default search action
Peter Matthews
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i4]Pelin Ersin, Emma Hayes, Peter Matthews, Paramjyoti Mohapatra, Elisa Negrini, Karl Schulz:
Applications of ML-Based Surrogates in Bayesian Approaches to Inverse Problems. CoRR abs/2310.12046 (2023) - 2020
- [c14]Nadia Masood Khan, Gul Muhammad Khan, Peter Matthews:
AI Based Real-Time Signal Reconstruction for Wind Farm with SCADA Sensor Failure. AIAI (2) 2020: 207-218 - [i3]Victor Muntés-Mulero, Oscar Ripolles, Smrati Gupta, Jacek Dominiak, Eric Willeke, Peter Matthews, Balázs Somosköi:
Agile Risk Management for Multi-Cloud Software Development. CoRR abs/2001.03356 (2020)
2010 – 2019
- 2019
- [j8]Victor Muntés-Mulero, Oscar Ripolles, Smrati Gupta, Jacek Dominiak, Eric Willeke, Peter Matthews, Balázs Somoskoi:
Agile risk management for multi-cloud software development. IET Softw. 13(3): 172-181 (2019) - [j7]Erkuden Rios, Eider Iturbe, Xabier Larrucea, Massimiliano Rak, Wissam Mallouli, Jacek Dominiak, Victor Muntés, Peter Matthews, Luis Gonzalez:
Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems. IET Softw. 13(3): 213-222 (2019) - [c13]Mahnaz Mohammadi, Sardar F. Jaf, Andrew Stephen McGough, Toby P. Breckon, Peter Matthews, Georgios Theodoropoulos, Boguslaw Obara:
On the Use of Neural Text Generation for the Task of Optical Character Recognition. AICCSA 2019: 1-8 - [p1]Balázs Somoskoi, Stefan Spahr, Erkuden Rios, Oscar Ripolles, Jacek Dominiak, Tamás Cserveny, Péter Bálint, Peter Matthews, Eider Iturbe, Victor Muntés-Mulero:
Airline Application Security in the Digital Economy: Tackling Security Challenges for Distributed Applications in Lufthansa Systems. Digitalization Cases 2019: 35-58 - [i2]Fady Medhat, Mahnaz Mohammadi, Sardar F. Jaf, Chris G. Willcocks, Toby P. Breckon, Peter Matthews, Andrew Stephen McGough, Georgios Theodoropoulos, Boguslaw Obara:
TMIXT: A process flow for Transcribing MIXed handwritten and machine-printed Text. CoRR abs/1904.12387 (2019) - 2018
- [c12]Fady Medhat, Mahnaz Mohammadi, Sardar F. Jaf, Chris G. Willcocks, Toby P. Breckon, Peter Matthews, Andrew Stephen McGough, Georgios Theodoropoulos, Boguslaw Obara:
TMIXT: A process flow for Transcribing MIXed handwritten and machine-printed Text. IEEE BigData 2018: 2986-2994 - 2017
- [c11]Smrati Gupta, Jaume Ferrarons-Llagostera, Jacek Dominiak, Victor Muntés-Mulero, Peter Matthews, Erkuden Rios:
Security-Centric Evaluation Framework for IT Services. GPC 2017: 736-747 - 2016
- [c10]Jaume Ferrarons, Smrati Gupta, Victor Muntés-Mulero, Josep Lluís Larriba-Pey, Peter Matthews:
Scoring Cloud Services Through Digital Ecosystem Community Analysis. EC-Web 2016: 142-153 - [c9]Noura Al Moubayed, Toby P. Breckon, Peter Matthews, A. Stephen McGough:
SMS Spam Filtering Using Probabilistic Topic Modelling and Stacked Denoising Autoencoder. ICANN (2) 2016: 423-430 - [i1]Noura Al Moubayed, Toby P. Breckon, Peter Matthews, A. Stephen McGough:
SMS Spam Filtering using Probabilistic Topic Modelling and Stacked Denoising Autoencoder. CoRR abs/1606.05554 (2016) - 2015
