Steve Barker

According to our database1, Steve Barker authored at least 68 papers between 1999 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A High-Sensitivity and Low-Power Circuit for the Measurement of Abnormal Blood Cell Levels.
J. Circuits Syst. Comput., 2020

A Positive Feedback-Based Op-Amp Gain Enhancement Technique for High-Precision Applications.
J. Circuits Syst. Comput., 2020

A VGA Linearity Improvement Technique for ECG Analog Front-End in 65nm CMOS.
J. Circuits Syst. Comput., 2020

A two-stage opamp frequency Compensation technique by splitting the 2<sup>nd</sup> stage.
Proceedings of the 11th International Conference on Computing, 2020

A Single BJT 10.2 ppm/°C Bandgap Reference in 45nm CMOS Technology.
Proceedings of the 11th International Conference on Computing, 2020

2019
A Start-up Assisted Fully Differential Folded Cascode Opamp.
J. Circuits Syst. Comput., 2019

A Low Noise Amplifier Suitable for Biomedical Recording Analog Front-End in 65nm CMOS Technology.
J. Circuits Syst. Comput., 2019

A 0.55 V Bandgap Reference with a 59 ppm/°C Temperature Coefficient.
J. Circuits Syst. Comput., 2019

A High Value, Linear and Tunable CMOS Pseudo-Resistor for Biomedical Applications.
J. Circuits Syst. Comput., 2019

A High-Performance Skin Impedance Measurement Circuit for Biomedical Applications.
J. Circuits Syst. Comput., 2019

A High Frequency CMRR improvement technique for Differential Amplifiers in 45nm CMOS.
Proceedings of the 10th International Conference on Computing, 2019

A Low Power Miller Compensation Technique for Two Stage Op-amp in 65nm CMOS Technology.
Proceedings of the 10th International Conference on Computing, 2019

2018
A 0.6 V MOS-Only Voltage Reference for Biomedical Applications with 40 ppm/∘C Temperature Drift.
J. Circuits Syst. Comput., 2018

A 31 ppm/° C Pure CMOS Bandgap Reference by Exploiting Beta-Multiplier.
Proceedings of the VLSI Design and Test - 22nd International Symposium, 2018

High Performance Circuit Techniques for Nueral Front-End Design in 65nm CMOS.
Proceedings of the 9th International Conference on Computing, 2018

A Technique to Reduce the Capacitor Size in Two Stage Miller Compensated Opamp.
Proceedings of the 9th International Conference on Computing, 2018

2017
Natural head movement for HRI with a muscular-skeletal head and neck robot.
Proceedings of the 26th IEEE International Symposium on Robot and Human Interactive Communication, 2017

2015
Design of a biologically inspired humanoid neck.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

2014
Reasoning about delegation and revocation schemes in answer set programming.
J. Log. Comput., 2014

Analysis and Design of a High Precision-High output impedance Tissue Current Driver for Medical Applications.
J. Circuits Syst. Comput., 2014

2012
Access Control with Privacy Enhancements a Unified Approach.
IEEE Trans. Dependable Secur. Comput., 2012

The Scientific Contribution of Marek Sergot.
Proceedings of the Logic Programs, Norms and Action, 2012

Logical Approaches to Authorization Policies.
Proceedings of the Logic Programs, Norms and Action, 2012

2011
GPF: A General Policy Framework.
Proceedings of the POLICY 2011, 2011

Secommunity: A Framework for Distributed Access Control.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2011

Socially Constructed Trust for Distributed Authorization.
Proceedings of the Computer Security - ESORICS 2011, 2011

Dynamics in Delegation and Revocation Schemes: A Logical Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
Personalizing access control by generalizing access control.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

A Logic of Privacy.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
A Meta-model of Access Control in a Fibred Security Language.
Stud Logica, 2009

The next 700 access control models or a unifying meta-model?
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
Status-Based Access Control.
ACM Trans. Inf. Syst. Secur., 2008

Efficient and flexible access control via Jones-optimal logic program specialisation.
High. Order Symb. Comput., 2008

Event-oriented Web-based E-trading.
Proceedings of the 4th International Workshop on Automated Specification and Verification of Web Systems, 2008

Action Control by Term Rewriting.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

Access control by action control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Panel Session: What Are the Key Challenges in Distributed Security?.
Proceedings of the Data and Applications Security XXII, 2008

Dynamic Meta-level Access Control in SQL.
Proceedings of the Data and Applications Security XXII, 2008

2007
Action-status access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Secure knowledge exchange by policy algebra and erml.
Proceedings of the ICEIS 2007, 2007

Dynamic Event-Based Access Control as Term Rewriting.
Proceedings of the Data and Applications Security XXI, 2007

2006
Term Rewriting for Access Control.
Proceedings of the Data and Applications Security XX, 2006

2005
An E-learning tool for Database Administration.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Intelligent Tutoring System for Program Semantics.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2004
Efficient and flexible access control via logic program specialisation.
Proceedings of the 2004 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2004

Dependency Theory E-Learning Tool.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Access Policy Specification for Web Applications.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Labeled Logic Programs.
Proceedings of the Logic Programming, 20th International Conference, 2004

An Intelligent Tutoring System for Database Transaction Processing.
Proceedings of the ICEIS 2004, 2004

Web Resource Usage Control in RSCLP.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Flexible access control policy specification with constraint logic programming.
ACM Trans. Inf. Syst. Secur., 2003

Distributed Access Control: A Logic-Based Approach.
Proceedings of the Computer Network Security, 2003

An E-Learning Tool for Understanding Schedule Properties.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Extended Protected Databases: A Practical Implementation.
Proceedings of the ICEIS 2003, 2003

RBAC Policy Implementation for SQL Databases.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Protecting deductive databases from unauthorized retrieval and update requests.
Data Knowl. Eng., 2002

Access Control for Deductive Databases by Logic Programming.
Proceedings of the Logic Programming, 18th International Conference, 2002

Implementing RBAC Policies.
Proceedings of the Research Directions in Data and Applications Security, 2002

Deductive Database Security.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Secure Deductive Databases.
Proceedings of the Practical Aspects of Declarative Languages, 2001

TRBAC: A Temporal Authorization Model.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Flexible Security Policies in SQL.
Proceedings of the Database and Application Security XV, 2001

2000
Information Security: A Logic Based Approach.
Proceedings of the ICEIS 2000, 2000

Protecting Deductive Databases from Unauthorized Retrievals.
Proceedings of the Data and Application Security, 2000

Data Protection by Logic Programming.
Proceedings of the Computational Logic, 2000

1999
An Expert System for Intelligent Database Design.
Proceedings of the International Conference on Artificial Intelligence, 1999

Temporal Authorization in the Simplified Event Calculus.
Proceedings of the Research Advances in Database and Information Systems Security, 1999


  Loading...