Export 326 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Plaisant C, Bhamidipati P.  2000.  Vehicle Speed Information Displays for Public Websites A Survey of User Preferences. Technical Reports from UMIACS.
Plaisant C, Marchionini G, Komlodi A.  1998.  Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
Plaisant C, North C.  2007.  Special Issue in Honor of Ben Shneiderman's 60th Birthday: Reflections on Human-Computer Interaction. International Journal of Human-Computer Interaction. 23(3):195-204.
Plaisant C, Laboratory H-computer I.  1993.  Facilitating Data Exploration: Dynamic Queries On A Health Statistics Map. Proc. of the Government Statistics Section, Annual Meeting of the American Statistical Assoc. Conf. Proc, pg. :18-23.
Plaisant C, Shneiderman B.  1991.  Scheduling on-off home control devices. Proceedings of the SIGCHI conference on Human factors in computing systems: Reaching through technology. :459-460.
Plaisant C, Marchionini G, Komlodi A.  2003.  Visualizing websites using a hierarchical table of contents browser: WebTOC. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :438-438.
Plaisant C, Rose A, Shneiderman B, Vanniamparampil AJ.  1997.  Low-effort, high-payoff user interface reengineering. IEEE Software. 14(4):66-72.
Pirolli P, Preece J, Shneiderman B.  2010.  Cyberinfrastructure for Social Action on National Priorities. Computer. 43(11):20-21.
Pillai JK, Patel VM, Chellappa R.  2009.  Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Pickart CM, Fushman D.  2004.  Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Piat J, Bhattacharyya SS, Raulet M.  2010.  Loop transformations for interface-based hierarchies IN SDF graphs. 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP). :341-344.
Phillippy AM, Schatz MC, Pop M.  2008.  Genome assembly forensics: finding the elusive mis-assembly. Genome Biology. 9(3):R55-R55.
Philippou A, Cleaveland R, Lee I, Smolka S, Sokolsky O.  1998.  Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. :465-472.
Phelps C, Madhavan G, Rappuoli R, LEVIN SCOTT, Shortlife E, Colwell RR.  2016.  Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education. The Milbank Quarterly. 94906033(143S2):109-125.
Phelps C, Madhavan G, Rappuoli R, Colwell RR, Fineberg H.  2017.  Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
Phang KY, Foster JS, Hicks MW, Sazawal V.  2009.  Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
Pfeiffer S, Fushman D, Cowburn D.  1999.  Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.