Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Perlis D.  1984.  Non-monotonicity and real-time reasoning. AAAI Workshop on Nonmonotonic Reasoning.
Perlis D.  1988.  Languages with self-reference II : Knowledge, belief, and modality. Artificial Intelligence. 34(2):179-212.
Perlis D.  1987.  Circumscription as introspection. Proceedings of the Second International Symposium on Methodologies for intelligent systems. :440-444.
Perlis D.  1988.  Autocircumscription. Artificial Intelligence. 36(2):223-236.
Perlis D.  1987.  Circumscribing with sets. Artificial Intelligence. 31(2):201-211.
Perlis D.  1990.  Intentionality and defaults. International J. of Expert Systems. 3:345-354.
Perlis D.  1990.  Thing and Thought. Knowledge Representation and Defeasible Reasoning. Kluwer.
Perlis D.  1976.  An application of compiler simulation at the source language level. The Computer Journal. 19(1):90-90.
Perlis D.  1976.  Group algebras and model theory. Illinois journal of mathematics. 20(2):298-305.
Perlis D.  1986.  Self-reference, knowledge, belief, and modality. Proc 5th National Conference on AI. :416-420.
Perlis D, Miller M, Perlis D.  1994.  What Experts Deny, Novices Must Understand. In 3rd International Workshop on Human and Machine Cognition.
Perlis D.  1985.  Languages with self-reference I: Foundations. Artificial Intelligence. 25(3):301-322.
Perlis D.  1997.  Consciousness as self-function. Journal of Consciousness Studies, 4. 5(6):509-525.
Perlis D.  1986.  On the consistency of commonsense reasoning. Computational Intelligence. 2(1):180-190.
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Perry D, Porter A, Votta L, Wade M.  1996.  Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
Perry B, Chang S-K, Dinsmore J, Doermann D, Rosenfeld A, Stevens S.  1999.  Content-Based Access to Multimedia Information: From Technology Trends to Sate of the Art.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Peters C, Clough P, Gey F, Karlgren J, Magnini B, Oard D, De Rijke M, Stempfhuber M.  2006.  Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
Peters C, Jijkoun V, Mandl T, Müller H, Oard D, Peñas A, Santos D.  2008.  Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 5152
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.

Pages