default search action
Paul Thomas
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Paul Thomas 0001 — Microsoft, Australia (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c27]Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole:
Granular IoT Device Identification Using TF-IDF and Cosine Similarity. CPSIOTSEC@CCS 2023: 91-99 - [c26]Aparajita Jaiswal, Paul Thomas, Tugba Karabiyik:
Characterizing Intercultural Competence among Cybersecurity Majors. FIE 2023: 1-5 - [c25]Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole:
Reliable Identification of IoT Devices from Passive Network Traffic Analysis: Requirements and Recommendations. WF-IoT 2023: 1-6 - 2022
- [c24]Aparajita Jaiswal, Tugba Karabiyik, Paul Thomas, Alejandra J. Magana:
Operationalizing team commitment in a project-based learning environment. FIE 2022: 1-6 - [c23]Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole:
Keyword Extraction for Fine-Grained IoT Device Identification. FMEC 2022: 1-7 - 2020
- [j10]Prasenjit Saha, Prasenjit Debnath, Paul Thomas:
Prediction of fresh and hardened properties of self-compacting concrete using support vector regression approach. Neural Comput. Appl. 32(12): 7995-8010 (2020) - [j9]Michael Hutchinson, Cunjia Liu, Paul Thomas, Wen-Hua Chen:
Unmanned Aerial Vehicle-Based Hazardous Materials Response: Information-Theoretic Hazardous Source Search and Reconstruction. IEEE Robotics Autom. Mag. 27(3): 108-119 (2020)
2010 – 2019
- 2019
- [j8]George Margelis, Xenofon Fafoutis, George Oikonomou, Robert J. Piechocki, Theo Tryfonas, Paul Thomas:
Efficient DCT-based secret key generation for the Internet of Things. Ad Hoc Networks 92 (2019) - 2017
- [j7]Nicholas D. H. Dowson, Charles Baker, Paul Thomas, Jye Smith, Simon Puttick, Christopher Bell, Olivier Salvado, Stephen E. Rose:
Federated optimisation of kinetic analysis problems. Medical Image Anal. 35: 116-132 (2017) - [j6]Evgeny Tsimbalo, Robert J. Piechocki, Andrew R. Nix, Paul Thomas:
Non-Coherent MIMO Scheme Based on OFDM-MFSK. IEEE Wirel. Commun. Lett. 6(3): 406-409 (2017) - [c22]George Margelis, Xenofon Fafoutis, George C. Oikonomou, Robert J. Piechocki, Theo Tryfonas, Paul Thomas:
Physical layer secret-key generation with discreet cosine transform for the Internet of Things. ICC 2017: 1-6 - 2016
- [c21]Vincent Au, Paul Thomas, Gaya K. Jayasinghe:
Query-Biased Summaries for Tabular Data. ADCS 2016: 69-72 - [c20]George Margelis, Robert J. Piechocki, Theo Tryfonas, Paul Thomas:
Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory. GLOBECOM 2016: 1-6 - [c19]Ian Hindmarch, Paul Thomas, Mark A. Beach, Andrew R. Nix:
Movement model enhanced RSS localisation. ICL-GNSS 2016: 1-6 - [c18]John Harris, Mark A. Beach, Paul Thomas, Andrew R. Nix:
Long range IEEE 802.11 for cellular offloading and M2M connectivity. ICSPCS 2016: 1-8 - [c17]Scott F. Page, James P. Oldfield, Paul Thomas:
Towards integrated threat assessment and sensor management: Bayesian multi-target search. MFI 2016: 44-51 - [c16]John Harris, Mark A. Beach, Andrew R. Nix, Paul Thomas:
The Potential of Offloading and Spectrum Sharing for 5G Vehicular Infotainment. VTC Fall 2016: 1-5 - [c15]John Harris, Mark A. Beach, Andrew R. Nix, Paul Thomas:
Spectrum sharing for M2M applications through Whitetime exploitation in WiFi networks. WCNC 2016: 1-6 - [c14]George Margelis, Xenofon Fafoutis, Robert J. Piechocki, George C. Oikonomou, Theo Tryfonas, Paul Thomas:
Practical limits of the secret key-capacity for IoT physical layer security. WF-IoT 2016: 311-316 - 2015
- [c13]Andrew Mckeown, Habib Rashvand, Tony Wilcox, Paul Thomas:
