Stephen Johnson

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2022
In-network Support for Packet Reordering for Multiaccess Transport Layer Tunneling.
Proceedings of the 11th IEEE IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks, 2022

2014
A better sequence-read simulator program for metagenomics.
BMC Bioinform., 2014

2011
Improving the customer experience for heterogeneous wireless access.
Bell Labs Tech. J., 2011

Mathematical structure of topological solitons due to the Sine-Gordon Equation.
Appl. Math. Comput., 2011

2010
KnoWhere: User's Attitudes towards and Experiences with an Experimental Location Based Service.
Proceedings of the User Centric Media - Second International ICST Conference, 2010

Capturing And Replaying Streaming Media In A Web Archive - A British Library Case Study.
Proceedings of the 7th International Conference on Digital Preservation, 2010

Machine learning approaches for customized docking scores: Modeling of inhibition of Mycobacterium tuberculosis enoyl acyl carrier protein reductase.
Proceedings of the 2010 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2010

2008
Quantitative structure-property relationships for drug solubility prediction using evolved neural networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2006
Java in a teacup.
ACM Queue, 2006

Unfolding the user experience in new scenarios of pervasive interactive TV.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Cryptographic consumer electronic devices filesystems performance.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

An operating system security method for integrity and privacy protection in consumer electronics.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

Stephen Johnson on digital photography.
O'Reilly, ISBN: 978-0-596-52370-1, 2006

2004
Formalization and abstract implementation of rewriting with nested rules.
Proceedings of the 6th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2004

Applicability of low water-mark mandatory access control security in Linux-based advanced networked consumer electronics.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2002
Backtracking and Re-Execution in the Automatic Debugging of Parallelized Programs.
Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing (HPDC-11 2002), 2002

1995
Efficient Processing of Proximity Queries for Large Databases.
Proceedings of the Eleventh International Conference on Data Engineering, 1995

1993
The Gold Mailer.
Proceedings of the Ninth International Conference on Data Engineering, 1993


  Loading...