logic (ISMVL), 2024.<\/li>\n<li>E. R. Henderson, J. M. Henderson, W. V. Oxford, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie24a.pdf\">Automated Quantum Circuit Generation for Computing Inverse Hash Functions<\/a>,&#8221; SPIE Proceedings 13208, DCS24 SPIE Quantum Information Science, Sensing, and Computation XVI, 2024.<\/li>\n<li>D. L. MacFarlane, A. Helmy, H. Shahoei, T. LaFave, M. A. Thornton, E. Stewart, and W. V. Oxford, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie24b.pdf\">Towards a Photonic Integrated Circuit Realization of Polarization-Encoded Qubits<\/a>,&#8221; SPIE Proceedings Volume 13208, DCS24 SPIE Quantum Information Science, Sensing, and Computation XVI, 2024.<\/li>\n<li>E. R. Henderson, J. M. Henderson, H. Shahoei, W. V. Oxford, E. C. Larson, D. L. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie24c.pdf\">Designing a Photonic Physically Unclonable Function having Resilience to Machine Learning Attacks<\/a>,&#8221; SPIE Proceedings Volume 13208, DCS24 SPIE Quantum Information Science, Sensing, and Computation XVI, 2024.<\/li>\n<li>C. A. Harper, M. A. Thornton, and E. C. Larson, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icassp24.pdf\">Learnable Statistical Moments Pooling for Automatic Modulation Classification<\/a>,&#8221; IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024.<\/li>\n<li>M. Lee, C. A. Harper, W. Flinchbaugh, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/aipr23a.pdf\">Impacts of Synthetically Generated Data on Trackformer-based Multi-object Tracking<\/a>,&#8221; IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2023.<\/li>\n<li>J. Sylvester, M. Lee, D. C. Ellis, M. A. Thornton, and E. C. Larson, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/aipr23b.pdf\">Using Time Series Clustering to Inform Multimodal CNN Architectures<\/a>,&#8221; IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2023.<\/li>\n<li>M. A. Thornton, W. V. Oxford, J. Gable, J. Sylvester, M. Lee, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icmc23.pdf\">Assessing Random Bit Generator Quality with Granger Causality Extensions<\/a>,&#8221; International Cryptographic Modules Conference (ICMC), 2023.<\/li>\n<li>D. L. MacFarlane, H. Shahoei, I. G. Achu, E. Stewart, W. V. Oxford, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl23.pdf\">Multiple-Valued Logic Physically Unclonable Function in Photonic Integrated Circuits<\/a>,&#8221; IEEE Symposium on Multiple-Valued Logic (ISMVL), 2023.<\/li>\n<li>S. Gibbs, M. A. Thornton, and D. L. Young, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie23e.pdf\">City Scale Autonomy Learning<\/a>,&#8221; SPIE 12525, Geospatial Informatics XIII, 2023.<\/li>\n<li>A. Sinha, E. R. Henderson, J. M. Henderson, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie23a.pdf\">A Programmable True Random Number Generator using Commercial Quantum Computers<\/a>,&#8221; SPIE 12517, Quantum Information Science, Sensing, and Computation XV, 2023.<\/li>\n<li>J. M. Henderson, E. R. Henderson, A. Sinha, M. A. Thornton, and D. M. Miller, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie23b.pdf\">Automated Quantum Oracle Synthesis with a Minimal Number of Qubits<\/a>,&#8221; SPIE 12517, Quantum Information Science, Sensing, and Computation XV, 2023.<\/li>\n<li>S. Gibbs, M. A. Thornton, and D. L. Young, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/spie23c.pdf\">Adding RF Situational Awareness to Robotic Simulation Systems<\/a>,&#8221; SPIE 12540, Autonomous Systems: Sensors, Processing and Security for Ground, Air, Sea and Space Vehicles and Infrastructure, 2023.<\/li>\n<li>C. Peters and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/aero23.pdf\">Cooperative UAS Geolocation of Emitters with Multi-Sensor-bounded Timing and Localization Error<\/a>,&#8221; IEEE Aerospace Conference (AERO), 2023.<\/li>\n<li>Z. Wolf, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icissp23.pdf\">Data Leakage in Isolated Virtualized Enterprise Computing Systems<\/a>,&#8221; International Conference on Information Systems Security and Privacy (ICISSP), 2023.<\/li>\n<li>A. Sinha, E. R. Henderson, J. M. Henderson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/qcs22.pdf\">Automated Quantum Memory Compilation with Improved Dynamic Range<\/a>,&#8221; International Conference for High Performance Computing, Networking, Storage, and Analysis (SC22), International Workshop on Quantum Computing software (QSC22), 2022.<\/li>\n<li>G. Sammit, Z. Wu, Y. Wang, Z. Wu, A. Kamata, J. Nese, and E. C. Larson, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9747391\/\">Automated Prosody Classification for Oral Reading Fluency with Quadratic Kappa Loss and Attentive X-vectors<\/a>,\u201d International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2022), 2022.<\/li>\n<li>N. Crothers, Y. Sinha, S. Scielzo, and E. C. Larson, \u201c<a href=\"https:\/\/s2.smu.edu\/~eclarson\/pubs\/2022_MODSIM.pdf\">Real-Time Situation Awareness Assessment for Pilots via Machine Learning: Constructing an Automated Classification System<\/a>,\u201d Modeling &amp; Simulation (MODSIM) World, 2022.<\/li>\n<li>D. L. Young, M. Bigham, M. Bradbury, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/aipr22.pdf\">SMU-DDI Cyber Autonomy Range<\/a>,&#8221; IEEE Applied Imagery Pattern Recognition Workshop (AIPR), 2022.<\/li>\n<li>R. Oshana, M. Caraman, N. Srirama, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/csce22.pdf\">An Embedded Malware Detection System using a Support Vector Machine<\/a>,&#8221; International Conference on Embedded Systems, Cyber-physical Systems and Applications (ESCS) in the World Congress in Computer Science, Computer Engineering and Applied Computing (CSCE), proceedings published in Springer Nature-Transactions on Computational Science and Computational Intelligence, 2022.