default search action
Stephen Wilson
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Sándor Tóth, Stephen Wilson, Alexia Tsoukara, Enric Moreu, Anton Masalovich, Lars Roemheld:
End-to-end multi-modal product matching in fashion e-commerce. CoRR abs/2403.11593 (2024) - 2023
- [j20]Zhenyi Chen, Robyn Schofield, Melita Keywood, Sam Cleland, Alastair G. Williams, Stephen Wilson, Alan Griffiths, Yan Xiang:
Observations of the Boundary Layer in the Cape Grim Coastal Region: Interaction with Wind and the Influences of Continental Sources. Remote. Sens. 15(2): 461 (2023) - 2021
- [c20]Nicholas Maurer, Stephen Wilson, Archie C. Chapman:
Emerging Frequency Control Mechanisms in IBR Dominated Power Systems. ISGT Asia 2021: 1-5 - 2020
- [c19]Stephen Wilson:
A digital "Yellow Card" for securely recording vaccinations using Community PKI certificates. ISTAS 2020: 310-313
2010 – 2019
- 2018
- [c18]Stephen Wilson, Nour Moustafa, Elena Sitnikova:
A digital identity stack to improve privacy in the IoT. WF-IoT 2018: 25-29 - [r1]Stephen Wilson, Anna Johnston:
Facebook's Challenge to the Collection Limitation Principle. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [j19]Youbing Zhao, Farzad Parvinzamir, Stephen Wilson, Hui Wei, Zhikun Deng, Nick Portokallidis, Allan Third, George Drosatos, Enjie Liu, Feng Dong, Vaidotas Marozas, Arunas Lukosevicius, Eleni Kaldoudi, Gordon Clapworthy:
Integrated visualisation of wearable sensor data and risk models for individualised health monitoring and risk assessment to promote patient empowerment. J. Vis. 20(2): 405-413 (2017) - 2012
- [j18]Anna Johnston, Stephen Wilson:
Privacy Compliance Risks for Facebook. IEEE Technol. Soc. Mag. 31(2): 59-64 (2012)
2000 – 2009
- 2009
- [c17]Stephen Wilson, Jeremy G. Frey:
The smartLab: Experimental and environmental control and monitoring of the chemistry laboratory. CTS 2009: 85-90 - [c16]Stephen Wilson, Julie Carson-Berndsen:
The Corpus Analysis Toolkit - Analysing Multilevel Annotations. LTC 2009: 94-104 - 2008
- [c15]Stephen Wilson:
Public key superstructure "it's PKI Jim, but not as we know it!". IDtrust 2008: 72-88 - 2006
- [c14]Andrew Hill, Andrew Mehnert, Stuart Crozier, Carlos Leung, Stephen Wilson, Kerry McMahon, Dominic Kennedy:
Dynamic breast MRI: Image registration and its impact on enhancement curve estimation. EMBC 2006: 3049-3052 - [c13]Mehmet Emre Sargin, Oya Aran, Alexey Karpov, Ferda Ofli, Yelena Yasinnik, Stephen Wilson, Engin Erzin, Yücel Yemez, A. Murat Tekalp:
Combined Gesture-Speech Analysis and Speech Driven Gesture Synthesis. ICME 2006: 893-896 - 2005
- [c12]Michael Walsh, Stephen Wilson:
An agent-based framework for auditory-visual speech investigation. AVSP 2005: 47-52 - 2004
- [j17]Jacek Kobus, David Moncrieff, Stephen Wilson:
Electric properties of diatomic molecules: A comparison of finite basis set and finite difference Hartree-Fock calculations. J. Comput. Methods Sci. Eng. 4(4): 611-640 (2004) - [c11]Daniel Aioanei, Julie Carson-Berndsen, Anja Geumann, Robert Kelly, Moritz Neugebauer, Stephen Wilson:
A Multilingual Phonological Resource Toolkit for Ubiquitous Speech Technology. LREC 2004 - [c10]Moritz Neugebauer, Stephen Wilson:
Phonological Treebanks. Issues in Generation and Application. LREC 2004 - [c9]Stephen Wilson:
Traces of culture: searchbots scour the web looking for visual information. ACM Multimedia 2004: 981-982 - [c8]Moritz Neugebauer, Stephen Wilson:
Multiple Lexicon Generation based on Phonological Feature Trees. TALN (Posters) 2004: 79-84 - 2002
- [c7]Michael Walsh, Stephen Wilson, Julie Carson-Berndsen:
XiSTS - XML in Speech Technology Systems. NLPXML@COLING 2002 - 2001
- [j16]Stephen Wilson, David Moncrieff:
On 'Infinite Basis Set Limits' in Molecular Electronic Structure Calculations. Comput. Chem. 25(1): 109-115 (2001)
1990 – 1999
- 1999
- [j15]Paolo Pumilia, Nikolai Bezroukov, Stephen Wilson:
Letters to the Editor. First Monday 4(11) (1999) - [j14]Stephen Wilson:
Digital signatures and the future of documentation. Inf. Manag. Comput. Secur. 7(2): 83-87 (1999) - [j13]Stephen Wilson:
New models for the management of public key infrastructure and root certification authorities. Inf. Manag. Comput. Secur. 7(4): 166-170 (1999) - [c6]Stephen Wilson:
New models for the management of public key infrastructure and root certification authorities. Conference on Information Security Management & Small Systems Security 1999: 221-230 - 1998
- [j12]Stephen Wilson:
Some limitations of web of trust models. Inf. Manag. Comput. Secur. 6(5): 218-220 (1998) - [c5]Stephen Wilson:
Is anyone there?, 1993. SIGGRAPH Electronic Art and Animation Catalog 1998: 90 - [c4]Stephen Wilson:
Demon seed, 1987. SIGGRAPH Electronic Art and Animation Catalog 1998: 90 - 1997
- [j11]Stephen Wilson:
Certificates and trust in electronic commerce. Inf. Manag. Comput. Secur. 5(5): 175-181 (1997) - [j10]Richard E. Overill, Stephen Wilson:
Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm. Parallel Comput. 23(13): 2115-2127 (1997) - 1996
- [j9]David Moncrieff, Richard E. Overill, Stephen Wilson:
Heterogeneous Computing Machines and Amdahl's Law. Parallel Comput. 22(3): 407-413 (1996) - 1995
- [j8]Stephen Wilson:
A safety licensable computing architecture by W. A. Halang, S.-K. Jung, B. J. Kramer and J. J. Scheepstra, World Scientific, USA, 1993, pp 251, £63.00 (h/b), ISBN 981-02-1628-9. Knowl. Eng. Rev. 10(3): 305-306 (1995) - [j7]David Moncrieff, Richard E. Overill, Stephen Wilson:
alphacritical for Parallel Processors. Parallel Comput. 21(3): 467-471 (1995) - 1994
- [j6]Richard E. Overill, Stephen Wilson:
Performance of Parallel Algorithms for the Evaluation of Power Series. Parallel Comput. 20(8): 1205-1213 (1994) - [c3]Stephen Wilson:
Memory map: an interactive installation that maps memory space to physical space. CHI Conference Companion 1994: 55-56 - [c2]Rich Gold, Char Davies, Michael Naimark, Mark Petrakis, Stephen Wilson, Sara Roberts:
Artists in Multimedia: Creating Meaningful Roles (Panel). ACM Multimedia 1994: 287-288 - 1993
- [j5]David Moncrieff, Stephen Wilson:
Performance of IBM RISC 6000 Workstations in Electron Correlation Calculations. Comput. Chem. 17(3): 323-325 (1993) - [j4]David Moncrieff, Stephen Wilson:
A Comparison of Autotasking and Macrotasking in a Quantum Chemical Application Program on a Cray Y-MP Computer. Comput. Chem. 17(4): 379-381 (1993) - [j3]Asiri Nanayakkara, David Moncrieff, Stephen Wilson:
Performance of IBM RISC System / 6000 Workstation Clusters in a Quantum Chemical Application. Parallel Comput. 19(9): 1053-1062 (1993) - 1991
- [j2]David Moncrieff, V. R. Saunders, Stephen Wilson:
Parallel processing using macro-tasking in a multi-job environment on a CRAY Y-MP computer. Parallel Comput. 17(6-7): 733-750 (1991) - [j1]V. R. Saunders, Stephen Wilson:
"Scavenger" programming for the CRAY X-MP computer (Short communication). Parallel Comput. 17(9): 1025-1034 (1991)
1980 – 1989
- 1985
- [c1]Stephen Wilson, David Backer, Myron W. Krueger, Peter Richards, Sonia Sheridan, David Ucko:
The creation of new kinds of interactive environments in art, education, and entertainment (panel session). SIGGRAPH 1985: 326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint