2008 |
8 | EE | Peter Williams,
Radu Sion,
Bogdan Carbunar:
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
ACM Conference on Computer and Communications Security 2008: 139-148 |
7 | EE | Peter Williams:
Privacy Threats in Online Stock Quotes.
Financial Cryptography 2008: 316-317 |
2007 |
6 | EE | Peter Williams,
Sheng Li,
Jianfeng Feng,
Si Wu:
A Geometrical Method to Improve Performance of the Support Vector Machine.
IEEE Transactions on Neural Networks 18(3): 942-947 (2007) |
2005 |
5 | EE | Peter Williams,
Sheng Li,
Jianfeng Feng,
Si Wu:
Scaling the Kernel Function to Improve Performance of the Support Vector Machine.
ISNN (1) 2005: 831-836 |
2003 |
4 | EE | David Nicholas,
Paul Huntington,
Peter Williams:
Three years of digital consumer health information: a longitudinal study of the touch screen health kiosk.
Inf. Process. Manage. 39(3): 479-502 (2003) |
1994 |
3 | EE | Peter T. Kirstein,
Peter Williams:
Piloting authentication and security services in the 'PASSWORD' project.
Computer Communications 17(7): 519-531 (1994) |
1992 |
2 | | Peter T. Kirstein,
Peter Williams:
Piloting Authentication and Security Services within OSI Applications for RTD Information (PASSWORD).
Computer Networks and ISDN Systems 25(4-5): 483-489 (1992) |
1990 |
1 | EE | William Jones,
Peter Williams,
George G. Robertson,
Mike Conner:
In search for ideal operating system for user interfacing.
UIST 1990: 31-35 |