default search action
Richard Taylor
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Richard N. Taylor (aka: Richard Taylor 0001) — University of California, Irvine, USA
- Richard Taylor 0002 — Telecom Australia Research Laboratories, Clayton, VIC, USA
- Richard Taylor 0003 — Stockholm Environment Institute, Oxford Branch, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j15]Kyle Robert Harrison, Saber M. Elsayed, Ivan L. Garanovich, Terence Weir, Michael Galister, Sharon G. Boswell, Richard Taylor, Ruhul A. Sarker:
A Hybrid Multi-Population Approach to the Project Portfolio Selection and Scheduling Problem for Future Force Design. IEEE Access 9: 83410-83430 (2021) - 2020
- [j14]Kyle Robert Harrison, Saber M. Elsayed, Ivan L. Garanovich, Terence Weir, Michael Galister, Sharon G. Boswell, Richard Taylor, Ruhul A. Sarker:
Portfolio Optimization for Defence Applications. IEEE Access 8: 60152-60178 (2020) - 2016
- [j13]Richard Taylor:
Approximation of the Quadratic Knapsack Problem. Oper. Res. Lett. 44(4): 495-497 (2016) - 2015
- [j12]Richard Taylor, Michael Fitzpatrick:
Carey grammar school: a case study of the degree to which a digitally rich school can be considered to have the attributes of a digital society. SIGCAS Comput. Soc. 45(3): 427-431 (2015) - 2013
- [j11]Anthony H. Dekker, Richard Taylor:
Synchronization Properties of Trees in the Kuramoto Model. SIAM J. Appl. Dyn. Syst. 12(2): 596-617 (2013) - 2012
- [j10]Richard Taylor:
Social responsibility in the information society: a potential knowledge gap for tomorrow's policy makers. SIGCAS Comput. Soc. 42(1): 28-33 (2012) - 2009
- [j9]Richard Taylor:
Understanding how OSS Development Models can influence assessment methods. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 20 (2009) - 2005
- [j8]Adam Baumberg, Alex Lyons, Richard Taylor:
3D S.O.M. - A commercial software solution to 3D scanning. Graph. Model. 67(6): 476-495 (2005) - 2004
- [j7]Piergiuseppe Morone, Richard Taylor:
Small World Dynamics and The Process of Knowledge Diffusion: The Case of The Metropolitan Area of Greater Santiago De Chile. J. Artif. Soc. Soc. Simul. 7(2) (2004) - 2000
- [j6]Richard Taylor, David F. Redmiles:
Endeavors. ACM SIGSOFT Softw. Eng. Notes 25(1): 101 (2000) - 1997
- [j5]Richard Taylor:
ICSE 97 program update. ACM SIGSOFT Softw. Eng. Notes 22(1): 7 (1997) - 1996
- [j4]Adrian Bowyer, Gary Bayliss, Richard Taylor, Philip Willis:
A Virtual Factory. Int. J. Shape Model. 2(4): 215-226 (1996) - 1990
- [j3]Richard Taylor, Ron Addie:
An Algorithm for Calculating the Availability and Mean Time to Restore for Communication Through a Network. Comput. Networks ISDN Syst. 20(1): 109-114 (1990) - [j2]Richard Taylor:
Reconstructing degree sequences from k-vertex-deleted subgraphs. Discret. Math. 79(2): 207-213 (1990) - 1957
- [j1]Richard Taylor:
A Mechanical Heart-Lung Apparatus. IBM J. Res. Dev. 1(4): 330-340 (1957)
Conference and Workshop Papers
- 2020
- [c22]Kyle Robert Harrison, Saber M. Elsayed, Terence Weir, Ivan L. Garanovich, Michael Galister, Sharon G. Boswell, Richard Taylor, Ruhul A. Sarker:
Multi-Period Project Selection and Scheduling for Defence Capability-Based Planning. SMC 2020: 4044-4050 - [c21]Kyle Robert Harrison, Saber M. Elsayed, Terence Weir, Ivan L. Garanovich, Richard Taylor, Ruhul A. Sarker:
An Exploration of Meta-Heuristic Approaches for the Project Portfolio Selection and Scheduling Problem in a Defence Context. SSCI 2020: 1395-1402 - 2019
- [c20]Zhixing Zhao, Patrick James Artz, Klaus Hempel, Juergen Faul, Tianbing Chen, Richard Taylor, Jerome Mazurier, Carsten Grass, Jan Hoentschel, David Harame, Steffen Lehmann, Luca Lucci, Yogadissen Andee, Alexis Divay, Luca Pirro, Tom Herrmann, Alban Zaka, Ricardo Sousa:
22FDX® fMAX Optimization through Parasitics Reduction and GM Boost. ESSDERC 2019: 166-169 - 2017
- [c19]Jerzy Jagiello, Yue-Jin Wang, Richard Taylor:
Interdependency Analysis for the SUDEMIL Framework. ICCMS 2017: 32-37 - 2016
- [c18]Andrew Ennis, Ian Cleland, Timothy Patterson, Chris D. Nugent, Federico Cruciani, Cristiano Paggetti, Gareth Morrison, Richard Taylor:
Doorstep: A doorbell security system for the prevention of doorstep crime. EMBC 2016: 5360-5363 - 2015
- [c17]Linh Bao Ngo, Michael E. Payne, Flavio Villanustre, Richard Taylor, Amy W. Apon:
Dynamic Provisioning of Data Intensive Computing Middleware Frameworks: A Case Study. SCREAM@HPDC 2015: 3-10 - 2014
- [c16]Marc A. Smith, Yuri Demchenko, Robert K. Atkinson, Richard Taylor, Matt Franks:
CTS 2014 tutorials. CTS 2014: 1-11 - 2012
- [c15]Sriramkumar Venugopalan, Krishnanshu Dandu, Samuel Martin, Richard Taylor, Claude Cirba, Xin Zhang, Ali M. Niknejad, Chenming Hu:
A non-iterative physical procedure for RF CMOS compact model extraction using BSIM6. CICC 2012: 1-4 - [c14]Richard Taylor:
ITGS - A Blueprint for a Social Informatics Course in Pre-university Education. HCC 2012: 192-201 - 2009
- [c13]Richard Taylor:
Exploring the Architecture of Ultra Large Scale. SBCARS 2009: 1 - 2008
- [c12]Richard Taylor, Chris M. N. Tofts:
Taking a RaSP to Enterprise Stakeholder Dissonance. EDOC 2008: 300-306 - 2007
- [c11]Richard Taylor:
Effective Prediction and its Computational Complexity. CATS 2007: 145-151 - [c10]Paul Morgan, Richard Taylor:
ASIP Instruction Encoding for Energy and Area Reduction. DAC 2007: 797-800 - 2006
- [c9]Richard Taylor:
Ethnocentric Strategies in Information Security Management. AMCIS 2006: 405 - [c8]Richard Taylor:
Management Perception of Unintentional Information Security Risks. ICIS 2006: 95 - 2005
- [c7]Paul Morgan, Richard Taylor, Japheth Hossell, George Bruce, Barry O'Rourke:
Automated data cache placement for embedded VLIW ASIPs. CODES+ISSS 2005: 39-44 - 2004
- [c6]Richard Taylor, Nellai Subramaniam:
Networking in the New Millennium: Business Applications for Peer-to-Peer and Grid Computing. AMCIS 2004: 503 - [c5]Ben I. Hounsell, Richard Taylor:
Co-Processor Synthesis: A New Methodology for Embedded Software Acceleration. DATE 2004: 682-683 - 2003
- [c4]Adam Baumberg, Alex Lyons, Richard Taylor:
3D S.O.M. - A Commercial Software Solution to 3D Scanning. VVG 2003: 41-48 - 2000
- [c3]Richard Taylor:
Concurrency in the Data Warehouse. VLDB 2000: 724-727 - 1992
- [c2]Eugenio Zabala, Richard Taylor:
Maritxu: Generic Visualization of Highly Parallel Processing. Programming Environments for Parallel Computing 1992: 171-180 - 1988
- [c1]Chris Salzmann, Martin Funcell, Richard Taylor:
Design for Test and the Cost of Quality. ITC 1988: 302-307
Parts in Books or Collections
- 2014
- [p1]Richard Taylor:
Predicting the Future of Computers in Schools - A Reflection Paper? Reflections on the History of Computers in Education 2014: 339-346
Informal and Other Publications
- 2024
- [i4]Christophe Nicolet, Matthieu Dreyer, Christian Landry, Sébastien Alligné, Antoine Béguin, Yves Vaillant, Stefan Tobler, Goekhan Sari, Grégory Païs, Matteo Bianciotto, Steve Sawyer, Richard Taylor, Manuel Vaz Castro, Maria Helena Vasconcelos, Carlos Moreira:
XFLEX HYDRO demonstrators grid services assessment and Ancillary Services Matrix elaboration. CoRR abs/2404.06275 (2024) - 2019
- [i3]Jerzy A. Filar, Michael Haythorpe, Richard Taylor:
Linearly-growing Reductions of Karp's 21 NP-complete Problems. CoRR abs/1902.10349 (2019) - 2016
- [i2]Richard Taylor:
Approximations of the Densest k-Subhypergraph and Set Union Knapsack problems. CoRR abs/1610.04935 (2016) - 2015
- [i1]Richard Taylor:
$O(n^{2/5})$ Approximation of the Quadratic Knapsack Problem. CoRR abs/1509.01866 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint