default search action
Richard Wilson
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Gerry Chan, Alaa Alslaity, Richard Wilson, Rita Orji:
Feeling Moodie: Insights from a Usability Evaluation to Improve the Design of mHealth Apps. Int. J. Hum. Comput. Interact. 40(19): 5857-5875 (2024) - [j8]Josef Kittler, Richard Wilson:
Edwin Hancock. Pattern Recognit. 150: 110297 (2024) - 2022
- [j7]William J. Bolton, Timothy M. Rawson, Bernard Hernandez, Richard Wilson, David Antcliffe, Pantelis Georgiou, Alison H. Holmes:
Machine learning and synthetic outcome estimation for individualised antimicrobial cessation. Frontiers Digit. Health 4 (2022) - [c13]Alaa Alslaity, Gerry Chan, Rita Orji, Richard Wilson:
Insights From Longitudinal Evaluation of Moodie Mental Health App. CHI Extended Abstracts 2022: 308:1-308:8 - [c12]Gerry Chan, Alaa Alslaity, Richard Wilson, Rita Orji:
Exploring Variance in Users' Moods across Times, Seasons, and Activities: A Longitudinal Analysis. MobileHCI (Adjunct) 2022: 12:1-12:7 - [c11]Alaa Alslaity, Gerry Chan, Richard Wilson, Rita Orji:
Toward Understanding Users' Interactions with a Mental Health App: An Association Rule Mining Approach. PervasiveHealth 2022: 477-495 - 2021
- [c10]Richard Wilson:
Anticipatory engineering ethics. ISTAS 2021: 1 - [c9]Richard Wilson:
3D printing, nanotechnology and organ printing: An ethical and anticipatory ethical analysis. ISTAS 2021: 1 - [c8]Richard Wilson, Ion Iftimie:
Virtual assistants and privacy: An anticipatory ethical analysis. ISTAS 2021: 1 - [c7]Richard Wilson, Ion Iftimie:
Emerging ransomeware threats: An anticipatory ethical anaylsis. ISTAS 2021: 1 - [c6]Richard Wilson, Michael Shifflett:
QAnon, conspiracy theories and social media warfare: An ethical and anticipatory ethical analysis. ISTAS 2021: 1 - [c5]Richard Wilson, Michael Shifflett:
Twitter, media ecology, information warfare: Ethical and anticipated ethical issues. ISTAS 2021: 1 - 2020
- [j6]Zhichao Li, Foz Hughes, Noel C. Kerr, Richard Wilson, Steve Dixon:
Liquid Flow Measurement Using Silicone Polymer Wedge Clamp-On Ultrasonic Transducers. IEEE Trans. Instrum. Meas. 69(7): 5157-5165 (2020)
2010 – 2019
- 2018
- [c4]Haedong Jang, Zulhazmi Mokhti, Björn Herrmann, Richard Wilson:
Nonlinear Embedding of FET Devices for High Efficiency Power Amplifier Design. BCICTS 2018: 36-43 - 2011
- [j5]Simeon J. Yates, Babak Akhgar, Christopher D. Bates, Lukasz Jopek, Richard Wilson:
A platform for discovering and sharing confidential ballistic crime data. Int. J. Knowl. Web Intell. 2(2/3): 202-218 (2011) - [c3]Andrea Taylor, Richard Wilson, David Godden, Angus Aitken, Judith Colligan:
Delivering group-based services to the home via the Internet: Maximising clinical and social benefits. PervasiveHealth 2011: 384-388
2000 – 2009
- 2009
- [c2]Andrea Taylor, Richard Wilson, Stefan Agamanolis:
Supporting carers in their caring role through design. CHI Extended Abstracts 2009: 3985-3990 - [c1]Andrea Taylor, Richard Wilson, Stefan Agamanolis:
A Home Health Monitoring System Designed to Support Carers in Their Caring Role. eTELEMED 2009: 194-199 - 2006
- [j4]Kiyoshi Sawada, Richard Wilson:
Models of adding relations to an organization structure of a complete K. Eur. J. Oper. Res. 174(3): 1491-1500 (2006) - 2005
- [j3]Richard Wilson:
Making life safer with a risk analysis approach. Reliab. Eng. Syst. Saf. 87(3): 299-301 (2005) - 2004
- [j2]William E. Kastenberg, Richard Wilson:
Risk of nuclear powered space probes. Reliab. Eng. Syst. Saf. 86(1): 53-59 (2004) - 2002
- [j1]Richard Wilson:
Precautionary principles and risk analysis. IEEE Technol. Soc. Mag. 21(4): 40-44 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint