Found 188 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.
Puder, A., & Römer K. (1998).  MICO: A CORBA 2.2 Compliant Implementation.
Pucci, G., & Zimmermann W. (1991).  On the Average Case Complexity of Parallel Sublist Selection.
Privitera, C. M., & Shastri L. (1996).  A DSOM Hierarchical Model for Reflexive Processing: An Application to Visual Trajectory Classification.
Privitera, C. M. (1995).  A Cognitive Off-line Model for Motor Interpretation of Handwritten Words.
Preuss, M., König I. R., Thompson J. R., Erdmann J., Absher D., Assimes T. L., et al. (2010).  Design of the Coronary Artery Disease Genome-Wide Replication and Meta-Analysis (CARDIoGRAM) Study--A Genome-Wide Association Meta-Analysis Involving More than 22,000 Cases and 60,000 Controls. Circulation: Cardiovascular Genetics. 3, 475-483.
Prechelt, L. (1995).  Adaptive Parameter Pruning in Neural Networks.
Pötzsch, S., & Boehme R. (2010).  The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395.
Posch, S. (1991).  Detecting Skewed Symmetries.
Portnoff, R. S., Afroz S., Durrett G., Kummerfeld J. K., Berg-Kirkpatrick T., McCoy D., et al. (2017).  Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Porat, S., & Feldman J. (1991).  Learning Automata from Ordered Examples. 7, 109-138.
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Popa, L., Ratnasamy S., Iannaccone G., Krishnamurthy A., & Stoica I. (2010).  A Cost Comparison of Datacenter Network Architectures.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Polimenis, V. G. (1991).  The Design of a File System that Supports Multimedia.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Plauché, M., & Prabaker M.. (2006).  Tamil Market: A spoken dialog system for rural India.
Plauché, M., Nallasam U., Wooters C., Pal J., & Ramachandran D. (2006).  Speech Recognition for Illiterate Access to Information and Technology. Proceedings of the First International Conference on Information and Communication Technologies and Development (ICTD '06). 83-92.
Plaskota, L. (1995).  How to Benefit From Noise.
Plaskota, L. (1995).  Noisy Information and Computational Complexity: A Short Survey.