Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1988. Languages with self-reference II : Knowledge, belief, and modality. Artificial Intelligence. 34(2):179-212.
1994. Meta-languages, reflection principles and self-reference. Handbook of logic in artificial intelligence and logic programming. :323-358.
1976. An application of compiler simulation at the source language level. The Computer Journal. 19(1):90-90.
1994. What Experts Deny, Novices Must Understand. In 3rd International Workshop on Human and Machine Cognition.
1997. Sources of, and exploiting, inconsistency: preliminary report. JOURNAL OF APPLIED NONCLASSICAL LOGICS. 7:13-24.
2008. Systematic yet flexible discovery: guiding domain experts through exploratory data analysis. Proceedings of the 13th international conference on Intelligent user interfaces. :109-118.
2008. Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis. Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :265-274.
2009. Integrating Statistics and Visualization for Exploratory Power: From Long-Term Case Studies to Design Guidelines. IEEE Computer Graphics and Applications. 29(3):39-51.
2006. Using rhythms of relationships to understand e‐mail archives. Journal of the American Society for Information Science and Technology. 57(14):1936-1948.
2006. Classifying science: Phenomena, data, theory, method, practice: Book Reviews. J. Am. Soc. Inf. Sci. Technol.. 57(14):1977-1978.