<\/li>\n<li>R. Oshana, M. Caraman, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/meco22.pdf\">A Side Channel Attack Detection System using Processor Core Events and a Support Vector Machine<\/a>,&#8221; IEEE Mediterranean Conference on Embedded Computing (MECO), 2022.<\/li>\n<li>X. Wen, T. Fu, J. Liu, R. Hua, M. A. Thornton, and P. Gui. &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iscas22.pdf\">Controller Area Network (CAN) Bus Transceiver with Authentication Support<\/a>,&#8221; IEEE International Symposium on Circuits and Systems (ISCAS), 2022.<\/li>\n<li>A. Sinha and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl22.pdf\">Quantum Multiple Valued Kernel Circuits<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2022.<\/li>\n<li>M. A. Taylor, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/syscon22.pdf\">General Process Detection Through Physical Side Channel Characterization<\/a>,&#8221; IEEE Systems Conference (SYSCON), 2022.<\/li>\n<li>M. Lee, J. Sylvester, S. Aggarwal, A. Sinha, M. Taylor, N. Srirama, E.C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icissp22.pdf\">Side Channel Identification using Granger Time Series Clustering with Applications to Control Systems<\/a>,&#8221; International Conference on Information Systems Security and Privacy (ICISSP), 2022.<\/li>\n<li>C. A. Harper, A. Sinha, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/asilomar21.pdf\">SNR-Boosted Automatic Modulation Classification<\/a>&#8220;, IEEE Asilomar Conference on Signals, Systems, and Computers (ASILOMAR), 2021.<\/li>\n<li>A. Sinha, M. A. Taylor, N. Srirama, T. W. Manikas, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ccta21.pdf\">Industrial Control System Anomaly Detection using Convolutional Neural Network Consensus<\/a>,&#8221; IEEE Conference on Control Technology and Applications (CCTA), 2021.<\/li>\n<li>M. A. Taylor, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/csr21.pdf\">Rapid Ransomware Detection Through Side Channel Exploitation<\/a>,&#8221; IEEE Conference on Cyber Security and Resilience (CSR), 2021.<\/li>\n<li>R. Oshana, E. C. Larson, M. A. Thornton, and X. Roumegue, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/syscon21.pdf\">Real-Time Edge Processing Detection of Malicious Attacks using Machine Learning and Processor Core Events<\/a>,&#8221; IEEE Systems Conference (SYSCON), 2021.<\/li>\n<li>Y. Sun, H. Jiang, L. Ramakrishnan, J. Dworak, K. Nepal, T. Manikas, and R. I. Bahar, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9611338\/\">Low Power Shift and Capture through ATPG-Configured Embedded Enable Capture Bits<\/a>,\u201d 2021 IEEE International Test Conference, 2021.<\/li>\n<li>E. Tsang, P. Foster, E. Adams, L. Ketterlin-Geller, E.C. Larson, and C. Clark. \u201c<a href=\"https:\/\/par.nsf.gov\/servlets\/purl\/10353043\">A Standard Decomposition Process to Inform the Development of Game-Based Learning Environments Focused on Computational Thinking<\/a>,\u201d International Conference of Computational Thinking and STEM Education (CTE-STEM), 2021.<\/li>\n<li>L. Wood and E. C. Larson, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9414587\">Parametric Spectral Filters for Fast Converging, Scalable Convolutional Neural Networks<\/a>,\u201d 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021.<\/li>\n<li>K. N. Smith, D. L. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl20a.pdf\">A Quantum Photonic TRNG based on Higher-radix Logic<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2020.<\/li>\n<li>K. N. Smith, M. A. Thornton, and D. M. Miller, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl20b.pdf\">Fast Minimization of Polynomial Decomposition using Fixed-polarity Pascal Transforms<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2020.<\/li>\n<li>K. N. Smith, D. L. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl20a.pdf\">A Quantum Photonic TRNG based on Higher-radix Logic<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2020.<\/li>\n<li>M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/itc20.pdf\">Introduction to Quantum Computation Reliability<\/a>,&#8221; IEEE International Test Conference (ITC), 2020.<\/li>\n<li>C. A. Harper, L. Lyons, M. A. Thornton, and E. C. Larson, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/asilomar20.pdf\">Enhanced Automatic Modulation Classification using Deep Convolutional Latent Space Pooling<\/a>,&#8221; IEEE Asilomar Conference on Signals, Systems, and Computers (ASILOMAR), 2020.<\/li>\n<li>S. Scielzo, J. Wilson, and E. C. Larson, \u201cTowards the Development of an Automated, Real-Time, Objective Measure of Situation Awareness for Pilots,\u201d Interservice\/Industry Training, Simulation &amp; Education Conference (I\/ITSEC), 2020, (Overall Best Paper Winner, Platinum Paper, among all papers at conference).<br \/>X. Ding and E. C. Larson, \u201c<a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3386527.3406729\">Automatic RNN Cell Design for Knowledge Tracing using Reinforcement Learning<\/a>,\u201d 7th ACM Conference on Learning @ Scale, 2020.<\/li>\n<li>S. Douglas and E. C. Larson, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8682814\">Relationships Between Deep Learning and Linear Adaptive Systems<\/a>,\u201d IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019 (Invited Paper).<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icrc19.pdf\">Entangled State Preparation for Non-Binary Quantum Computing<\/a>,&#8221; IEEE International Conference on Rebooting Computing (ICRC), 2019.<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/pacrim19.pdf\">Fixed Polarity Pascal Transforms with Computer Algebra Applications<\/a>,&#8221; IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing (PACRIM), 2019.<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/mwscas19.pdf\">Quantum Logic Synthesis with Formal Verification<\/a>,&#8221; IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2019.<\/li>\n<li>J. Medellin and M. A. Thornton, &#8220;<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-23943-5_2\">A Discussion on Blockchain Software Quality Attribute Design and Tradeoffs<\/a>,&#8221; International Conference on Emerging Topics in Computing (iCETiC), 2019 (Best Paper Award).<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/lyle.smu.edu\/~mitch\/ftp_dir\/pubs\/isca2019.pdf\">A Quantum Computational Compiler and Design Tool for Technology-specific Targets<\/a>,&#8221; IEEE International Symposium on Computer Architecture (ISCA), 2019.<\/li>\n<li>K. N. Smith, M. A. Thornton, M. Soeken, B. Schmitt, and G. De Micheli, &#8220;<a href=\"https:\/\/lyle.smu.edu\/~mitch\/ftp_dir\/pubs\/qpl2019.pdf\">Using ZDDs in the Mapping of Quantum Circuits<\/a>,&#8221; Quantum Physics and Logic Conference (QPL), 2019.<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl19b.pdf\">Entanglement in Higher-Radix Quantum Systems<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2019.<\/li>\n<li>\u00a0T. Giallanza, E. Gabrielsen, M. A. Taylor, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl19a.pdf\">Task Value Calculus: Multi-objective Tradeoff Analysis using Multiple-valued Decision Diagrams<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2019.<\/li>\n<li>M. A. Thornton and D. L. MacFarlane, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/qtop19.pdf\">Quantum Photonic TRNG with Dual Extractor<\/a>,&#8221; International Conference on Networked Systems\/Workshop on Quantum Technology and Optimization Problems (NetSys\/QTOP), Springer-Verlag LNCS 2019.<\/li>\n<li>J. Medellin and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/gcc18.pdf\">Performance Characteristics of Two Blockchain Consensus Algorithms in a VMware Hypervisor<\/a>,&#8221; in proc. <em>International Conference on Grid, Cloud, and Cluster Computing<\/em> (GCC), 2018.<\/li>\n<li>J. Medellin and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/msv18.pdf\">Simulating Resource Consumption in Three Blockchain Consensus Algorithms<\/a>,&#8221; in proc. <em>International Conference on Modeling, Simulation and Visualization Methods<\/em> (MSV), 2018.<\/li>\n<li>X. Wang, T. Liu, S. Guo, M. A. Thornton, and P. Gui, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rfic18.pdf\">A 2.56 Gbps Asynchronous Serial Transceiver with Embedded 80 Mbps Secondary Data Transmission Capability in 65nm CMOS<\/a>,&#8221; IEEE Radio Frequency Integrated Circuits Symposium (RFIC), 2018.<\/li>\n<li>M. A. Thornton and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl18a.pdf\">Multiple-Valued Random Digit Extraction<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2018.<\/li>\n<li>K. N. Smith, T. P. LaFave Jr., D. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl18b.pdf\">A Radix-4 Chrestenson Gate for Optical Quantum Computation<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2018.<\/li>\n<li>M. A. Taylor, K. N. Smith, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ftc17.pdf\">Sensor-Based Ransomware Detection<\/a>,&#8221; Future Technologies Conference (FTC), 2017.<\/li>\n<li>D. K. Houngninou and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/mwscas17.pdf\">Simulation of Switching Circuits using Transfer Functions<\/a>,&#8221; IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2017.<\/li>\n<li>K. N. Smith, M. A. Taylor, A. A. Carroll, T. W. Manikas, and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/syscon17.pdf\">Automated Markov-chain Based Analysis for Large State Spaces<\/a>,&#8221; IEEE International Systems Conference (SYSCON), 2017.<\/li>\n<li>A. R. Alharbi and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icmla16.pdf\">Demographic Group Prediction Based on Smart Device User Recognition Gestures<\/a>,&#8221; IEEE International Conference on Machine Learning and Applications (ICMLA), 2016.<\/li>\n<li>D. K. Houngninou and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iscas16.pdf\">Implementation of Switching Circuit Models as Transfer Functions<\/a>,&#8221; IEEE International Symposium on Circuits and Systems (ISCAS), 2016.<\/li>\n<li>P. C. Davis, M. A. Thornton, and T. W. Manikas, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/syscon16.pdf\">Reliability Block Diagram Extensions for Non-Parametric Probabilistic Analysis<\/a>,&#8221; IEEE International Systems Conference (SYSCON), 2016.<\/li>\n<li>A. R. Alharbi and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/icmla15.pdf\">Demographic Group Classification of Smart Device Users<\/a>,&#8221; IEEE International Conference on Machine Learning and Applications (ICMLA), 2015.<\/li>\n<li>T. W. Manikas, M. A. Thornton, S. Nagayama, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/sdps15.pdf\">An Improved Methodology for System Threat Analysis using Multiple-Valued Logic and Conditional Probabilities<\/a>,&#8221; Society for Design and Process Science (SDPS), 2015.<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/dcas15.pdf\">A Multiple-Valued Logic Synthesis Tool for Optical Computing Elements<\/a>,&#8221; IEEE Dallas Circuits and Systems Conference (DCAS), 2015.<\/li>\n<li>S. Nagayama, T. Sasao, J. T. Butler, M. A. Thornton, and T. W. Manikas, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl15.pdf\">Edge Reduction for EVMDDs to Speed Up Analysis of Multi-State Systems<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2015.<\/li>\n<li>M. A. Thornton, T. W. Manikas, S. A. Szygenda, and S. Nagayam, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl14a.pdf\">System Probability Distribution Modeling Using MDDs<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2014.<\/li>\n<li>S. Nagayama, T. Sasao, J. T. Butler, M. A. Thornton, and T. W. Manikas, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl14b.pdf\">Analysis Methods of Multi-State Systems Partially having Dependent Components using Multiple-Valued Decision Diagrams<\/a>,&#8221; IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2014.<\/li>\n<li>K. Nepal, X. Shen, J. Dworak, T. W. Manikas, and R. I. Bahar, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/6653613\">Built-in Self-Repair in a 3D Die Stack Using Programmable Logic<\/a>,\u201d IEEE Symposium Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2013.<\/li>\n<li>J. Moore, M. A. Thornton, and D. W. Matula, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/mwscas13.pdf\">Low Power Floating-Point Multiplication and Squaring Units with Shared Circuitry<\/a>,\u201d IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2013.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl13a.pdf\">A Transfer Function Model for Ternary Switching Logic Circuits<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2013,<\/li>\n<li>M. A. Thornton and J. Dworak, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/6524682\">Ternary Logic Network Justification Using Transfer Matrices<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2013.<\/li>\n<li>M. A. Thornton and T. W. Manikas, \u201c<a href=\"https:\/\/s2.smu.edu\/~manikas\/Pubs\/Thornton_ISMVL_13.pdf\">Spectral Response of Ternary Logic Netlists<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2013.<\/li>\n<li>D. Y. Feinstein and M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/6214826\">Using the Asynchronous Paradigm for Reversible Sequential Circuit Implementation<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2012.<\/li>\n<li>R. P. Menon and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rohit_thesis.pdf\">Global Multiple-Valued Clock Approach for High-Performance Multi-Phase Clock Integrated Circuits<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2012.<\/li>\n<li>T. W. Manikas, D. Y. Feinstein, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~manikas\/Pubs\/Manikas_ISMVL_12.pdf\">Modeling Medical System Threats with Conditional Probabilities Using Multiple-Valued Logic Decision Diagrams<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2012.<\/li>\n<li>R. B. Reese, S. A. Smith, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/async12.pdf\">Uncle-An RTL Approach to Asynchronous Design<\/a>,\u201d IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC), 2012.<\/li>\n<li>S. Pham, J. L. Dworak, and T. W. Manikas, \u201c<a href=\"https:\/\/s2.smu.edu\/~manikas\/Pubs\/Pham_NATW_2012.pdf\">An Analysis of Differences Between Trojans Inserted at RTL and at Manufacturing with Implications for their Detectability<\/a>,\u201d IEEE North Atlantic Test Workshop, 2012.<\/li>\n<li>D. Y. Feinstein and M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5954227\">On the Skipped Variables of Quantum Multiple-Valued Decision Diagrams<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2011.<\/li>\n<li>T. W. Manikas, M. A. Thornton, and D. Y. Feinstein, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl11a.pdf\">Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2011.<\/li>\n<li>D. M. Easton and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iic11.pdf\">A Compliance Framework to Optimize Product Development in a Regulated Industry<\/a>,\u201d Intellectbase International Consortium Academic Conference, 2011.<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/eurocast11.pdf\">Spectral Analysis of Digital Logic Circuit Netlists<\/a>,\u201d International Conference on Computer Aided Systems Theory (EUROCAST), 2011.<\/li>\n<li>T. W. Manikas, \u201cModeling of Large-Scale Disaster-Tolerant Systems,\u201d Society for Design and Process Science Conference (SDPS), 2010.<\/li>\n<li>S. Datla and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl10.pdf\">Quaternary Voltage-Mode Logic Cells and Fixed-Point Multiplication Circuits<\/a>,\u201d IEEE International Symposium on Mulitple-Valued Logic (ISMVL), 2010.<\/li>\n<li>T. W. Manikas, L. L. Spenner, P. D. Krier, M. A. Thornton, S. Nair, and S. A. Szygenda, \u201cAn Axiomatic Analysis Approach for Large-Scale Disaster-Tolerant Systems Modeling,\u201d International Multi-Conference on Complexity, Informatics, and Cybernetics (IMIC10), International Conference on Computing, Communications and Control Technologies (CCCT) Int. Institute of Informatics and Systemics (IIIS), 2010 (Best Paper Award).<\/li>\n<li>P. Ongsakorn, K. Turney, M. A. Thornton, S. Nair, S. Szygenda, and T. W. Manikas, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5482351\">Cyber Threat Trees for Large System Threat Cataloging and Analysis<\/a>,\u201d IEEE Systems Conference (SYSCON), 2010.<\/li>\n<li>L. Spenner, P. Krier, M. A. Thornton, S. Nair, S. Szygenda, and T. W. Manikas, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5482449\">Large System Decomposition and Simulation Methodology Using Axiomatic Analysis<\/a>,\u201d IEEE International Systems Conference, (SYSCON), 2010.<\/li>\n<li>T. W. Manikas and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/raytheon10.pdf\">Axiomatic Analysis and Cyber Threat Tree Models for the Development of Large-Scale Disaster-Tolerant Information Security Systems<\/a>,\u201d Symposium on Information Systems and Computing Technology Network (ISaCTN), 2010.<\/li>\n<li>W. Chen, M. A. Thornton, and P. Gui, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5236046\">A Digital-to-Frequency Converter Using Redundant Signed Binary Addition<\/a>,\u201d IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2009.<\/li>\n<li>S. Datla, M. A. Thornton, and D. W. Matula, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/asap09.pdf\">A Low Power High Performance Radix-4 Approximate Squaring Circuit<\/a>,\u201d IEEE International Conference on Application-specific Systems, Architectures, and Processors (ASAP), 2009.<\/li>\n<li>D. Feinstein and M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5010388\">On the Guidance of Reversible Logic Synthesis by Dynamic Variable Ordering<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2009.