Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Basili VR, Zelkowitz MV, Sjøberg DIK, Johnson P, Cowling AJ.  2007.  Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
Mendonça Neto MG, Seaman C, Basili VR, Kim YM.  2001.  A prototype experience management system for a software consulting organization. Thirteenth International Conference on Software Engineering and Knowledge Engineering. :29-36.
Sane N, Ford J, Harris AI, Bhattacharyya SS.  2012.  Prototyping scalable digital signal processing systems for radio astronomy using dataflow models. Radio Science. 47(3):n/a-n/a.
Gu P.  2005.  PROTOTYPING THE SIMULATION OF A GATE LEVEL LOGIC APPLICATION PROGRAM INTERFACE (API) ON AN EXPLICIT-MULTI-THREADED (XMT) COMPUTER.
Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2007.  Provable algorithms for joint optimization of transport, routing and MAC layers in wireless ad hoc networks. Proc. DialM-POMC Workshop on Foundations of Mobile Computing.
Anil Kumar VS, Marathe MV, Parthasarathy S, Srinivasan A, Zust S.  2006.  Provable algorithms for parallel generalized sweep scheduling. Journal of Parallel and Distributed Computing. 66(6):807-821.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Kuah B-T, Shneiderman B.  1998.  Providing Advisory Notices for UNIX Command Users: Design, Implementation, and Empirical Evaluations. Technical Reports of the Computer Science Department.
Miller M, Perlis D.  1987.  Proving self-utterances. Journal of Automated Reasoning. 3(3):329-338.
Jajodia S, Kudo M, V.S. Subrahmanian.  2001.  Provisional authorizations. E-commerce Security and Privacy. 2:133-159.
Daescu O, Luo J, Mount D.  2006.  Proximity problems on line segments spanned by points. Computational Geometry. 33(3):115-129.
Weiss K, De Floriani L, Fellegara R, Velloso M.  2011.  The PR-star octree: a spatio-topological data structure for tetrahedral meshes. Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :92-101.
Bernstein LB, Mount SM, Weiner AM.  1983.  Pseudogenes for human small nuclear RNA U3 appear to arise by integration of self-primed reverse transcripts of the RNA into new chromosomal sites. CellCell. 32(2):461-472.
Brooks R, Sheppard S, Shneiderman B.  1985.  The Psychology of Program Documentation. Conference on Software Maintenance, 1985, Sheraton Inn Washington-Northwest, November 11-13, 1985. :191-191.
Everett L, Vo A, Hannenhalli S.  2009.  PTM-Switchboard--a database of posttranslational modifications of transcription factors, the mediating enzymes and target genes. Nucleic Acids ResearchNucleic Acids Research. 37(Database):D66-D71-D66-D71.
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.
Snellman EA, Sullivan ER, Colwell RR.  2002.  Purification and properties of the extracellular lipase, LipA, of Acinetobacter sp. RAG‐1. European Journal of Biochemistry. 269(23):5771-5779.
Aloimonos Y.  1990.  Purposive and qualitative active vision. Proceedings of 10th International Conference on Pattern Recognition, 1990. i:346-360vol.1-346-360vol.1.
Earl C, Might M, Van Horn D.  2010.  Pushdown Control-Flow Analysis of Higher-Order Programs. arXiv:1007.4268 [cs].
Clark R, Feamster N, Nayak A, Reimers A.  2009.  Pushing Enterprise Security Down the Network Stack. GT-CS-09-03
Boyd-Graber J, Blei D.  2007.  PUTOP: turning predominant senses into a topic model for word sense disambiguation. Proceedings of the 4th International Workshop on Semantic Evaluations. :277-281.
Perlis D.  1991.  Putting One's Foot in One's Head–Part I: Why. Noûs. :435-455.
Shneiderman B.  1981.  Putting the human factor into systems development. Proceedings of the eighteenth annual computer personnel research conference. :1-13.
Jimmy Lin, Madnani N, Dorr BJ.  2010.  Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :305-308.
Hung E, Getoor L, V.S. Subrahmanian.  2003.  PXML: a probabilistic semistructured data model and algebra. Data Engineering, 2003. Proceedings. 19th International Conference on. :467-478.

Pages