Publications

Export 326 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Perer A, Shneiderman B.  2009.  Integrating Statistics and Visualization for Exploratory Power: From Long-Term Case Studies to Design Guidelines. IEEE Computer Graphics and Applications. 29(3):39-51.
Perer A, Shneiderman B.  2008.  Systematic yet flexible discovery: guiding domain experts through exploratory data analysis. Proceedings of the 13th international conference on Intelligent user interfaces. :109-118.
Perer A, Shneiderman B, Oard D.  2006.  Classifying science: Phenomena, data, theory, method, practice: Book Reviews. J. Am. Soc. Inf. Sci. Technol.. 57(14):1977-1978.
Perer A, Shneiderman B.  2006.  Balancing Systematic and Flexible Exploration of Social Networks. IEEE Transactions on Visualization and Computer Graphics. 12(5):693-700.
Perer A, Shneiderman B, Oard D.  2006.  Using rhythms of relationships to understand e‐mail archives. Journal of the American Society for Information Science and Technology. 57(14):1936-1948.
Perer A, Shneiderman B.  2008.  Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis. Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :265-274.
Perl Y, Vishkin U.  1985.  Efficient implementation of a shifting algorithm. Discrete applied mathematics. 12(1):71-80.
Perlis D.  1985.  Languages with self-reference I: Foundations. Artificial Intelligence. 25(3):301-322.
Perlis D, Elgot-Drapkin JJ, Miller M.  1991.  Stop the world—I want to think. International Journal of Intelligent Systems. 6(4):443-456.
Perlis D, Minker J.  1986.  Completeness results for circumscription. Artificial Intelligence. 28(1):29-42.
Perlis D.  1988.  Languages with self-reference II : Knowledge, belief, and modality. Artificial Intelligence. 34(2):179-212.
Perlis D.  1986.  On the consistency of commonsense reasoning. Computational Intelligence. 2(1):180-190.
Perlis D.  1972.  An extension of Ackermann's set theory. Journal of Symbolic Logic. 37(4):703-704.
Perlis D.  2006.  Theory and Application of Self-Reference: Logic and Beyond. Self-reference. 178:121-121.
Perlis D, Hall R.  1986.  Intentionality as internality. Behavioral and Brain Sciences. 9(01):151-152.
Perlis D.  1988.  Autocircumscription. Artificial Intelligence. 36(2):223-236.
Perlis D.  2000.  What does it take to refer? a reply to Bojadziev Journal of Consciousness Studies. 7(5):67-69.
Perlis D.  1994.  An Error-Theory of Consciousness. MARYLAND COMPUTER SCIENCE.
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Perlis D, Miller M, Perlis D.  1994.  What Experts Deny, Novices Must Understand. In 3rd International Workshop on Human and Machine Cognition.
Perlis D.  2011.  Robotson Crusoe–or–What Is Common Sense? Logical Formalizations of Commonsense Reasoning — Papers from the AAAI 2011 Spring Symposium.
Perlis D.  1987.  Circumscribing with sets. Artificial Intelligence. 31(2):201-211.
Perlis D.  1990.  Intentionality and defaults. International J. of Expert Systems. 3:345-354.
Perlis D.  1984.  Non-monotonicity and real-time reasoning. AAAI Workshop on Nonmonotonic Reasoning.

Pages