default search action
Stephen Blott
Person information
- affiliation: Dublin City University, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2009
- [c23]Gavin O'Gorman, Stephen Blott:
Improving stream correlation attacks on anonymous networks. SAC 2009: 2024-2028 - [c22]Gavin O'Gorman, Stephen Blott:
Simulating low-latency anonymous networks. SpringSim 2009 - 2008
- [j4]Stephen Blott, Roger Weber:
What's wrong with high-dimensional similarity search? Proc. VLDB Endow. 1(1): 3 (2008) - 2007
- [c21]Gavin O'Gorman, Stephen Blott:
Large Scale Simulation of Tor: . ASIAN 2007: 48-54 - [c20]Fabrice Camous, Stephen Blott, Alan F. Smeaton:
Ontology-Based MEDLINE Document Classification. BIRD 2007: 439-452 - 2006
- [c19]Fabrice Camous, Stephen Blott, Alan F. Smeaton:
On Combining Text and MeSH Searches to Improve the Retrieval of MEDLINE documents. CORIA 2006: 271-282 - 2005
- [c18]Ciaran Ferry, Stephen Blott:
The consistent web: a vision for the future. CoNEXT 2005: 240-241 - [c17]Stephen Blott, Fabrice Camous, Cathal Gurrin, Gareth J. F. Jones, Alan F. Smeaton:
On the use of Clustering and the MeSH Controlled Vocabulary to Improve MEDLINE Abstract Search. CORIA 2005: 41-56 - [c16]Fabrice Camous, Stephen Blott, Cathal Gurrin, Gareth J. F. Jones, Alan F. Smeaton:
Structural Term Extraction for Expansion of Template-Based Genomic Queries. TREC 2005 - 2004
- [c15]Stephen Blott, Fabrice Camous, Paul Ferguson, Georgina Gaughan, Cathal Gurrin, Gareth J. F. Jones, Noel Murphy, Noel E. O'Connor, Alan F. Smeaton, Peter Wilkins, Oisín Boydell, Barry Smyth:
Experiments in Terabyte Searching, Genomic Retrieval and Novelty Detection for TREC 2004. TREC 2004 - 2003
- [c14]Stephen Blott, Cathal Gurrin, Gareth J. F. Jones, Alan F. Smeaton, Thomas Sødring:
On the Use of MeSH Headings to Improve Retrieval Effectiveness. TREC 2003: 215-224 - 2002
- [c13]Stephen Blott, Henry F. Korth:
An Almost-Serial Protocol for Transaction Execution in Main-Memory Database Systems. VLDB 2002: 706-717
1990 – 1999
- 1999
- [j3]Stephen Blott, Clifford E. Martin, Yuri Breitbart, José Carlos Brustoloni, Thomas R. Gramaglia, Henry F. Korth, David M. Kristol, Robert H. Liao, Eben Scanlon, Avi Silberschatz:
User-level billing and accounting in IP networks. Bell Labs Tech. J. 4(4): 237-251 (1999) - 1998
- [j2]Gerald D. Baulier, Stephen Blott, Henry F. Korth, Avi Silberschatz:
Sunrise: A real-time event-processing system. Bell Labs Tech. J. 3(1): 3-18 (1998) - [c12]Roger Weber, Hans-Jörg Schek, Stephen Blott:
A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces. VLDB 1998: 194-205 - [c11]Jerry Baulier, Stephen Blott, Henry F. Korth, Abraham Silberschatz:
A Database System for Real-Time Event Aggregation in Telecommunication. VLDB 1998: 680-684 - [c10]Stephen Blott, Henry F. Korth, Abraham Silberschatz:
Information, Communication, and Money: For What Can We Charge and How Can We Meter It? VLDB 1998: 697 - 1997
- [c9]Gustavo Alonso, Stephen Blott, Armin Fessler, Hans-Jörg Schek:
Correctness and Parallelism of Composite Systems. PODS 1997: 197-208 - 1996
- [c8]Stephen Blott, Lukas Relly, Hans-Jörg Schek:
An Open Storage System for Abstract Objects. SIGMOD Conference 1996: 330-340 - 1995
- [c7]Lukas Relly, Stephen Blott:
Ein Speichersystem für abstrakte Objekte. BTW 1995: 338-347 - [c6]Stephen Blott, Andrej Vckovski:
Accessing Geographical Metafiles through a Database Storage System. SSD 1995: 117-131 - 1994
- [j1]Moira C. Norrie, Stephen Blott, Hans-Jörg Schek, Gerhard Weikum:
The Database Research Group at ETH Zurich. SIGMOD Rec. 23(1): 116-121 (1994) - [c5]Stephen Blott, Helmut Kaufmann, Lukas Relly, Hans-Jörg Schek:
Buffering Long Externally-Defined Objects. POS 1994: 45-59 - 1993
- [c4]Stephen Blott, Moira C. Norrie, David J. Harper, Andrew D. M. Walker:
Detecting Semantic Violations in Generalised Classification Structures. ICICIS 1993: 300-308 - 1991
- [b1]Stephen Blott:
An approach to overloading with polymorphism. University of Glasgow, UK, 1991
1980 – 1989
- 1989
- [c3]Stephen Blott:
Type Inference and Type Classes. Functional Programming 1989: 254-265 - [c2]Kevin Hammond, Stephen Blott:
Implementing Haskell Type Classes. Functional Programming 1989: 266-286 - [c1]Philip Wadler, Stephen Blott:
How to Make ad-hoc Polymorphism Less ad-hoc. POPL 1989: 60-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint