Andrew Jones

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
HPC and Cloud Convergence Beyond Technical Boundaries: Strategies for Economic Sustainability, Standardization, and Data Accessibility.
Computer, June, 2024

XaaS: Acceleration as a Service to Enable Productive High-Performance Cloud Computing.
CoRR, 2024

2023
Determinants for scalable adoption of autonomous AI in the detection of diabetic eye disease in diverse practice types: key best practices learned through collection of real-world data.
Frontiers Digit. Health, May, 2023

Kernel Density Bayesian Inverse Reinforcement Learning.
CoRR, 2023

Compositional Q-learning for electrolyte repletion with imbalanced patient sub-populations.
Proceedings of the Machine Learning for Health, 2023

Hyperbolic Routing for Cache Privacy in Information Centric Networking.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
A Poisson reduced-rank regression model for association mapping in sequencing data.
BMC Bioinform., 2022

2021
Nested Policy Reinforcement Learning.
CoRR, 2021

Simulation and Analysis of Self-Replicating Robot Decision-Making Systems.
Comput., 2021

Spectral embedding for dynamic networks with stability guarantees.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Neural Lumigraph Rendering.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Probabilistic Contrastive Principal Component Analysis.
CoRR, 2020

The multilayer random dot product graph.
CoRR, 2020

A Privacy-Preserving Collaborative Caching Approach in Information-Centric Networking.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

2019
Survey of data remaining on second hand memory cards in the UK.
Comput. Secur., 2019

eHealth: Challenges Far Integrating BlockChain within Healthcare.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

Implications of the Method of Construction of UK Number Plates for Infrared Reflectance and Camera Settings on ANPR System.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

Killing Your Device via Your USB Port.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Developing a Framework for Autonomous Control Software for a Human Colony on Mars.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Use of Computer Vision for White Line Detection for Robotic Applications.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

2018
Critical Care Health Informatics Collaborative (CCHIC): Data, tools and methods for reproducible research: A multi-centre UK intensive care database.
Int. J. Medical Informatics, 2018

BeachBot: Crowdsourcing Garbage Collection with Amphibious Robot Network.
Proceedings of the Companion of the 2018 ACM/IEEE International Conference on Human-Robot Interaction, 2018

Validating Mastery Learning: Assessing the Impact of Adaptive Learning Objective Mastery in Knewton Alta.
Proceedings of the Artificial Intelligence in Education - 19th International Conference, 2018

2017

Internet of Things Security: A Review of Risks and Threats to Healthcare Sector.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
Modular elliptic curves over the field of twelfth roots of unity.
LMS J. Comput. Math., 2016

Cyber Security & Ethical Hacking For SMEs.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

A Framework for Assessing the Core Capabilities of a Digital Forensic Organization.
Proceedings of the Advances in Digital Forensics XII, 2016

Information security and digital forensics in the world of cyber physical systems.
Proceedings of the Eleventh International Conference on Digital Information Management, 2016

2015
Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games.
Multim. Tools Appl., 2015

The adaptive buffered force QM/MM method in the CP2K and AMBER software packages.
J. Comput. Chem., 2015

2014
Music Analysis as a Smallest Grammar Problem.
Proceedings of the 15th International Society for Music Information Retrieval Conference, 2014

μTunes: A Study of Musicality Perception in an Evolutionary Context.
Proceedings of the Music Technology meets Philosophy, 2014

2013
Management flight simulators to support climate negotiations.
Environ. Model. Softw., 2013

Self-deception and the Logic of Belief.
Proceedings of the Eleventh European Workshop on Multi-Agent Systems (EUMAS 2013), 2013

2012
An Analysis of Peer to Peer Protocols for Massively Multiplayer Online Games.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Social TV: The impact of social awareness on content navigation within IPTV systems.
Comput. Entertain., 2011

EFFEX: an embedded processor for computer vision based feature extraction.
Proceedings of the 48th Design Automation Conference, 2011

2010
TriggerTV: exploiting social user journeys within an interactive TV system.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2010

Grid connection of renewable energy.
Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies, 2010

Social TV: toward content navigation using social awareness.
Proceedings of the 8th European Conference on Interactive TV and Video, 2010

2005
Analyzing Threat Agents and Their Attributes.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Risk Management for Computer Security - Protecting Your Network and Information Assets.
Elsevier, ISBN: 978-0-7506-7795-0, 2005

1998
Performance/cost analyses for common network topologies.
Microprocess. Microsystems, 1998

Deadlock-free interval labelling.
Microprocess. Microsystems, 1998


  Loading...