Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Perlis D.  1985.  Languages with self-reference I: Foundations. Artificial Intelligence. 25(3):301-322.
Perlis D.  1972.  An extension of Ackermann's set theory. Journal of Symbolic Logic. 37(4):703-704.
Perlis D, Minker J.  1986.  Completeness results for circumscription. Artificial Intelligence. 28(1):29-42.
Perlis D.  1991.  Putting One's Foot in One's Head–Part I: Why. Noûs. :435-455.
Perlis D.  1997.  Sources of, and exploiting, inconsistency: preliminary report. JOURNAL OF APPLIED NONCLASSICAL LOGICS. 7:13-24.
Perlis D, Anderson M.  2002.  Metareasoning for More Effective Human-Computer Dialogue.
Perlis D, Hall R.  1986.  Intentionality as internality. Behavioral and Brain Sciences. 9(01):151-152.
Perlis D.  2000.  What does it take to refer? a reply to Bojadziev Journal of Consciousness Studies. 7(5):67-69.
Perlis D, Elgot-Drapkin JJ, Miller M.  1991.  Stop the world—I want to think. International Journal of Intelligent Systems. 6(4):443-456.
Perlis D.  1987.  How can a program mean. Proceedings of the 10th Int'l Joint Conference on Artificial Intelligence. :163-166.
Perlis D.  2000.  What does it take to refer. Journal of Consciousness Studies. 7(5):67-9.
Perlis D.  2011.  Robotson Crusoe–or–What Is Common Sense? Logical Formalizations of Commonsense Reasoning — Papers from the AAAI 2011 Spring Symposium.
Perlis D.  1987.  Circumscription as introspection. Proceedings of the Second International Symposium on Methodologies for intelligent systems. :440-444.
Perlis D.  1989.  Some Brief Essays on Mind.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perry B, Chang S-K, Dinsmore J, Doermann D, Rosenfeld A, Stevens S.  1999.  Content-Based Access to Multimedia Information: From Technology Trends to Sate of the Art.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Perry D, Porter A, Votta L, Wade M.  1996.  Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Peters C, Jijkoun V, Mandl T, Müller H, Oard D, Peñas A, Santos D.  2008.  Advances in multilingual and multimodal information retrieval. Lecture Notes in Computer Science. 5152
Peters C, Clough P, Gey F, Karlgren J, Magnini B, Oard D, De Rijke M, Stempfhuber M.  2006.  Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.

Pages