- [c8]Amin M. Khan, Felix Freitag, Smrati Gupta, Victor Muntés-Mulero, Jacek Dominiak, Peter Matthews:
On Supporting Service Selection for Collaborative Multi-cloud Ecosystems in Community Networks. AINA 2015: 634-641 - [c7]Smrati Gupta, Victor Muntés-Mulero, Peter Matthews, Jacek Dominiak, Aida Omerovic, Jordi Aranda, Stepan Seycek:
Risk-Driven Framework for Decision Support in Cloud Service Selection. CCGRID 2015: 545-554 - 2014
- [j6]Gautier Koscielny, Gagarine Yaikhom, Vivek Iyer, Terrence F. Meehan, Hugh Morgan, Julian Atienza-Herrero, Andrew Blake, Chao-Kung Chen, Richard Easty, Armida Di Fenza, Tanja Fiegel, Mark Grifiths, Alan Horne, Natasha A. Karp, Natalja Kurbatova, Jeremy C. Mason, Peter Matthews, Darren J. Oakley, Asfand Qazi, Jack Regnart, Ahmad Retha, Luis A. Santos, Duncan J. Sneddon, Jonathan Warren, Henrik Westerberg, Robert J. Wilson, David G. Melvin, Damian Smedley, Steve D. M. Brown, Paul Flicek, William C. Skarnes, Ann-Marie Mallon, Helen E. Parkinson:
The International Mouse Phenotyping Consortium Web Portal, a unified point of access for knockout mice and related phenotyping data. Nucleic Acids Res. 42(Database-Issue): 802-809 (2014) - [c6]Carrie Gates, Peter Matthews:
Data Is the New Currency. NSPW 2014: 105-116 - 2012
- [c5]Theodoros Kalamatianos, Kostas Kontogiannis, Peter Matthews:
Domain Independent Event Analysis for Log Data Reduction. COMPSAC 2012: 225-232 - [c4]Danilo Ardagna, Elisabetta Di Nitto, Giuliano Casale, Dana Petcu, Parastoo Mohagheghi, Sébastien Mosser, Peter Matthews, Anke Gericke, Cyril Ballagny, Francesco D'Andria, Cosmin-Septimiu Nechifor, Craig Sheridan:
MODAClouds: a model-driven approach for the design and execution of applications on multiple clouds. MiSE 2012: 50-56 - 2011
- [j5]Brian Brooks, Adam L. Thorn, Matthew Smith, Peter Matthews, Shaoming Chen, Ben O'Steen, Sam E. Adams, Joe Townsend, Peter Murray-Rust:
Ami - The chemist's amanuensis. J. Cheminformatics 3: 45 (2011) - [c3]Konstantinos Zachos, James Lockerbie, Brian Hughes, Peter Matthews:
Towards a framework for describing cloud service characteristics for use by chief information officers. RESS 2011: 16-23 - 2010
- [c2]Peter Matthews, Cliff Changchun Zou:
Scene tagging: image-based CAPTCHA using image composition and object relationships. AsiaCCS 2010: 345-350 - [c1]Vasileios Koutsoumpas, Kostas Kontogiannis, Peter Matthews:
Dynamic Analysis for the Reconstruction of System Behavior Models. COMPSAC Workshops 2010: 273-280
1990 – 1999
- 1997
- [j4]Peter Matthews:
Aqua Universitas. J. Knowl. Manag. 1(2): 105-112 (1997) - [j3]Peter Matthews:
What Lies Beyond Knowledge Management: Wisdom Creation and Versatility. J. Knowl. Manag. 1(3): 207-214 (1997) - 1996
- [j2]Keith E. Humenik, Peter Matthews, A. B. Stephens, Yelena Yesha:
Minimizing message complexity of partially replicated data on hypercubes. Networks 28(2): 87-95 (1996) - 1995
- [j1]Keith E. Humenik, Peter Matthews, A. B. Stephens, Yelena Yesha:
A Lower Bound on the Probability of Conflict Under Nonuniform Access in Database Systems. Algorithmica 13(3): 283-312 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint