Conference Papers
(Publications are listed alphabetically by title)
Pages
Personal secure booting. In: Information Security and Privacy.; 2001. 1. p. 130-144p.
Personality and programming: Time-sharing vs. batch preference. In: Proceedings of the 1978 annual conference - Volume 2. New York, NY, USA: ACM; 1978. 5. p. 561-569p. (ACM '78).
Photo-based authentication using social networks. In: Proceedings of the first workshop on Online social networks. New York, NY, USA: ACM; 2008. 5. p. 55-60p. (WOSN '08).
Photo-based question answering. In: Proceedings of the 16th ACM international conference on Multimedia. New York, NY, USA: ACM; 2008. 3. p. 389-398p. (MM '08).
Physical data. In: Readings in information visualization. San Francisco: Morgan Kaufmann Publishers Inc.; 1999. 3. p. 37-38p.
Physical Programming: Designing Tools for Children to Create Physical Interactive. In: Proceedings: SIGCHI.; 2002.
Pictorial query trees for query specification in image databases. In: Fourteenth International Conference on Pattern Recognition, 1998. Proceedings. Vol 1. IEEE; 1998. 9. p. 919-921p. vol.p. 1-919p. -921 vol.1.
Piecing together the segmentation jigsaw using context. In: Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on.; 2011. 2. p. 2001-2008p.
Pitch and timbre manipulations using cortical representation of sound. In: Multimedia and Expo, IEEE International Conference on. Vol 3. Los Alamitos, CA, USA: IEEE Computer Society; 2003. 3. p. 381-384p.
Plane-wave decomposition analysis for spherical microphone arrays. In: IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, 2005. IEEE; 2005. 1. p. 150-153p.
Plane-wave decomposition of a sound scene using a cylindrical microphone array. In: Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on.; 2009. 8. p. 85-88p.
PLANet: an active internetwork. In: IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. Vol 3. IEEE; 1999. 1. p. 1124-1133p. vol.p. 3-1124p. -1133 vol.3.
Planning in a multi-agent environment: theory and practice. New York, NY, USA: ACM; 2002. 9. p. 944-945p. (AAMAS '02).
Plasmonics and the parallel programming problem. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series. Vol 6477.; 2007. 1. p. 19.
Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE. In: Second AAAI Symposium on Educational Advances in Artificial Intelligence.; 2011.
Pocket PhotoMesa: a Zoomable image browser for PDAs. In: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia.; 2004. 1. p. 19-24p.
Polydioptric camera design and 3D motion estimation. In: 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings. Vol 2. IEEE; 2003. I. II- p. 294-301p. vol.p. 2-p. II- p. 294-301p. vol.2.
Polymorphic versus monomorphic points-to analysis. In: Proceedings of the 7th International Static Analysis Symposium, Lecture Notes in Computer Science. Springer Verlag.; 2000.
Polytope approximation and the Mahler volume. In: Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM; 2012. 2. p. 29-42p. (SODA '12).
Portcullis: protecting connection setup from denial-of-capability attacks. ACM; 2007. 2. p. 289-300p. (SIGCOMM '07).
Porting DSP applications across design tools using the dataflow interchange format. In: Rapid System Prototyping, 2005. (RSP 2005). The 16th IEEE International Workshop on.; 2005. 4. p. 40-46p.
Pose estimation in heavy clutter using a multi-flash camera. In: Robotics and Automation (ICRA), 2010 IEEE International Conference on.; 2010. 2. p. 2028-2035p.
Pose-robust albedo estimation from a single image. In: Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on.; 2010. 2. p. 2683-2690p.
Potentials and limitations of pen-based computers. In: Proceedings of the 1993 ACM conference on Computer science. New York, NY, USA: ACM; 1993. 5. p. 536-539p. (CSC '93).
Practical Dynamic Proofs of Retrievability. In: CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . ACM; 2013. 3. p. 325-336p. (CCS '13).
Practical parallel algorithms for dynamic data redistribution, median finding, and selection. In: Parallel Processing Symposium, 1996., Proceedings of IPPS '96, The 10th International.; 1996. 2. p. 292-301p.