Priority SDN Controlled Integrated Wireless and Powerline Wired for Smart-Home Internet of Things. UIC/ATC/ScalCom 2015: 1825-1830 - [c12]George Margelis, Robert J. Piechocki, Dritan Kaleshi, Paul Thomas:
Low Throughput Networks for the IoT: Lessons learned from industrial implementations. WF-IoT 2015: 181-186 - 2014
- [j5]Christopher Bell, Kerstin Pannek, Michael Fay, Paul Thomas, Pierrick Bourgeat, Olivier Salvado, Yaniv Gal, Alan Coulthard, Stuart Crozier, Stephen E. Rose:
Distance informed Track-Weighted Imaging (diTWI): A framework for sensitising streamline information to neuropathology. NeuroImage 86: 60-66 (2014) - [j4]Yaniv Gal, Nicholas D. H. Dowson, Pierrick Bourgeat, Olivier Salvado, Paul Thomas, Michael Fay, Stephen E. Rose, Rosalind L. Jeffree, Amir Fazlollahi, Stuart Crozier:
Amorphous Regions-of-Interest Projection Method for Simplified Longitudinal Comparison of Dynamic Regions in Cancer Imaging. IEEE Trans. Biomed. Eng. 61(2): 264-272 (2014) - [c11]John Brady, Paul Thomas, David Virgilio, Akbar M. Sayeed:
Beamspace MIMO prototype for low-complexity Gigabit/s wireless communication. SPAWC 2014: 135-139 - 2013
- [c10]Sze Liang Stanley Chan, Rosalind L. Jeffree, Michael Fay, Stuart Crozier, Zhengyi Yang, Yaniv Gal, Paul Thomas:
Automated Classification of Bone and Air Volumes for Hybrid PET-MRI Brain Imaging. DICTA 2013: 1-8 - 2012
- [j3]Thanassis Manikas, Paul Thomas:
Editorial: Multi-sensor signal processing for defence: Detection, localisation & classification. IET Signal Process. 6(5): 393-394 (2012) - [c9]Paul Thomas, David Elsweiler:
Using Card Sorts to Understand how Users Think of Personal Information. EuroHCIR 2012: 3-6 - [c8]Sarvnaz Karimi, Jie Yin, Paul Thomas:
Searching and Filtering Tweets: CSIRO at the TREC 2012 Microblog Track. TREC 2012 - 2011
- [c7]Cyrus Minwalla, Kyle Watters, Paul Thomas, Richard Hornsey, Kristopher Ellis, Sion Jennings:
Horizon extraction in an optical collision avoidance sensor. CCECE 2011: 210-214 - [c6]Kyle Watters, Cyrus Minwalla, Michael Liscombe, Hou In Lio, Paul Thomas, Richard Hornsey, Kristopher Ellis, Sion Jennings:
Characterization of an optical collision avoidance sensor. CCECE 2011: 699-703 - [c5]Amir Fazlollahi, Nicholas D. H. Dowson, Fabrice Mériaudeau, Stephen E. Rose, Michael Fay, Paul Thomas, Zeike A. Taylor, Yaniv Gal, Alan Coulthard, Craig D. Winter, David MacFarlane, Olivier Salvado, Stuart Crozier, Pierrick Bourgeat:
Automatic Brain Tumour Segmentation in 18F-FDOPA PET Using PET/MRI Fusion. DICTA 2011: 325-329 - 2010
- [c4]Nicholas D. H. Dowson, Pierrick Bourgeat, Stephen E. Rose, Mark R. C. Daglish, Jye Smith, Michael Fay, Alan Coulthard, Craig D. Winter, David MacFarlane, Paul Thomas:
Joint Factor and Kinetic Analysis of Dynamic FDOPA PET Scans of Brain Cancer Patients. MICCAI (2) 2010: 185-192
2000 – 2009
- 2009
- [c3]Jonathan Edward Barker, Richard John Green, Paul Thomas, Gavin Brown, David Salmond:
Information Fusion based decision support via Hidden Markov Models and time series anomaly detection. FUSION 2009: 764-771 - 2008
- [j2]Paul Thomas:
Server characterisation and selection for personal metasearch. SIGIR Forum 42(2): 108-109 (2008) - 2006
- [c2]John S. DaPonte, Thomas Sadowski, Paul Thomas:
Animating climate model data. Visual Information Processing 2006: 62460M - 2002
- [c1]Jens Mache, Joshua Bower-Cooley, Jason Guchereau, Paul Thomas, Matthew Wilkinson:
Cost-effective High-performance Disk Access on PC Clusters With Commodity IDE Disks. PDPTA 2002: 449-455
1990 – 1999
- 1993
- [j1]Christopher M. Bishop, Iain Strachan, John O'Rourke, Geoff Maddison, Paul Thomas:
Reconstruction of Tokamak Density Profiles Using Feedforward Networks. Neural Comput. Appl. 1(1): 4-16 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint