The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stephen Wilson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen Wilson
    Memory map: an interactive installation that maps memory space to physical space. [Citation Graph (0, 0)][DBLP]
    CHI Conference Companion, 1994, pp:55-56 [Conf]
  2. Stephen Wilson
    New models for the management of public key infrastructure and root certification authorities. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:221-230 [Conf]
  3. Rich Gold, Char Davies, Michael Naimark, Mark Petrakis, Stephen Wilson, Sara Roberts
    Artists in Multimedia: Creating Meaningful Roles (Panel). [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 1994, pp:287-288 [Conf]
  4. Stephen Wilson
    Traces of culture: searchbots scour the web looking for visual information. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:981-982 [Conf]
  5. Stephen Wilson, David Backer, Myron Krueger, Peter Richards, Sonia Sheridan, David Ucko
    The creation of new kinds of interactive environments in art, education, and entertainment (panel session). [Citation Graph (0, 0)][DBLP]
    SIGGRAPH, 1985, pp:326- [Conf]
  6. David Moncrieff, Stephen Wilson
    Performance of IBM RISC 6000 Workstations in Electron Correlation Calculations. [Citation Graph (0, 0)][DBLP]
    Computers & Chemistry, 1993, v:17, n:3, pp:323-325 [Journal]
  7. David Moncrieff, Stephen Wilson
    A Comparison of Autotasking and Macrotasking in a Quantum Chemical Application Program on a Cray Y-MP Computer. [Citation Graph (0, 0)][DBLP]
    Computers & Chemistry, 1993, v:17, n:4, pp:379-381 [Journal]
  8. Stephen Wilson, David Moncrieff
    On 'Infinite Basis Set Limits' in Molecular Electronic Structure Calculations. [Citation Graph (0, 0)][DBLP]
    Computers & Chemistry, 2001, v:25, n:1, pp:109-115 [Journal]
  9. Stephen Wilson
    Certificates and trust in electronic commerce. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:5, pp:175-181 [Journal]
  10. Stephen Wilson
    Some limitations of web of trust models. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:218-220 [Journal]
  11. Stephen Wilson
    Digital signatures and the future of documentation. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:2, pp:83-87 [Journal]
  12. Stephen Wilson
    New models for the management of public key infrastructure and root certification authorities. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1999, v:7, n:4, pp:166-170 [Journal]
  13. Asiri Nanayakkara, David Moncrieff, Stephen Wilson
    Performance of IBM RISC System / 6000 Workstation Clusters in a Quantum Chemical Application. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1993, v:19, n:9, pp:1053-1062 [Journal]
  14. David Moncrieff, Richard E. Overill, Stephen Wilson
    alphacritical for Parallel Processors. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1995, v:21, n:3, pp:467-471 [Journal]
  15. David Moncrieff, Richard E. Overill, Stephen Wilson
    Heterogeneous Computing Machines and Amdahl's Law. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1996, v:22, n:3, pp:407-413 [Journal]
  16. David Moncrieff, V. R. Saunders, Stephen Wilson
    Parallel processing using macro-tasking in a multi-job environment on a CRAY Y-MP computer. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1991, v:17, n:6-7, pp:733-750 [Journal]
  17. Richard E. Overill, Stephen Wilson
    Performance of Parallel Algorithms for the Evaluation of Power Series. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1994, v:20, n:8, pp:1205-1213 [Journal]
  18. Richard E. Overill, Stephen Wilson
    Data Parallel Evaluation of Univariate Polynomials by the Knut-Eve Algorithm. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:23, n:13, pp:2115-2127 [Journal]
  19. V. R. Saunders, Stephen Wilson
    "Scavenger" programming for the CRAY X-MP computer (Short communication). [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1991, v:17, n:9, pp:1025-1034 [Journal]

  20. Combined Gesture-Speech Analysis and Speech Driven Gesture Synthesis. [Citation Graph (, )][DBLP]


  21. Public key superstructure "it's PKI Jim, but not as we know it!". [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002