Practical programmable packets. In: IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. Vol 1. IEEE; 2001. 4. p. 41-50p. vol.p. 1-41p. -50 vol.1.
Practical reasoning and plan execution with active logic. In: Proceedings of the IJCAI-99 Workshop on Practical Reasoning and Rationality.; 1999. 3. p. 30-38p.
Practicality of non-interfering checkpoints in distributed database systems. In: IEEE Real-Time Systems Symposium, New Orleans, Louisiana.; 1986. 2. p. 234-241p.
PRAM algorithms: teach and preach. In: collection of position papers, IBM-NSF Workshop on$\textbackslashbackslash$ Opportunities and Constraints of Parallel Computing", IBM Almaden.; 1988.
PRAM-On-Chip Vision. In: String Processing and Information Retrieval, 2000. SPIRE 2000. Proceedings. Seventh International Symposium on.; 2000. 2. p. 260.
PRAM-on-chip: first commitment to silicon. In: Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures. New York, NY, USA: ACM; 2007. 3. p. 301-302p. (SPAA '07).
Preconditioning parallel multisplittings for solving linear systems of equations. In: Proceedings of the 6th international conference on Supercomputing. New York, NY, USA: ACM; 1992. 4. p. 478-484p. (ICS '92).
Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. Berlin, Heidelberg: Springer-Verlag; 2008. 1. p. 146-162p. (EUROCRYPT'08).
Predictability of real-time systems: a process-algebraic approach. In: Real-Time Systems Symposium, IEEE International. Los Alamitos, CA, USA: IEEE Computer Society; 1996. 8. p. 82.
Predicting and Controlling System-Level Parameters of Multi-Agent Systems. In: 2009 AAAI Fall Symposium Series.; 2009.
Predicting the CPU availability of time-shared Unix systems on the computational grid. In: The Eighth International Symposium on High Performance Distributed Computing, 1999. Proceedings. IEEE; 1999. 1. p. 105-112p.
Predicting Trust and Distrust in Social Networks. In: Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE; 2011. 4. p. 418-424p.
Prediction and Adaptation in Active Harmony. In: High-Performance Distributed Computing, International Symposium on. Los Alamitos, CA, USA: IEEE Computer Society; 1998. 1. p. 180.
Prefix computations on symmetric multiprocessors. In: Parallel and Distributed Processing, 1999. 13th International and 10th Symposium on Parallel and Distributed Processing, 1999. 1999 IPPS/SPDP. Proceedings.; 1999. 7. p. 7-13p.
Preliminary Study of the SGS Time Scales for Compressible Boundary Layers using DNS Data. In: 43rd AIAA Aerospace Sciences Meeting and Exhibit. Reno, NV; 2005.
Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. In: 35th AIAA Fluid Dynamics Conference. Toronto, Canada; 2005.
Preschool children's use of mouse buttons. In: CHI'04 extended abstracts on Human factors in computing systems.; 2004. 1. p. 1411-1412p.
Presentations and this and that: logic in action. In: Proceedings of the 15th Annual Conference of the Cognitive Science Society, Boulder, Colorado. Vol 251.; 1993.
Preserving the privacy of sensitive relationships in graph data. In: Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. Berlin, Heidelberg: Springer-Verlag; 2008. 1. p. 153-171p. (PinKDD'07).
Principles of computer vision. In: Handbook of pattern recognition and image processing (vol. 2).; 1994. 1. p. 1-15p.
Prioritizing component compatibility tests via user preferences. In: Software Maintenance, 2009. ICSM 2009. IEEE International Conference on.; 2009. 2. p. 29-38p.
Privacy settings from contextual attributes: A case study using Google Buzz.; 2011. 2. p. 257-262p.
Privacy-preserving aggregation of time-series data. Vol 17.; 2011.
Probabilistic Fusion Tracking Using Mixture Kernel-Based Bayesian Filtering. In: Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on.; 2007. 1. p. 1-8p.