Publications

Export 1389 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Minter J, Perlis D.  1984.  Applications or Protected Circumscription. 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. 170:414-414.
Rose A, Shneiderman B, Plaisant C.  1995.  An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Krishna AS, Yilmaz C, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2004.  Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes. IEEE Software. 21(6):32-40.
Mount D, Kanungo T, Netanyahu NS, Piatko C, Silverman R, Wu AY.  2001.  Approximating large convolutions in digital images. Image Processing, IEEE Transactions on. 10(12):1826-1835.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  1998.  Approximating large convolutions in digital images. PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING. :216-227.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Haft DH, Payne SH, Selengut JD.  2012.  Archaeosortases and exosortases are widely distributed systems linking membrane transit with posttranslational modification.. J Bacteriol. 194(1):36-48.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Liu B, Pop M.  2009.  ARDB-Antibiotic Resistance Genes Database. Nucleic Acids Research. 37(Database):D443-D447-D443-D447.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Kingsford C, Schatz MC, Pop M.  2010.  Assembly complexity of prokaryotic genomes using short reads. BMC Bioinformatics. 11(1):21-21.
Kraus S, Perlis D.  1989.  Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
Porter A, Johnson PM.  1997.  Assessing software review meetings: results of a comparative analysis of two experimental studies. IEEE Transactions on Software Engineering. 23(3):129-145.
Wetzel J, Kingsford C, Pop M.  2011.  Assessing the benefits of using mate-pairs to resolve repeats in de novo short-read prokaryotic assemblies. BMC Bioinformatics. 12(1):95-95.
Triandopoulos N, Goodrich MT, Papamanthou C, Tamassia R.  2008.  Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
Hovemeyer D, Pugh W, Spacco J.  2006.  Atomic instructions in java. ECOOP 2002—Object-Oriented Programming. :5-16.

Pages