Publications

Export 326 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Padgett RA, Mount SM, Steitz JA, Sharp PA.  1983.  Splicing of messenger RNA precursors is inhibited by antisera to small nuclear ribonucleoprotein. Cell. 35(1):101-107.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Paluska, Saff, Yeh, Chen.  2003.  Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
PAN Z, Reggia JA.  2005.  Evolutionary discovery of arbitrary self-replicating structures. Computational Science–ICCS 2005. :404-411.
Panconesi A, Srinivasan A.  1997.  Randomized Distributed Edge Coloring via an Extension of the Chernoff--Hoeffding Bounds. SIAM Journal on Computing. 26(2):350-350.
Panconesi A, Srinivasan A.  1996.  On the Complexity of Distributed Network Decomposition. Journal of Algorithms. 20(2):356-374.
Panconesi A, Srinivasan A.  1992.  Improved distributed algorithms for coloring and network decomposition problems. Proceedings of the twenty-fourth annual ACM symposium on Theory of computing. :581-592.
Panconesi A, Srinivasan A.  1992.  Fast randomized algorithms for distributed edge coloring. Proceedings of the eleventh annual ACM symposium on Principles of distributed computing. :251-262.
Panconesi A, Srinivasan A.  1995.  The local nature of Δ-coloring and its algorithmic applications. Combinatorica. 15(2):255-280.
Panjwani S, Tan S, Jarrin KM, Cukier M.  2005.  An experimental evaluation to determine if port scans are precursors to an attack. :602-611.
Papadimitriou P, Tsaparas P, Fuxman A, Getoor L.  2012.  TACI: Taxonomy-Aware Catalog Integration. IEEE Transactions on Knowledge and Data Engineering (TKDE).
Papageorge P, McCann J, Hicks MW.  2009.  Passive aggressive measurement with MGRP. SIGCOMM Comput. Commun. Rev.. 39(4):279-290.
Papageorgiou P, Hicks MW.  2005.  Merging Network Measurement with Data Transport. Passive and Active Network MeasurementPassive and Active Network Measurement. 3431:368-371.
Papaleo L, De Floriani L, Hendler J, Hui A.  2007.  Towards a semantic web system for understanding real world representations. Proceedings of the Tenth International Conference on Computer Graphics and Artificial Intelligence.
Papaleo L, De Floriani L.  2009.  Semantic-based segmentation and annotation of 3d models. Image Analysis and Processing–ICIAP 2009. :103-112.
Papamanthou C, Tamassia R, Triandopoulos N.  Submitted.  System and Method for Optimal Verification of Operations on Dynamic Sets.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Papamanthou C, Shi E, Tamassia R.  2013.  Signatures of Correct Computation. Theory of Cryptography. :222-242.
Papamanthou C, Tollis IG.  2007.  Parameterized st-Orientations of Graphs: Algorithms and Experiments. Graph Drawing. :220-233.
Papamanthou C, Tollis IG, Doerr M.  2005.  3D Visualization of Semantic Metadata Models and Ontologies. Graph Drawing. :377-388.
Papamanthou C, Tollis IG.  2010.  Applications of Parameterized st-Orientations. Journal of Graph Algorithms and Applications. 14(2):337-365.
Papamanthou C, Preparata FP, Tamassia R.  2008.  Algorithms for Location Estimation Based on RSSI Sampling. Algorithmic Aspects of Wireless Sensor Networks. :72-86.
Papamanthou C, Tamassia R.  2007.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
Papamanthou C, Paparrizos K, Samaras N.  2005.  A parametric visualization software for the assignment problem. Yugoslav Journal of Operations Research. 15(1):147-158.
Papamanthou C, Paparrizos K, Samaras N.  2004.  Computational experience with exterior point algorithms for the transportation problem. Applied Mathematics and Computation. 158(2):459-475.

Pages