Search the dblp DataBase
Paul Andrew Watters :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tam Pham , Paul Andrew Watters The Efficiency of Periodic Rekeying in Dynamic Group Key Management. [Citation Graph (0, 0)][DBLP ] ECUMN, 2007, pp:425-432 [Conf ] Zhao Zeng , Paul Andrew Watters A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems. [Citation Graph (0, 0)][DBLP ] ECUMN, 2007, pp:439-444 [Conf ] Huu Tran , Michael Hitchens , Vijay Varadharajan , Paul Andrew Watters A Trust based Access Control Framework for P2P File-Sharing Systems. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] Wai Han Ho , Paul Andrew Watters Identifying and Blocking Pornographic Content. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2005, pp:1181- [Conf ] Simon Chong , Paul Andrew Watters , Michael Hitchens Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2005, pp:1214- [Conf ] John Mee , Paul Andrew Watters Detecting and Tracing Copyright Infringements in P2P Networks. [Citation Graph (0, 0)][DBLP ] ICN/ICONS/MCL, 2006, pp:60- [Conf ] Paul Andrew Watters e-Learning for policing, intelligence and counter-terrorism: Performance. [Citation Graph (0, 0)][DBLP ] ICN/ICONS/MCL, 2006, pp:215- [Conf ] Wai Han Ho , Paul Andrew Watters Statistical and structural approaches to filtering Internet pornography. [Citation Graph (0, 0)][DBLP ] SMC (5), 2004, pp:4792-4798 [Conf ] Steven Taylor , Paul Andrew Watters Trustworthy E-mail Using Secure XML Web Services. [Citation Graph (0, 0)][DBLP ] CEC, 2005, pp:307-312 [Conf ] Paul Andrew Watters , Antonio Araujo , Armin Hezart , Sonali Naik Accessibility Solutions for Visually Impaired Users of Web Discussion Boards. [Citation Graph (0, 0)][DBLP ] ICITA (1), 2005, pp:488-493 [Conf ] Paul Andrew Watters , Frances Martin , H. Steffen Stripf Visual Steganalysis of LSB-Encoded Natural Images. [Citation Graph (0, 0)][DBLP ] ICITA (1), 2005, pp:746-751 [Conf ] Armin Hezart , Sonali Naik , Antonio Araujo , Paul Andrew Watters Solving Frame-Based Accessibility Problems in Web Content Management. [Citation Graph (0, 0)][DBLP ] CIMCA/IAWTIC, 2005, pp:246-250 [Conf ] Paul Andrew Watters Coding distributed representations of natural scenes: a comparison of orthogonal and non-orthogonal models. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2004, v:61, n:, pp:277-289 [Journal ] Paul Andrew Watters Distributed Variance In Localized Principal Components Of Whitened Natural Scenes. [Citation Graph (0, 0)][DBLP ] IJPRAI, 2003, v:17, n:8, pp:1431-1446 [Journal ] Paul Andrew Watters Discriminating English Word Senses Using Cluster Analysis. [Citation Graph (0, 0)][DBLP ] Journal of Quantitative Linguistics, 2002, v:9, n:1, pp:77-86 [Journal ] Paul Andrew Watters , Malti Patel Direct Machine Translation Systems as Dynamical Systems: The Iterative Semantic Processing (ISP) Paradigm. [Citation Graph (0, 0)][DBLP ] Journal of Quantitative Linguistics, 2000, v:7, n:1, pp:43-51 [Journal ] Paul Andrew Watters , Malti Patel A Neural Network Model of Semantic Processing Errors in Parkinson's Disease. [Citation Graph (0, 0)][DBLP ] Neural Processing Letters, 1999, v:9, n:2, pp:189-199 [Journal ] Wai Han Ho , Paul Andrew Watters , Dominic Verity Are Younger People More Difficult to Identify or Just a Peer-to-Peer Effect. [Citation Graph (0, 0)][DBLP ] CAIP, 2007, pp:351-359 [Conf ] Wai Han Ho , Paul Andrew Watters A New Performance Evaluation Method for Face Identification - Regression Analysis of Misidentification Risk. [Citation Graph (0, 0)][DBLP ] CVPR, 2007, pp:- [Conf ] Wai Han Ho , Paul Andrew Watters , Dominic Verity Robustness of the New Owner-Tester Approach for Face Identification Experiments. [Citation Graph (0, 0)][DBLP ] CVPR, 2007, pp:- [Conf ] Estimating Cybersickness of Simulated Motion Using the Simulator Sickness Questionnaire (SSQ): A Controlled Study. [Citation Graph (, )][DBLP ] New Traceability Codes and Identification Algorithm for Tracing Pirates. [Citation Graph (, )][DBLP ] Forensic Characteristics of Phishing - Petty Theft or Organized Crime? [Citation Graph (, )][DBLP ] Visual Detection of High Capacity Natural Image Steganography: Is A Known Cover Effective? [Citation Graph (, )][DBLP ] Search in 0.028secs, Finished in 0.030secs