<\/li>\n<li>S. Datla, M. A. Thornton, L. Hendrix, and D. Henderson, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/5010409\">Quaternary Addition Circuits Based on SUSLOC Voltage-Mode Cells and Modeling with System Verilog<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2009.<\/li>\n<li>M. A. Thornton, D. W. Matula, L. Spenner, and D. M. Miller, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl08a.pdf\">Quantum Logic Implementation of Unary Arithmetic Operations<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2008.<\/li>\n<li>D. Y. Feinstein, M. A. Thornton, and D. M. Miller, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/date08.pdf\">Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits<\/a>,\u201d Proceedings of the IEEE\/ACM Design, Automation and Test in Europe (DATE), 2008.<\/li>\n<li>L. Li, F. Coyle, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/fdl07.pdf\">UML to SystemVerilog Synthesis for Embedded System Models with Support for Assertion Generation<\/a>,\u201d Proceedings of the ECSI Forum on Design Languages, 2007.<\/li>\n<li>K. Fazel, J. E. Rice, and M. A. Thornton, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/4313212\">ESOP-based Toffoli Gate Cascade Generation<\/a>,\u201d Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007.<\/li>\n<li>D. Easton, M. A. Thornton, V. S. S. Nair, and J. Stracener, \u201cAxiomatic Design in the Biomedical Device Industry,\u201d Proceedings of the 11th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI), 2007.<\/li>\n<li>D. Easton, M. A. Thornton, and V. S. S. Nair, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iiis08.pdf\">Axiomatic Design Process for Disaster Tolerance<\/a>,\u201d Proceedings of the 11th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI), 2007.<\/li>\n<li>D. M. Miller, D. Y. Feinstein, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl07a.pdf\">Variable Reordering and Sifting for QMDD<\/a>,\u201d IEEE International Symposium on Multiple Valued Logic (ISMVL), 2007.<\/li>\n<li>M. Amoui, D. Grosse, M. A. Thornton, and R. Drechsler, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/4215973\">Evaluation of Toggle Coverage for MVL Circuits Specified in the SystemVerilog HDL<\/a>,\u201d IEEE International Symposium on Multiple Valued Logic (ISMVL), 2007.<\/li>\n<li>C. M. Lawler, M. A. Thornton, and S. A. Szygenda, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/syscon07b.pdf\">Techniques for Disaster Tolerant Information Technology Systems<\/a>,\u201d IEEE Systems Conference, 2007.<\/li>\n<li>M. A. Harper, M. A. Thornton, and S. A. Szygenda, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/4258848\">Disaster Tolerant Systems Engineering for Critical Infrastructure Protection<\/a>,\u201d IEEE Systems Conference, 2007.<\/li>\n<li>L. Li, A. Fit-Florea, M. A. Thornton, and D. W. Matula, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/4019498\">Performance Evaluation of a Novel Table Lookup Method and Architecture for Integer Functions<\/a>,\u201d IEEE International Conference on Application-specific Systems, Architectures, and Processors (ASAP), 2006.<\/li>\n<li>D. M. Miller, M. A. Thornton, and D. Goodman, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/1688610\">A Decision Diagram Package for Reversible and Quantum Circuit Simulation<\/a>,\u201d IEEE Congress on Evolutionary Computation, IEEE World Congress on Computational Intelligence (WCCI), 2006 (Best Paper of Session).<\/li>\n<li>D. M. Miller and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl06a.pdf\">QMDD: A Decision Diagram Structure for Reversible and Quantum Circuits<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2006.<\/li>\n<li>L. Li, M. A. Thornton, and M. A. Perkowski, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl06b.pdf\">A Quantum CAD Accelerator Based on Grover&#8217;s Algorithm for Finding the Minimum Fixed Polarity Reed-Muller Form<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2006.<\/li>\n<li>S. A. Szygenda and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/citsa05a.pdf\">Disaster Tolerant Computing and Communications<\/a>,\u201d International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2005), and International Conference on Information Systems Analysis and Synthesis (ISAS), 2005 (Invited Paper).<\/li>\n<li>M. A. Harper, C. Lawler, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/citsa05b.pdf\">IT Application Downtime, Executive Visibility and Disaster Tolerant Computing<\/a>,\u201d International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA 2005), and International Conference on Information Systems Analysis and Synthesis (ISAS), 2005 (Invited Paper).<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ismvl05.pdf\">The Karhunen-Lo\u00e8ve Transform of Discrete MVL Functions<\/a>,\u201d IEEE International Symposium on Multiple-Valued Logic (ISMVL), 2005.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Abstracts&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Abstracts<\/h2>\n<ul>\n<li>M. A. Thornton, \u201cEmbedded Systems Cyber Security at the Physical Layer,\u201d Information Systems and Computing Technology Networks (ISaCTN), (internal-only) Raytheon Technologies Conference, 2021.<\/li>\n<li>Y. Sun, H. Jiang, L. Ramakrishnan, M. Segal, J. Dworak, T. W. Manikas, K. Nepal, and R. I. Bahar, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8964790\">Test Architecture for Fine Grained Capture Power Reduction<\/a>\u201d, 2019 26th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2019.<\/li>\n<li>T. W. Manikas and M. A. Thornton, \u201cModel Checking for Security Analysis of Cyber-Physical Systems,\u201d International Conference on Data Intelligence and Security (ICDIS), 2019.<\/li>\n<li>K. N. Smith and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/fosdem19.pdf\">An Open-Source General Compiler for Quantum Computers<\/a>,\u201d Free and Open Source Developers European Meeting (FOSDEM), 2019.