Slowly accreting ice due to supercooled water impacting on a cold surface TG Myers, JPF Charpin, CP Thompson Physics of Fluids 14 (1), 240-256, 2002 | 169 | 2002 |
Rethinking connection security indicators AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ... Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 1-14, 2016 | 161 | 2016 |
An experience sampling study of user reactions to browser warnings in the field RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 146 | 2018 |
Routing around decoys M Schuchard, J Geddes, C Thompson, N Hopper Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 111 | 2012 |
The effect of developer-specified explanations for permission requests on smartphone user behavior J Tan, K Nguyen, M Theodorides, H Negrón-Arroyo, C Thompson, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 107 | 2014 |
Stereovision-based object segmentation for automotive applications Y Huang, S Fu, C Thompson EURASIP Journal on Advances in Signal Processing 2005 (14), 2322-2329, 2005 | 59 | 2005 |
The web's identity crisis: understanding the effectiveness of website identity indicators C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt 28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019 | 56 | 2019 |
Transforming FORTRAN DO loops to improve performance on vector architectures WR Cowell, CP Thompson ACM Transactions on Mathematical Software (TOMS) 12 (4), 324-353, 1986 | 44 | 1986 |
Far/near infrared adapted pyramid-based fusion for automotive night vision F Jahard, DA Fish, AA Rio, CP Thompson Image Processing and Its Applications, 1997., Sixth International Conference …, 1997 | 42 | 1997 |
Numerical simulations of water freezing processes in cavities and cylindrical enclosures AC Bourdillon, PG Verdin, CP Thompson Applied Thermal Engineering 75, 839-855, 2015 | 40 | 2015 |
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources C Thompson, M Johnson, S Egelman, D Wagner, J King Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-14, 2013 | 40 | 2013 |
A large-scale study of modern code review and security in open source projects C Thompson, D Wagner Proceedings of the 13th International Conference on Predictive Models and …, 2017 | 38 | 2017 |
Numerical solutions for a comparison problem on natural convection in an enclosed cavity IP Jones, CP Thompson Atomic Energy Research Establishment, Computer Science and Systems Division, 1981 | 38 | 1981 |
Restoration and frequency analysis of smeared CCD images K Powell, D Chana, D Fish, C Thompson Applied Optics 38 (8), 1343-1347, 1999 | 37 | 1999 |
Explicit finite volume modeling of aircraft anti-icing and de-icing O Harireche, P Verdin, CP Thompson, DW Hammond Journal of Aircraft 45 (6), 1924-1936, 2008 | 34 | 2008 |
Empirical Results of Stochastic Simulations| RDP 2000-06: Inflation Targeting and Exchange Rate Fluctuations in Australia C Ryan, C Thompson Reserve Bank of Australia Research Discussion Papers, 2000 | 30 | 2000 |
Retail Central Bank Digital Currency: Design Considerations, Rationales and Implications| Bulletin–September 2020 T Richards, C Thompson, C Dark Reserve Bank of Australia, 2020 | 29 | 2020 |
Wave coalescence and entrainment in vertical annular two-phase flow NS Wilkes, BJ Azzopardi, CP Thompson International Journal of Multiphase Flow 9 (4), 383-398, 1983 | 28 | 1983 |
Heavy metal music and the communal experience E Clinton, B Hickam, K Jezer-Morton, K Kahn-Harris, TM Karjalainen, ... Lexington Books, 2016 | 27 | 2016 |
Non-Newtonian multi-phase flows: On drag reduction, pressure drop and liquid wall friction factor N Jia, M Gourma, CP Thompson Chemical engineering science 66 (20), 4742-4756, 2011 | 27 | 2011 |