Export 326 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Plaisant C, Shneiderman B.  2005.  Show Me! Guidelines for producing recorded demonstrations. 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. :171-178.
Plaisant C, Rose A.  1998.  Exploring LifeLines to Visualize Patient Records. Technical Reports of the Computer Science Department.
Plaisant C, Jain V.  1994.  Dynamaps: dynamic queries on a health statistics atlas. Conference companion on Human factors in computing systems. :439-440.
Plaisant C, Chintalapani G, Lukehart C, Schiro D, Ryan J.  2003.  Using Visualization Tools to Gain Insight Into Your Data. SPE Annual Technical Conference and Exhibition.
Plaisant C, Carr DA, Hasegawa H.  1992.  When an Intermediate View Matters a 2D-browser Experiment. Institute for Systems Research Technical Reports.
Plaisant C, Komlodi A, Lindsay F.  2000.  Evaluation challenges for a Federation of heterogeneous information providers: the case of NASA's Earth Science Information Partnerships. Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000. (WET ICE 2000). Proeedings. IEEE 9th International Workshops on. :130-135.
Plaisant C, Mushlin R, Snyder A, Li J, Heller D, Shneiderman B.  1998.  LifeLines: using visualization to enhance navigation and analysis of patient records. In Proceedings of the 1998 American Medical Informatic Association Annual Fall SymposiumProc AMIA Symp. :76-80.
Pirolli P, Preece J, Shneiderman B.  2010.  Cyberinfrastructure for Social Action on National Priorities. Computer. 43(11):20-21.
Pillai JK, Patel VM, Chellappa R.  2009.  Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Pickart CM, Fushman D.  2004.  Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Piat J, Bhattacharyya SS, Raulet M.  2010.  Loop transformations for interface-based hierarchies IN SDF graphs. 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP). :341-344.
Phillippy AM, Schatz MC, Pop M.  2008.  Genome assembly forensics: finding the elusive mis-assembly. Genome Biology. 9(3):R55-R55.
Philippou A, Cleaveland R, Lee I, Smolka S, Sokolsky O.  1998.  Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. :465-472.
Phelps C, Madhavan G, Rappuoli R, LEVIN SCOTT, Shortlife E, Colwell RR.  2016.  Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education. The Milbank Quarterly. 94906033(143S2):109-125.
Phelps C, Madhavan G, Rappuoli R, Colwell RR, Fineberg H.  2017.  Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
Phang KY, Foster JS, Hicks MW, Sazawal V.  2009.  Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
Pfeiffer S, Fushman D, Cowburn D.  1999.  Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.