Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Perlis D.  1988.  Commonsense set theory. Meta-Level Architectures and Reflection. :87-98.
Perlis D.  2006.  Theory and Application of Self-Reference: Logic and Beyond. Self-reference. 178:121-121.
Perlis D.  1993.  Logic and Artificial Intelligence: A New Synthesis? ANNALES-SOCIETATIS MATHEMATICAE POLONAE SERIES 4. 18:297-297.
Perlis D.  1995.  Consciousness and complexity: the cognitive quest. Annals of Mathematics and Artificial Intelligence. 14(2):309-321.
Perlis D.  1989.  Truth and meaning (research note). Artificial intelligence. 39(2):245-250.
Perlis D, Norvig P.  2005.  Introduction to the special review issue. Artificial Intelligence. 169(2):103-103.
Perlis D.  1972.  An extension of Ackermann's set theory. Journal of Symbolic Logic. 37(4):703-704.
Perlis D.  1984.  Non-monotonicity and real-time reasoning. AAAI Workshop on Nonmonotonic Reasoning.
Perlis D.  1988.  Languages with self-reference II : Knowledge, belief, and modality. Artificial Intelligence. 34(2):179-212.
Perlis D.  1988.  Autocircumscription. Artificial Intelligence. 36(2):223-236.
Perlis D.  1990.  Intentionality and defaults. International J. of Expert Systems. 3:345-354.
Perlis D.  1990.  Thing and Thought. Knowledge Representation and Defeasible Reasoning. Kluwer.
Perlis D.  1976.  An application of compiler simulation at the source language level. The Computer Journal. 19(1):90-90.
Perlis D.  1976.  Group algebras and model theory. Illinois journal of mathematics. 20(2):298-305.
Perlis D, Miller M, Perlis D.  1994.  What Experts Deny, Novices Must Understand. In 3rd International Workshop on Human and Machine Cognition.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Perry B, Chang S-K, Dinsmore J, Doermann D, Rosenfeld A, Stevens S.  1999.  Content-Based Access to Multimedia Information: From Technology Trends to Sate of the Art.
Perry D, Porter A, Votta L, Wade M.  1996.  Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Peters C, Jijkoun V, Mandl T, Müller H, Oard D, Peñas A, Santos D.  2008.  Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 5152
Peters C, Clough P, Gey F, Karlgren J, Magnini B, Oard D, De Rijke M, Stempfhuber M.  2006.  Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.

Pages