Publications

Export 326 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Plaisant C, Rose A, Rubloff G, Salter R, Shneiderman B.  1999.  The design of history mechanisms and their use in collaborative educational simulations. Proceedings of the 1999 conference on Computer support for collaborative learning.
Plaisant C, Bruns T, Shneiderman B, Doan K.  1997.  Query previews in networked information systems: the case of EOSDIS. CHI '97 extended abstracts on Human factors in computing systems: looking to the future. :202-203.
Plaisant C, Shneiderman B.  1992.  Scheduling home control devices: design issues and usability evaluation of four touchscreen interfaces. International Journal of Man-Machine Studies. 36(3):375-393.
Plaisant C.  2005.  Information Visualization and the Challenge of Universal Usability. Exploring GeovisualizationExploring Geovisualization. :53-82.
Plaisant C, Grinstein G, Scholtz J, Whiting M, O'Connell T, Laskowski S, Chien L, Tat A, Wright W, Gorg C et al..  2008.  Evaluating Visual Analytics at the 2007 VAST Symposium Contest. Computer Graphics and Applications, IEEE. 28(2):12-21.
Plaisant C, Bhamidipati P, Tarnoff P.  2001.  VEHICLE SPEED INFORMATION DISPLAYS FOR PUBLIC WEBSITES: A STUDY OF USER PREFERENCES. ITS 2001: Conference Proceedings.
Plaisant C, Shneiderman B, Mushlin R.  1998.  An information architecture to support the visualization of personal histories. Information Processing & Management. 34(5):581-597.
Pirolli P, Preece J, Shneiderman B.  2010.  Cyberinfrastructure for Social Action on National Priorities. Computer. 43(11):20-21.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Pillai JK, Patel VM, Chellappa R.  2009.  Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.
Pickart CM, Fushman D.  2004.  Polyubiquitin chains: polymeric protein signals. Current Opinion in Chemical Biology. 8(6):610-616.
Piatetsky-Shapiro G, Djeraba C, Getoor L, Grossman R, Feldman R, Zaki M.  2006.  What are the grand challenges for data mining? - KDD-2006 panel report ACM SIGKDD Explorations Newsletter. 8(2):70-77.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Piat J, Bhattacharyya SS, Raulet M.  2010.  Loop transformations for interface-based hierarchies IN SDF graphs. 2010 21st IEEE International Conference on Application-specific Systems Architectures and Processors (ASAP). :341-344.
Phillippy AM, Schatz MC, Pop M.  2008.  Genome assembly forensics: finding the elusive mis-assembly. Genome Biology. 9(3):R55-R55.
Philippou A, Cleaveland R, Lee I, Smolka S, Sokolsky O.  1998.  Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. :465-472.
Phelps C, Madhavan G, Rappuoli R, Colwell RR, Fineberg H.  2017.  Beyond cost-effectiveness: Using systems analysis for infectious disease preparedness. Vaccine. 35:A46-A49.
Phelps C, Madhavan G, Rappuoli R, LEVIN SCOTT, Shortlife E, Colwell RR.  2016.  Strategic Planning in Population Health and Public Health Practice: A Call to Action for Higher Education. The Milbank Quarterly. 94906033(143S2):109-125.
Phang KY, Foster JS, Hicks MW, Sazawal V.  2009.  Triaging Checklists: a Substitute for a PhD in Static Analysis. Evaluation and Usability of Programming Languages and Tools (PLATEAU) PLATEAU 2009.
Pfeiffer S, Fushman D, Cowburn D.  1999.  Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.

Pages