Publications

Export 326 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Plaisant C.  1991.  An overview of Hyperties, its user interface and data model. Hypermedia/Hypertext And Object-Oriented Databases. Chapman & Hall. :17-31.
Plaisant C, Marchimini G, Bruns T, Komlodi A, Campbell L, Rose A, Ding GM, Beale Jr J, Nolet V, Shneiderman B et al..  2003.  The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
Plaisant C, Venkatraman M, Ngamkajorwiwat K, Barth R, Harberts B, Feng W.  1999.  Refining query previews techniques for data with multivalued attributes: the case of NASA EOSDIS. Research and Technology Advances in Digital Libraries, 1999. ADL '99. Proceedings. IEEE Forum on. :50-59.
Plaisant C, Rose A, Shneiderman B, Vanniamparampil AJ.  1997.  User Interface Reengineering: Low-Effort, High-Payoff Strategies. IEEE Software. 14(4):66-72.
Plaisant C, Wallace D.  1992.  Touchscreen toggle design. Proceedings of the SIGCHI conference on Human factors in computing systems. :667-668.
Plaisant C.  2004.  The challenge of information visualization evaluation. Proceedings of the working conference on Advanced visual interfaces. :109-116.
Plaisant C, Bhamidipati P.  2000.  Vehicle Speed Information Displays for Public Websites A Survey of User Preferences. Technical Reports from UMIACS.
Pirolli P, Preece J, Shneiderman B.  2010.  Cyberinfrastructure for Social Action on National Priorities. Computer. 43(11):20-21.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Pillai JK, Patel VM, Chellappa R.  2009.  Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
Pickart CM, Fushman D.  2004.  Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Piat J, Bhattacharyya SS, Raulet M.  2010.  Loop transformations for interface-based hierarchies IN SDF graphs. 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP). :341-344.
Phillippy AM, Schatz MC, Pop M.  2008.  Genome assembly forensics: finding the elusive mis-assembly. Genome Biology. 9(3):R55-R55.
Philippou A, Cleaveland R, Lee I, Smolka S, Sokolsky O.  1998.  Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. :465-472.
Phelps C, Madhavan G, Rappuoli R, LEVIN SCOTT, Shortlife E, Colwell RR.  2016.  Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education. The Milbank Quarterly. 94906033(143S2):109-125.
Phelps C, Madhavan G, Rappuoli R, Colwell RR, Fineberg H.  2017.  Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
Phang KY, Foster JS, Hicks MW, Sazawal V.  2009.  Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
Pfeiffer S, Fushman D, Cowburn D.  1999.  Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.

Pages