Publications
Export 1389 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is P [Clear All Filters]
1984. Applications or Protected Circumscription. 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. 170:414-414.
1995. An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
2006. Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
2011. Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
2004. Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes. IEEE Software. 21(6):32-40.
2001. Approximating large convolutions in digital images. Image Processing, IEEE Transactions on. 10(12):1826-1835.
1998. Approximating large convolutions in digital images. PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING. :216-227.
2008. Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
2011. Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
2011. Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
1998. AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
2009. Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
2012. Archaeosortases and exosortases are widely distributed systems linking membrane transit with posttranslational modification.. J Bacteriol. 194(1):36-48.
2006. An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2009. ARDB-Antibiotic Resistance Genes Database. Nucleic Acids Research. 37(Database):D443-D447-D443-D447.
2005. Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
2010. Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
2010. Assembly complexity of prokaryotic genomes using short reads. BMC Bioinformatics. 11(1):21-21.
1989. Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
1997. Assessing software review meetings: results of a comparative analysis of two experimental studies. IEEE Transactions on Software Engineering. 23(3):129-145.
2011. Assessing the benefits of using mate-pairs to resolve repeats in de novo short-read prokaryotic assemblies. BMC Bioinformatics. 12(1):95-95.
2008. Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.