The SCEAS System
Navigation Menu

Search the dblp DataBase


Peter Williams: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Peter Williams, Sheng Li, Jianfeng Feng, Si Wu
    Scaling the Kernel Function to Improve Performance of the Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2005, pp:831-836 [Conf]
  2. Peter T. Kirstein, Peter Williams
    Piloting Authentication and Security Services within OSI Applications for RTD Information (PASSWORD). [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1992, v:25, n:4-5, pp:483-489 [Journal]
  3. Peter T. Kirstein, Peter Williams
    Piloting authentication and security services in the 'PASSWORD' project. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:7, pp:519-531 [Journal]
  4. David Nicholas, Paul Huntington, Peter Williams
    Three years of digital consumer health information: a longitudinal study of the touch screen health kiosk. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 2003, v:39, n:3, pp:479-502 [Journal]

  5. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. [Citation Graph (, )][DBLP]

  6. Privacy Threats in Online Stock Quotes. [Citation Graph (, )][DBLP]

  7. Usable PIR. [Citation Graph (, )][DBLP]

  8. The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. [Citation Graph (, )][DBLP]

  9. In search for ideal operating system for user interfacing. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002