Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Perlis D.  1988.  Languages with self-reference II : Knowledge, belief, and modality. Artificial Intelligence. 34(2):179-212.
Perlis D.  1988.  Autocircumscription. Artificial Intelligence. 36(2):223-236.
Perlis D.  1997.  Consciousness as self-function. Journal of Consciousness Studies, 4. 5(6):509-525.
Perlis D.  1990.  Intentionality and defaults. International J. of Expert Systems. 3:345-354.
Perlis D.  1990.  Thing and Thought. Knowledge Representation and Defeasible Reasoning. Kluwer.
Perlis D, V.S. Subrahmanian.  1994.  Meta-languages, reflection principles and self-reference. Handbook of logic in artificial intelligence and logic programming. :323-358.
Perlis D.  1976.  Group algebras and model theory. Illinois journal of mathematics. 20(2):298-305.
Perlis D.  1976.  An application of compiler simulation at the source language level. The Computer Journal. 19(1):90-90.
Perlis D.  1994.  An Error-Theory of Consciousness. MARYLAND COMPUTER SCIENCE.
Perlis D, Miller M, Perlis D.  1994.  What Experts Deny, Novices Must Understand. In 3rd International Workshop on Human and Machine Cognition.
Perlis D.  1986.  On the consistency of commonsense reasoning. Computational Intelligence. 2(1):180-190.
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Perlis D.  1985.  Languages with self-reference I: Foundations. Artificial Intelligence. 25(3):301-322.
Perlis D.  1972.  An extension of Ackermann's set theory. Journal of Symbolic Logic. 37(4):703-704.
Perlis D, Minker J.  1986.  Completeness results for circumscription. Artificial Intelligence. 28(1):29-42.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Perry D, Porter A, Votta L, Wade M.  1996.  Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
Perry B, Chang S-K, Dinsmore J, Doermann D, Rosenfeld A, Stevens S.  1999.  Content-Based Access to Multimedia Information: From Technology Trends to Sate of the Art.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Peters C, Clough P, Gey F, Karlgren J, Magnini B, Oard D, De Rijke M, Stempfhuber M.  2006.  Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
Peters C, Jijkoun V, Mandl T, Müller H, Oard D, Peñas A, Santos D.  2008.  Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 5152
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.

Pages