<\/li>\n<li>M. A. Thornton, W. V. Oxford, D. L. MacFarlane, and T. P. LaFave, Jr., \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/qsc18.pdf\">Single Qubit Quantum Ring Oscillator and Applications for Storage and True Random Number Generation<\/a>,\u201d Quantum Simulation &amp; Computation Conference (QSC), 2018.<\/li>\n<li>W. V. Oxford, J. S. Gable, M. A. Thornton, D. L. MacFarlane, and T. P. LaFave, Jr., \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ibm-thinkq17.pdf\">Design and Implementation of a Photonic Quantum Storage Device<\/a>,\u201d IBM Think Q Conference, 2017.<\/li>\n<li>M. A. Thornton, D. L. MacFarlane, T. P. LaFave, Jr., and W. V. Oxford, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/nist17.pdf\">Single Photon Quantum State Oscillator<\/a>,\u201d NIST Single Photon Workshop (SPW), 2017.<\/li>\n<li>Micah A. Thornton, J. Rendon, G. Pham, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/csp16-3.pdf\">Sample Size Calculations using Techniques from Power Analysis<\/a>,\u201d ASA Conference on Statistical Practice (CSP), 2016.<\/li>\n<li>J. Rendon, M. A. Thornton, Micah A. Thornton, and G. Pham, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/csp16-1.pdf\">Use of Hamming Weights Instead of Uniform Distributions to Analyze a Set of Strings for Randomness<\/a>,\u201d ASA Conference on Statistical Practice (CSP), 2016.<\/li>\n<li>T. W. Manikas and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/raytheon10.pdf\">Axiomatic Analysis and Cyber Threat Tree Models for the Development of Large-Scale Disaster-Tolerant Information Security Systems<\/a>,\u201d Raytheon Information Systems and Computing Technology Network Symposium (ISaCTN), 2010.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Books, Book Chapters, and Encyclopedia Articles&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Books, Book Chapters, and Encyclopedia Articles<\/h2>\n<ul>\n<li>M. A. Thornton, D. K. Houngninou, and D. M. Miller, &#8220;On Computing the Reed-Muller Spectrum\/Algebraic Normal Form for Cryptography and Switching Theory,&#8221; Chapter 1 in <strong><a href=\"https:\/\/www.cambridgescholars.com\/product\/978-1-5275-8872-1\">Advances in the Boolean Domain<\/a><\/strong>, Cambridge Scholars Publishing, Bernd Steinbach (Ed.), 2022.<\/li>\n<li>M. A. Thornton, D. K. Houngninou, and D. M. Miller, \u201cExtracting the Reed-Muller Spectrum\/Algebraic Normal Form from a Circuit Specification,\u201d Chapter 2 in <strong><a href=\"https:\/\/www.cambridgescholars.com\/product\/978-1-5275-8872-1\">Advances in the Boolean Domain<\/a><\/strong>, Cambridge Scholars Publishing, Bernd Steinbach (Ed.), 2022.<\/li>\n<li>M. A. Thornton, &#8220;<a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007\/978-3-642-27739-9_783-2\">Keyboard Dynamics<\/a>&#8220;, Article in the <strong><a href=\"https:\/\/link.springer.com\/referencework\/10.1007\/978-3-642-27739-9\">Encyclopedia of Cryptography, Security and Privacy<\/a><\/strong>, 3rd edition, S. Jajodia, P. Samarati, and M. Yung (Ed.), Springer, 2021.<\/li>\n<li>M. A. Thornton, &#8220;<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/foreward-book18.pdf\">Foreward<\/a>&#8221; in <strong><a href=\"https:\/\/www.cambridgescholars.com\/further-improvements-in-the-boolean-domain\">Further<\/a><a href=\"https:\/\/www.cambridgescholars.com\/further-improvements-in-the-boolean-domain\"> Improvements in the Boolean Domain<\/a><\/strong>, Cambridge Scholars Publishing, Bernd Steinbach (Ed.), 2018.<\/li>\n<li>M. A. Thornton, &#8220;<a href=\"http:\/\/www.cambridgescholars.com\/problems-and-new-solutions-in-the-boolean-domain\">A Vector Space Method for Boolean Networks<\/a>,&#8221; Chapter 1, Section 1.1, in <strong><a href=\"http:\/\/www.cambridgescholars.com\/problems-and-new-solutions-in-the-boolean-domain\">Problems and New Solutions in the Boolean Domain<\/a><\/strong>, Cambridge Scholars Publishing, Bernd Steinbach (Ed.), 2016.<\/li>\n<li>M. A. Thornton and M. A. Thornton, &#8220;<a href=\"http:\/\/www.cambridgescholars.com\/problems-and-new-solutions-in-the-boolean-domain\">Boolean Function Spectra and Circuit Probabilities<\/a>,&#8221; Chapter 4, Section 4.1, in <strong><a href=\"http:\/\/www.cambridgescholars.com\/problems-and-new-solutions-in-the-boolean-domain\">Problems<\/a> <a href=\"http:\/\/www.cambridgescholars.com\/problems-and-new-solutions-in-the-boolean-domain\">and<\/a> <a href=\"http:\/\/www.cambridgescholars.com\/problems-and-new-solutions-in-the-boolean-domain\">New Solutions in the Boolean Domain<\/a><\/strong>, Cambridge Scholars Publishing,Bernd Steinbach (Ed.), 2016.<\/li>\n<li>M. A. Thornton, <strong>Modeling Digital Switching Circuits with Linear Algebra<\/strong>, Morgan &amp; Claypool Publishers, 2014.<\/li>\n<li>R. Kotamarti, M. A. Thornton, and M. H. Dunham, &#8220;Quantum Computing Approach for Alignment-free Sequence Search and Classification,&#8221; Chapter 17 in <strong>Multidisciplinary Computational Intelligence Techniques: Applications in Business, Engineering, and Medicine<\/strong>, S. Ali, N. Abbadeni, and M. Batouche (Eds.), IGI-Global Press, 2012.<\/li>\n<li>M. A. Thornton and P. A. Laplante, Licensing Professional Software Engineers in the United States of America, Article in the <strong>Encyclopedia of Software Engineering<\/strong>, Taylor &amp; Francis, 2012.<\/li>\n<li>M. A. Thornton, &#8220;Keystroke Dynamics&#8221;, Article in the <strong><a href=\"https:\/\/link.springer.com\/referencework\/10.1007\/978-1-4419-5906-5\">Encyclopedia of Cryptography, Security and Privacy<\/a><\/strong>, 2nd edition, Springer Publishers, H. C. A. van Tilborg and S. Jajodia (Eds.), 2011.<\/li>\n<li>L. Li and M. A. Thornton, <strong>Digital System Verification: A Combined Formal Methods and Simulation Framework<\/strong>, Morgan &amp; Claypool Publishers, 2010.<\/li>\n<li>D. M. Miller and M. A. Thornton, <strong>Multiple-Valued Logic Concepts and Representations<\/strong>, Morgan &amp; Claypool Publishers, 2008.