Chris von Csefalvay has been active in the research and development of new technologies, ideas and solutions for perennial problems. Of these, a significant part is unfortunately subject to non-disclosure and governmental secrecy provisions for national security (and non-national security…) reasons. His principal areas of interest and investigation are
- operations research: efficient spatial optimisation of critical public resources, mixed quadratic programming
- mathematics: elliptic curve cryptography, zero-knowlege proofs of CBRN decommissioning
- epidemiology: computational epidemiology, especially modeling disease-avoidant behaviour and general modeling
- computer science: graph algorithms, sensor fusion computation, computer vision and deep learning
Selected research papers by Chris von Csefalvay
- von Csefalvay, C. (2020). Vector quantisation and partitioning of COVID-19 temporal dynamics in the United States. arXiv:2008.00559.
- von Csefalvay, C. (2020). Statistical dynamics of SARS-CoV-2 as a differential game. arXiv:2007.13734. Submitted to Systems.
- Foldi, T., von Csefalvay, C. and Perez, N.A. (2020). JAMPI: Efficient matrix multiplication in Spark using Barrier Execution Mode. arXiv:2007.01811. Submitted to Big Data and Cognitive Computing.
- von Csefalvay, C. and Foldi, T. (2020). PAWS: Towards a globally integrated outbreak surveillance system for public health. doi:10.5281/zenodo.3782877
- von Csefalvay, C. (2019). Novel quantitative indicators of digital ophthalmoscopy image quality. arXiv:1903.02695
- von Csefalvay, C. (2015). Ecological metrics of diversity in understanding social media. arXiv:1501.07621.
- von Csefalvay, C. (2009). On Good Intentions and Poor Outcomes: A Critical Retrospective on Chester v Afshar. 9 U. C. Dublin L. Rev. 46.
Selected patents & applications
- A Method, Software and Architecture for the Monitoring of Data Flows in ETL Systems, GB1420320.2 (15 November 2014)
- A method, software and architecture for a graphical user interface for creating, editing, visualizing and authenticating smart contracts, GB1605154.2 (11 May 2016)
- Preventing repeated malicious online communications using a proof of work approach, GB1607128.4 (08 June 2016)