default search action
Steve Barker
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j17]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Amr A. Tammam, F. John Lidgey, Nabil Yassine:
A High-Sensitivity and Low-Power Circuit for the Measurement of Abnormal Blood Cell Levels. J. Circuits Syst. Comput. 29(4): 2050061:1-2050061:14 (2020) - [j16]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker:
A VGA Linearity Improvement Technique for ECG Analog Front-End in 65nm CMOS. J. Circuits Syst. Comput. 29(7): 2050113:1-2050113:11 (2020) - [j15]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker:
A Positive Feedback-Based Op-Amp Gain Enhancement Technique for High-Precision Applications. J. Circuits Syst. Comput. 29(14): 2050220:1-2050220:12 (2020) - 2019
- [j14]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Pantelis Georgiou, F. J. Lidgey:
A High Value, Linear and Tunable CMOS Pseudo-Resistor for Biomedical Applications. J. Circuits Syst. Comput. 28(6): 1950096:1-1950096:11 (2019) - [j13]Khaled Hayatleh, Saddam Zourob, Rajasekhar Nagulapalli, Steve Barker, Nabil Yassine, Pantelis Georgiou, F. J. Lidgey:
A High-Performance Skin Impedance Measurement Circuit for Biomedical Applications. J. Circuits Syst. Comput. 28(7): 1950110:1-1950110:15 (2019) - [j12]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Amr A. Tammam, Pantelis Georgiou, F. J. Lidgey:
A 0.55 V Bandgap Reference with a 59 ppm/°C Temperature Coefficient. J. Circuits Syst. Comput. 28(7): 1950120:1-1950120:12 (2019) - [j11]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Amr A. Tammam, Nabil Yassine, Bilal Yassine, Mohamed Ben-Esmael:
A Low Noise Amplifier Suitable for Biomedical Recording Analog Front-End in 65nm CMOS Technology. J. Circuits Syst. Comput. 28(8): 1950137:1-1950137:12 (2019) - [j10]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Bilal Yassine, Saddam Zourob, Sumathi Raparthy, Nabil Yassine:
A Start-up Assisted Fully Differential Folded Cascode Opamp. J. Circuits Syst. Comput. 28(10): 1950164:1-1950164:12 (2019) - 2018
- [j9]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Sumathi Raparthy, Nabil Yassine, John Lidgey:
A 0.6 V MOS-Only Voltage Reference for Biomedical Applications with 40 ppm/∘C Temperature Drift. J. Circuits Syst. Comput. 27(8): 1850128:1-1850128:13 (2018) - 2014
- [j8]Nikolaos Terzopoulos, Khaled Hayatleh, Cristiana Sebu, F. J. Lidgey, Mohamed Ben-Esmael, Amr A. Tammam, Steve Barker:
Analysis and Design of a High Precision-High output impedance Tissue Current Driver for Medical Applications. J. Circuits Syst. Comput. 23(8) (2014) - [j7]Steve Barker, Guido Boella, Dov M. Gabbay, Valerio Genovese:
Reasoning about delegation and revocation schemes in answer set programming. J. Log. Comput. 24(1): 89-116 (2014) - 2012
- [j6]Steve Barker, Valerio Genovese:
Access Control with Privacy Enhancements a Unified Approach. IEEE Trans. Dependable Secur. Comput. 9(5): 670-683 (2012) - 2009
- [j5]Steve Barker, Guido Boella, Dov M. Gabbay, Valerio Genovese:
A Meta-model of Access Control in a Fibred Security Language. Stud Logica 92(3): 437-477 (2009) - 2008
- [j4]Steve Barker, Michael Leuschel, Mauricio Varea:
Efficient and flexible access control via Jones-optimal logic program specialisation. High. Order Symb. Comput. 21(1-2): 5-35 (2008) - [j3]Steve Barker, Marek J. Sergot, Duminda Wijesekera:
Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): 1:1-1:47 (2008) - 2003
- [j2]Steve Barker, Peter J. Stuckey:
Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur. 6(4): 501-546 (2003) - 2002
- [j1]Steve Barker:
Protecting deductive databases from unauthorized retrieval and update requests. Data Knowl. Eng. 43(3): 293-315 (2002)
Conference and Workshop Papers
- 2020
- [c51]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy:
A Single BJT 10.2 ppm/°C Bandgap Reference in 45nm CMOS Technology. ICCCNT 2020: 1-4 - [c50]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy:
A two-stage opamp frequency Compensation technique by splitting the 2nd stage. ICCCNT 2020: 1-5 - 2019
- [c49]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy, B. Seetharamulu:
A Low Power Miller Compensation Technique for Two Stage Op-amp in 65nm CMOS Technology. ICCCNT 2019: 1-5 - [c48]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, B. Naresh Kumar Reddy, B. Seetharamulu:
A High Frequency CMRR improvement technique for Differential Amplifiers in 45nm CMOS. ICCCNT 2019: 1-5 - 2018
- [c47]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Saddam Zourob, Nabil Yassine, B. Naresh Kumar Reddy:
A Technique to Reduce the Capacitor Size in Two Stage Miller Compensated Opamp. ICCCNT 2018: 1-4 - [c46]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Saddam Zourob, Nabil Yassine, B. Naresh Kumar Reddy:
High Performance Circuit Techniques for Nueral Front-End Design in 65nm CMOS. ICCCNT 2018: 1-4 - [c45]Rajasekhar Nagulapalli, Khaled Hayatleh, Steve Barker, Saddam Zourob, Nabil Yassine, B. Naresh Kumar Reddy:
A 31 ppm/° C Pure CMOS Bandgap Reference by Exploiting Beta-Multiplier. VDAT 2018: 100-108 - 2017
- [c44]Steve Barker, Hooshang Izadi, Nigel T. Crook, Khaled Hayatleh, Matthias Rolf, Philip Hughes, Neil Fellows:
Natural head movement for HRI with a muscular-skeletal head and neck robot. RO-MAN 2017: 587-592 - 2015
- [c43]Steve Barker, Luis A. Fuente, Khaled Hayatleh, Neil Fellows, Jochen J. Steil, Nigel T. Crook:
Design of a biologically inspired humanoid neck. ROBIO 2015: 25-30 - 2012
- [c42]Steve Barker, Andrew J. I. Jones, Antonis C. Kakas, Robert A. Kowalski, Alessio Lomuscio, Rob Miller, Stephen H. Muggleton, Giovanni Sartor:
The Scientific Contribution of Marek Sergot. Logic Programs, Norms and Action 2012: 4-11 - [c41]Steve Barker:
Logical Approaches to Authorization Policies. Logic Programs, Norms and Action 2012: 349-373 - 2011
- [c40]Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert W. N. van der Torre:
Dynamics in Delegation and Revocation Schemes: A Logical Approach. DBSec 2011: 90-105 - [c39]Steve Barker, Valerio Genovese:
Socially Constructed Trust for Distributed Authorization. ESORICS 2011: 262-277 - [c38]Steve Barker, Valerio Genovese:
Secommunity: A Framework for Distributed Access Control. LPNMR 2011: 297-303 - [c37]Steve Barker, Gillian Lowen:
GPF: A General Policy Framework. POLICY 2011: 117-120 - 2010
- [c36]Steve Barker, Valerio Genovese:
A Logic of Privacy. DBSec 2010: 17-32 - [c35]Steve Barker:
Personalizing access control by generalizing access control. SACMAT 2010: 149-158 - 2009
- [c34]Steve Barker:
The next 700 access control models or a unifying meta-model? SACMAT 2009: 187-196 - 2008
- [c33]Steve Barker:
Dynamic Meta-level Access Control in SQL. DBSec 2008: 1-16 - [c32]Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 - [c31]Steve Barker:
Access control by action control. SACMAT 2008: 143-152 - [c30]Steve Barker, Clara Bertolissi, Maribel Fernández:
Action Control by Term Rewriting. SecReT@LICS/CSF 2008: 19-36 - [c29]Steve Barker, Gill Lowen:
Event-oriented Web-based E-trading. WWV 2008: 35-53 - 2007
- [c28]Clara Bertolissi, Maribel Fernández, Steve Barker:
Dynamic Event-Based Access Control as Term Rewriting. DBSec 2007: 195-210 - [c27]Steve Barker, Paul Douglas:
Secure knowledge exchange by policy algebra and erml. ICEIS (1) 2007: 212-217 - [c26]Steve Barker:
Action-status access control. SACMAT 2007: 195-204 - 2006
- [c25]Steve Barker, Maribel Fernández:
Term Rewriting for Access Control. DBSec 2006: 179-193 - 2005
- [c24]Paul Douglas, Steve Barker:
An E-learning tool for Database Administration. ITCC (1) 2005: 453-458 - [c23]Steve Barker, Paul Douglas:
An Intelligent Tutoring System for Program Semantics. ITCC (1) 2005: 482-487 - 2004
- [c22]Steve Barker:
Web Resource Usage Control in RSCLP. DBSec 2004: 281-294 - [c21]Steve Barker, Paul Douglas:
An Intelligent Tutoring System for Database Transaction Processing. ICEIS (2) 2004: 197-203 - [c20]Steve Barker:
Labeled Logic Programs. ICLP 2004: 448-449 - [c19]Steve Barker:
Access Policy Specification for Web Applications. ITCC (2) 2004: 45-49 - [c18]Paul Douglas, Steve Barker:
Dependency Theory E-Learning Tool. ITCC (1) 2004: 151-155 - [c17]Steve Barker, Paul Douglas:
Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. ITCC (1) 2004: 523-527 - [c16]Steve Barker, Michael Leuschel, Mauricio Varea:
Efficient and flexible access control via logic program specialisation. PEPM 2004: 190-199 - 2003
- [c15]Steve Barker, Paul Douglas:
RBAC Policy Implementation for SQL Databases. DBSec 2003: 288-301 - [c14]Steve Barker, Paul Douglas:
Extended Protected Databases: A Practical Implementation. ICEIS (1) 2003: 456-459 - [c13]Steve Barker, Paul Douglas:
An E-Learning Tool for Understanding Schedule Properties. ITCC 2003: 53- - [c12]Steve Barker:
Distributed Access Control: A Logic-Based Approach. MMM-ACNS 2003: 217-228 - 2002
- [c11]Steve Barker, Paul Douglas, Terry Fanning:
Implementing RBAC Policies. DBSec 2002: 27-36 - [c10]Steve Barker:
Deductive Database Security. DBSec 2002: 103-114 - [c9]Steve Barker:
Access Control for Deductive Databases by Logic Programming. ICLP 2002: 54-69 - 2001
- [c8]Steve Barker, Arnon Rosenthal:
Flexible Security Policies in SQL. DBSec 2001: 167-180 - [c7]Steve Barker:
TRBAC: A Temporal Authorization Model. MMM-ACNS 2001: 178-188 - [c6]Steve Barker:
Secure Deductive Databases. PADL 2001: 123-137 - 2000
- [c5]Steve Barker:
Data Protection by Logic Programming. Computational Logic 2000: 1300-1314 - [c4]Steve Barker:
Protecting Deductive Databases from Unauthorized Retrievals. DBSec 2000: 185-196 - [c3]Steve Barker:
Information Security: A Logic Based Approach. ICEIS 2000: 9-14 - 1999
- [c2]Steve Barker:
Temporal Authorization in the Simplified Event Calculus. DBSec 1999: 271-284 - [c1]Steve Barker:
An Expert System for Intelligent Database Design. IC-AI 1999: 143-148
Editorship
- 2007
- [e1]Steve Barker, Gail-Joon Ahn:
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings. Lecture Notes in Computer Science 4602, Springer 2007, ISBN 978-3-540-73533-5 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint