Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Perlis D.  1990.  Intentionality and defaults. International J. of Expert Systems. 3:345-354.
Perlis D.  1990.  Thing and Thought. Knowledge Representation and Defeasible Reasoning. Kluwer.
Perlis D.  1976.  An application of compiler simulation at the source language level. The Computer Journal. 19(1):90-90.
Perlis D.  1976.  Group algebras and model theory. Illinois journal of mathematics. 20(2):298-305.
Perlis D.  1994.  An Error-Theory of Consciousness. MARYLAND COMPUTER SCIENCE.
Perlis D, Miller M, Perlis D.  1994.  What Experts Deny, Novices Must Understand. In 3rd International Workshop on Human and Machine Cognition.
Perlis D.  1986.  On the consistency of commonsense reasoning. Computational Intelligence. 2(1):180-190.
Perlis D.  1972.  An extension of Ackermann's set theory. Journal of Symbolic Logic. 37(4):703-704.
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Perlis D.  1985.  Languages with self-reference I: Foundations. Artificial Intelligence. 25(3):301-322.
Perlis D, Minker J.  1986.  Completeness results for circumscription. Artificial Intelligence. 28(1):29-42.
Perlis D.  1991.  Putting One's Foot in One's Head–Part I: Why. Noûs. :435-455.
Perlis D.  1997.  Sources of, and exploiting, inconsistency: preliminary report. JOURNAL OF APPLIED NONCLASSICAL LOGICS. 7:13-24.
Perlis D, Anderson M.  2002.  Metareasoning for More Effective Human-Computer Dialogue.
Perlis D, Hall R.  1986.  Intentionality as internality. Behavioral and Brain Sciences. 9(01):151-152.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perry B, Chang S-K, Dinsmore J, Doermann D, Rosenfeld A, Stevens S.  1999.  Content-Based Access to Multimedia Information: From Technology Trends to Sate of the Art.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Perry D, Porter A, Votta L, Wade M.  1996.  Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Peters C, Jijkoun V, Mandl T, Müller H, Oard D, Peñas A, Santos D.  2008.  Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 5152
Peters C, Clough P, Gey F, Karlgren J, Magnini B, Oard D, De Rijke M, Stempfhuber M.  2006.  Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.

Pages