2008 | ||
---|---|---|
22 | EE | Alastair R. Beresford, David Scott: Data Privacy. Wiley Encyclopedia of Computer Science and Engineering 2008 |
2007 | ||
21 | EE | Anil Madhavapeddy, Alex Ho, Tim Deegan, David Scott, Ripduman Sohan: Melange: creating a "functional" internet. EuroSys 2007: 101-114 |
20 | EE | Eleanor F. Toye, Richard Sharp, Anil Madhavapeddy, David Scott, Eben Upton, Alan F. Blackwell: Interacting with mobile services: an evaluation of camera-phones and visual tags. Personal and Ubiquitous Computing 11(2): 97-106 (2007) |
2005 | ||
19 | EE | Aubrey Jackson, David Scott: (no title). Rule Languages for Interoperability 2005 |
18 | EE | Anil Madhavapeddy, David Scott, Richard Sharp: SPLAT: A Tool for Model-Checking and Dynamically-Enforcing Abstractions. SPIN 2005: 277-281 |
17 | EE | David Scott, Richard Sharp, Anil Madhavapeddy, Eben Upton: Using visual tags to bypass Bluetooth device discovery. Mobile Computing and Communications Review 9(1): 41-53 (2005) |
2004 | ||
16 | EE | Kieran Mansley, David Scott, Alastair Tse, Anil Madhavapeddy: Feedback, latency, accuracy: exploring tradeoffs in location-aware gaming. NETGAMES 2004: 93-97 |
15 | EE | Kieran Mansley, Alastair R. Beresford, David Scott: The Carrot Approach: Encouraging Use of Location Systems. Ubicomp 2004: 366-383 |
2003 | ||
14 | EE | David Scott, Alastair R. Beresford, Alan Mycroft: Spatial Security Policies for Mobile Agents in a Sentient Computing Environment. FASE 2003: 102-117 |
13 | EE | David Scott: Standards Based High Performance Computing. HiPC 2003: 310 |
12 | EE | David Scott, Alastair R. Beresford, Alan Mycroft: Spatial Policies for Sentient Mobile Applications. POLICY 2003: 147-157 |
11 | Anil Madhavapeddy, Alan Mycroft, David Scott, Richard Sharp: The Case for Abstracting Security Policies. Security and Management 2003: 156-160 | |
10 | EE | Anil Madhavapeddy, David Scott, Richard Sharp: Context-Aware Computing with Sound. Ubicomp 2003: 315-332 |
9 | EE | David Scott, Richard Sharp: Specifying and Enforcing Application-Level Web Security Policies. IEEE Trans. Knowl. Data Eng. 15(4): 771-783 (2003) |
2002 | ||
8 | EE | David Scott, Shaoping Tang, Song Zhao, Mahalingam Nandakumar: Device Physics Impact on Low Leakage, High Speed DSP Design Techniques (invited). ISQED 2002: 349-354 |
7 | EE | David Scott, Richard Sharp: Abstracting application-level web security. WWW 2002: 396-407 |
6 | EE | Carl Barnhart, Vanessa Brunkhorst, Frank Distler, Owen Farnsworth, Andrew Ferko, Brion L. Keller, David Scott, Bernd Könemann, Takeshi Onodera: Extending OPMISR beyond 10x Scan Test Efficiency. IEEE Design & Test of Computers 19(5): 65-72 (2002) |
5 | EE | David Scott, Richard Sharp: Developing Secure Web Applications. IEEE Internet Computing 6(6): 38-45 (2002) |
1997 | ||
4 | EE | Terri K. Attwood, H. Avison, Michael E. Beck, Maria C. Bewley, Alan J. Bleasby, F. Brewster, P. Cooper, Kirill Degtyarenko, A. J. Geddes, Darren R. Flower, M. P. Kelly, Shaun Lott, K. M. Measures, D. J. Parry-Smith, D. N. Perkins, Philip Scordis, David Scott, C. Worledge: The PRINTS Database of Protein Fingerprints: A Novel Information Resource for Computational Molecular Biology. Journal of Chemical Information and Computer Sciences 37(3): 417-424 (1997) |
1996 | ||
3 | EE | Timothy G. Mattson, David Scott, Stephen R. Wheat: A TeraFLOP Supercomputer in 1996: The ASCI TFLOP System. IPPS 1996: 84-93 |
1992 | ||
2 | Tom Cwik, Jean Patterson, David Scott: Electromagnetic Scattering Calculations on the Intel Touchstone Delta. SC 1992: 538-542 | |
1980 | ||
1 | EE | David Scott: General image manipulation functions in a geographic information system. ACM Southeast Regional Conference 1980: 155-159 |