Stephen Thomas

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.


Improving Fairness in Credit Lending Models using Subgroup Threshold Optimization.
CoRR, 2024

Thousands of AI Authors on the Future of AI.
CoRR, 2024

Performance of Low Synchronization Orthogonalization Methods in Anderson Accelerated Fixed Point Solvers.
Proceedings of the 2022 SIAM Conference on Parallel Processing for Scientific Computing, 2022

Label Errors in BANKING77.
Proceedings of the Third Workshop on Insights from Negative Results in NLP, 2022

A Novel Metric to Evaluate In Situ Workflows.
Proceedings of the Computational Science - ICCS 2020, 2020

Characterizing In Situ and In Transit Analytics of Molecular Dynamics Simulations for Next-Generation Supercomputers.
Proceedings of the 15th International Conference on eScience, 2019

Improved Model for Three-Dimensional Virtual Concrete: Anm Model.
J. Comput. Civ. Eng., 2016

Improving the numerical convergence of viscous-plastic sea ice models with the Jacobian-free Newton-Krylov method.
J. Comput. Phys., 2010

On automated prepared statement generation to remove SQL injection vulnerabilities.
Inf. Softw. Technol., 2009

Design and deployment of a blood safety monitoring tool.
Proceedings of the 2009 International Conference on Information and Communication Technologies and Development, 2009

Design of a blood flow system.
Proceedings of the 2009 International Conference on Information and Communication Technologies and Development, 2009

Using Automated Fix Generation to Secure SQL Statements.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

Modelling sovereign credit ratings: Neural networks versus ordered probit.
Expert Syst. Appl., 2006

Impact of demographic and economic variables on financial policy purchase timing decisions.
J. Oper. Res. Soc., 2005

Insecurity in ATM-based passive optical networks.
Proceedings of the IEEE International Conference on Communications, 2002

Transmission of IPv6 Packets over Token Ring Networks.
RFC, December, 1998

Will commercial applications for biometric-based solutions really take off in 1998?
Inf. Secur. Tech. Rep., 1998

Benchmarking Implementations of Functional Languages with 'Pseudoknot', a Float-Intensive Benchmark.
J. Funct. Program., 1996

Garbage Collection in shared-environment Closure Reducers: Space-Efficient Depth First Copying Using a Tailored Approach.
Inf. Process. Lett., 1995

A dynamic naming protocol for ISO networks.
Comput. Commun. Rev., 1987

Netbios for ISO networks.
Comput. Commun. Rev., 1987