John Mellor

According to our database1, John Mellor authored at least 24 papers between 2007 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Improving alignment of dialogue agents via targeted human judgements.
CoRR, 2022

Characteristics of Harmful Text: Towards Rigorous Benchmarking of Language Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Taxonomy of Risks posed by Language Models.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

2021
Decoupling the Role of Data, Attention, and Losses in Multimodal Transformers.
Trans. Assoc. Comput. Linguistics, 2021

Scaling Language Models: Methods, Analysis & Insights from Training Gopher.
CoRR, 2021

Ethical and social risks of harm from Language Models.
CoRR, 2021

Challenges in Detoxifying Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

2014
Non-intrusive drowsiness detection by employing Support Vector Machine.
Proceedings of the 20th International Conference on Automation and Computing, 2014

2011
Implementation and Evaluation of Network Intrusion Detection Systems.
Proceedings of the Network Performance Engineering, 2011

Adaptive, Cluster Based, Sensor Network Routing Protocol.
Proceedings of the 13th UKSim-AMSS International Conference on Computer Modelling and Simulation, Cambridge University, Emmanuel College, Cambridge, UK, 30 March, 2011

2010
High Speed NIDS using Dynamic Cluster and Comparator Logic.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Virtualization in Network Intrusion Detection Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems.
Proceedings of the Information Security and Digital Forensics, 2009

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment.
Proceedings of the Information Security and Digital Forensics, 2009

A Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Empowered Certification Authority in VANETs.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Evaluating Intrusion Detection Systems in High Speed Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Fast Handoff Scheme Using Location Information.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008

Bi-directional Mapping System as a New IPv4/IPv6 Translation Mechanism.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008

Implementation of IPv4/IPv6 BDMS Translation Mechanism.
Proceedings of the EMS 2008, 2008

Evaluating BDMS and DSTM Transition Mechanisms.
Proceedings of the EMS 2008, 2008

An Open Reference Framework for Enterprise Information Security Risk Management Using the STOPE Scope and the Six-Sigma Process.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Factors mediating the routinisation of e-learning within a traditional university education environment.
Int. J. Electron. Bus., 2007


  Loading...