<\/li>\n<li>R. B. Reese and M. A. Thornton, <strong>Introduction to Logic Synthesis Using Verilog HDL<\/strong>, Morgan &amp; Claypool Publishers, 2006.<\/li>\n<li>M. A. Thornton, R. Drechsler, and D.M. Miller, <strong>Spectral Techniques in VLSI CAD<\/strong>, Kluwer Academic Publishers, 2001.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Technical Reports&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"row\">\n<div class=\"col-md-9\">\n<article>\n<h2>Technical Reports<\/h2>\n<\/article>\n<ul>\n<li>J. M. Henderson, E. R. Henderson, C. A. Harper, H. Shahoei, W. V. Oxford, E. C. Larson, D. L. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2403.01299.pdf\">A Photonic Physically Unclonable Function\u2019s Resilience to Multiple-Valued Machine Learning Attacks<\/a>,&#8221; arXiv:2403.01299, 2024.<\/li>\n<li>E. R. Henderson, J. M. Henderson, W. V. Oxford, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2404.17142\">Automated Quantum Circuit Generation for Computing Inverse Hash Functions<\/a>,&#8221; arXiv:2404.17142, 2024.<\/li>\n<li>E. R. Henderson, J. M. Henderson, H. Shahoei, W. V. Oxford, E. C. Larson, D. L. MacFarlane, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2404.02440\">Designing a Photonic Physically Unclonable Function Having Resilience to Machine Learning Attack<\/a>,&#8221; arXiv:2404.02440, 2024.<\/li>\n<li>E. R. Henderson, J. M. Henderson, A. Sinha, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2309.01028\">Demonstration of a Hardware-Independent Toolkit for Automated Quantum Subcircuit Synthesis<\/a>,&#8221; arXiv:2309.01028, 2024.<\/li>\n<li>A. Havard, T. W. Manikas, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2304.12503\">CNN-Assisted Steganography &#8211; Integrating Machine Learning with Established Steganographic Techniques<\/a>,&#8221; arXiv:2304.12503, 2023.<\/li>\n<li>J. M. Henderson, E. R. Henderson, A. Sinha, M. A. Thornton, and D. M. Miller, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2304.03829\">Automated Quantum Oracle Synthesis with a Minimal Number of Qubits<\/a>,&#8221; arXiv:2304.03829, 2023.<\/li>\n<li>A. Sinha, E. R. Henderson, J. M. Henderson, E. C. Larson, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2304.03830\">A Programmable True Random Number Generator using Commercial Quantum Computers<\/a>,&#8221; arXiv:2304.03830, 2023.<\/li>\n<li>Dawin Deason Institute for Cyber Security, &#8220;<a href=\"https:\/\/lyle.smu.edu\/~mitch\/ftp_dir\/pubs\/SMU-CAR-Brochure-V6-PREVIEW.pdf\">Cyber Autonomy Range (Brochure)<\/a>,&#8221; 2023.<\/li>\n<li>C. A. Harper, M. A. Thornton, and E. C. Larson, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2301.11773\">Automatic Modulation Classification with Deep Neural Networks<\/a>,&#8221; arXiv:2301.11773, 2023.<\/li>\n<li>A. Sinha, E. R. Henderson, J. M. Henderson, and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/2211.09860\">Automated Quantum Memory Compilation with Improved Dynamic Range<\/a>,&#8221; arXiv:2211.09860, 2022.<\/li>\n<li>K. N. Smith and M. A. Thornton, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/1906.00491\">Entanglement in Higher-Radix Quantum Systems<\/a>,&#8221; arXiv:1906.00491, 2019.<\/li>\n<li>K. N. Smith, M. A. Thornton, M. Soeken, B. Schmitt and G. De Michelli, &#8220;<a href=\"https:\/\/arxiv.org\/pdf\/1901.02406.pdf\">Using ZDDs in the Mapping of Quantum Circuits<\/a>,&#8221; arXiv:1901.02406, 2020.<\/li>\n<li>C. N. Frisbee, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/cnf.pdf\">An Overview of Placement and Routing Algorithms for PCB, VLSI, and MCM Designs with a Proposal for a New MCM Routing Algorithm<\/a>,\u201d Technical Report, Dept. of Computer Systems Engineering, University of Arkansas, Fayetteville, Arkansas, 1996 (directed by M. A. Thornton).<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/tr3.pdf\">Boolean Function Spectrum Computation Using a Structural Representation<\/a>,\u201d Technical Report, Southern Methodist University, CSE-9440, 1994.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/tr2.pdf\">Applications and Efficient Computation of Spectral Coefficients for Digital Logic<\/a>,\u201d Technical Report, Southern Methodist University, CSE-9413, 1994.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/tr4.pdf\">Reed-Muller Circuit Synthesis Using Numerical Methods<\/a>,\u201d Technical Report, Southern Methodist University, CSE-9319, 1993.<\/li>\n<li>M. A. Thornton and V. S. S. Nair, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/tr1.pdf\">Iterative Combinational Logic Synthesis Techniques Using Spectral Data<\/a>,\u201d Technical Report, Southern Methodist University, CSE-9208, 1992.<\/li>\n<\/ul>\n<article><\/article>\n<\/div>\n<div class=\"col-md-3\">\u00a0<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Workshops&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Workshops<\/h2>\n<ul>\n<li>D. K. Houngninou, D. M. Miller, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw21-web-version.pdf\">ANF Computation of Cryptographic Switching Functions using a Netlist Representation<\/a>,\u201d Reed-Muller Workshop (RM 2021), Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design (RMW), 2021.<\/li>\n<li>D. Pompa and M. A. Thornton, \u201cApplying a Variational Eigensolver for Hybrid Quantum-Classical Machine Learning,\u201d 18th International Conference on Quantum Physics and Logic, 2021.<\/li>\n<li>K. N. Smith, J. M. Henderson, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iwqc19.pdf\">Rotation Primitives in Quantum Compilation<\/a>,\u201d International Workshop on Quantum Compilation (IWQC, in conjunction with IEEE\/ACM ICCAD), 2019.<\/li>\n<li>M. A. Thornton and K. N. Smith, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw19-abstract.pdf\">Fixed Polarity Pascal Transforms with Computer Algebra Applications<\/a>,\u201d Reed-Muller Workshop (RM 2019), Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design (RMW), 2019.<\/li>\n<li>Y. Sun, H. Jiang, L. Ramakrishnan, M. Segal, J. Dworak, K. Nepal, T. W. Manikas, and R. I. Bahar, \u201cScan Segment Disable for Capture Power Reduction for Low-Power Decompressed Patterns,\u201d 2019 IEEE North Atlantic Test Workshop (NATW), 2019.<\/li>\n<li>K. N. Smith and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/ulsiws18.pdf\">Automated Mapping Methods for the IBM Transmon Devices<\/a>,\u201d International Workshop on Post-Binary ULSI Systems (ULSI-WS), 2018.<\/li>\n<li>E. Gabrielsen and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/squint18-1.pdf\">Minimizing Ancilla and Garbage Qubits in Reversible Functions<\/a>,\u201d Southwest Quantum Information and Technology Annual SQuInT Workshop (SQuInT), 2018.<\/li>\n<li>K. N. Smith, M. A. Thornton, D. L. MacFarlane, T. P. LaFave, Jr., and W. V. Oxford, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/squint18-2.pdf\">Single Qubit Quantum Ring Structures and Applications<\/a>,\u201d Southwest Quantum Information and Technology Annual SQuInT Workshop (SQuInT), 2018.<\/li>\n<li>K. N. Smith and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iccad-qceda-abstract17.pdf\">MUSTANG-Q: A Technology Dependent Quantum Logic Synthesis and Compilation Tool<\/a>,\u201d Design Automation for Quantum Computers Workshop, IEEE International Conference on Computer Aided Design (ICCAD-QCEDA), 2017.<\/li>\n<li>M. A. Thornton and D. M. Miller, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw17-abstract.pdf\">On the Computation of Reed-Muller Spectra for Cryptography and Switching Theory Applications<\/a>,\u201d Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design (RMW), 2017.<\/li>\n<li>F. Zhang, Y. Sun, X. Shen, K. Nepal, J. Dworak, T. W. Manikas, P. Gui, R.I. Bahar, A. Crouch, and J. Potter, \u201c<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7557846\">Using Existing Reconfigurable Logic in 3D Die Stacks for Test<\/a>,\u201d IEEE North Atlantic Test Workshop, 2016 (IEEE Excellence in Design and Test Engineering Award).<\/li>\n<li>M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iwsbp14-abstract.pdf\">A Vector Space Model for Boolean Switching Networks<\/a>,\u201d Proceedings of the International Workshop on Boolean Problems (IWSBP), 2014.<\/li>\n<li>M. A. Thornton and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iwsbp14b-abstract.pdf\">On the Relationship of Boolean Function Spectra and Circuit Output Probabilities<\/a>,\u201d Proceedings of the International Workshop on Boolean Problems (IWSBP), 2014.<\/li>\n<li>T. W. Manikas, M. A. Thornton, and F. R. Chang, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw13-abstract.pdf\">Mission Planning Analysis Using Decision Diagrams<\/a>,&#8221; Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design (RMW), 2013.<\/li>\n<li>K. Nepal, X. Shen, J. Dworak, T. W. Manikas, and R. I. Bahar, \u201c<a href=\"https:\/\/s2.smu.edu\/~manikas\/Pubs\/NATW13.pdf\">Harnessing an FPGA for Built-in Self-Repair in a 3D Die Stack<\/a>,\u201d IEEE North Atlantic Test Workshop, 2013.<\/li>\n<li>M. A. Thornton and J. Dworak, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw11.pdf\">Direct Reed-Muller Transform of Digital Logic Netlists<\/a>,\u201d Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design and Representations and Methodology of Future Computing Technology (RMW), 2011.<\/li>\n<li>J. Rice, K. Fazel, M. A. Thornton, and K. Kent, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rm09.pdf\">Toffoli Gate Cascade Generation Using ESOP Minimization and QMDD-Based Swapping<\/a>,\u201d Proceedings of the Applications of the Reed-Muller Expansion in Circuit Design and Representations and Methodology of Future Computing Technology (RMW), 2009.<\/li>\n<li>D. M. Miller and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/iwbp08.pdf\">QMDD and Spectral Transformation of Binary and Multiple-Valued Functions<\/a>,\u201d 8th International Workshop on Boolean Problems (IWBP), 2008.<\/li>\n<li>D. Goodman, M. A. Thornton, D. Y. Feinstein, and D. M. Miller, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw07a.pdf\">Quantum Logic Circuit Simulation Based on the QMDD Data Structure<\/a>,\u201d Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design and Representations and Methodology of Future Computing Technology (RMW), 2007.<\/li>\n<li>D. Y. Feinstein and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/rmw07b.pdf\">ESOP Transformation to Majority Gates for Quantum-dot Cellular Automata Logic Synthesis<\/a>,\u201d Proceedings of the Workshop on Applications of the Reed-Muller Expansion in Circuit Design and Representations and Methodology of Future Computing Technology (RMW), 2007.<\/li>\n<li>C. M. Lawler, M. A. Harper, and M. A. Thornton, \u201c<a href=\"https:\/\/s2.smu.edu\/~mitch\/ftp_dir\/pubs\/wia07.pdf\">Components of Disaster Tolerant Computing<\/a>,\u201d International Workshop on Information Assurance, in conjunction with the IEEE International Performance Computing and Communications Conference, 2007.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PublicationsJournal Articles D.L. MacFarlane and M.A. Thornton, &#8220;Higher-radix Quantum Photonic Informatics in Quantum Photonic Circuits,&#8221; Journal of Multiple-Valued Logic and Soft Computing (to appear). C. Hong, W. Chen, X. Wen, T.W. Manikas, P. Gui, and M.A. Thornton, &#8220;Controller Area Network (CAN) Bus Transceiver with Authentication Support and Enhanced Rail Converters,&#8221; Chips, 2024. M. A. Taylor, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-38","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/pages\/38","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":3,"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":944,"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/pages\/38\/revisions\/944"}],"wp:attachment":[{"href":"https:\/\/s2.smu.edu\/~mitch\/DDI\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}