9 papers:
ICPC-2015-SchermannBPLG #commit- Discovering loners and phantoms in commit and issue data (GS, MB, SP, PL, HCG), pp. 4–14.
SAC-2015-HuangSZSXD #privacy #pseudo- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
ICPR-2014-Arora0JP #3d- 3D Fingerprint Phantoms (SSA, KC, AKJ, NGP), pp. 684–689.
PPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability #using- PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
CASE-2009-BeraN #using- A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
ASPLOS-2009-BurceaM #branch #design #named- Phantom-BTB: a virtualized branch target buffer design (IB, AM), pp. 313–324.
DATE-2005-NaculG #compilation #embedded #lightweight #multi #using- Lightweight Multitasking Support for Embedded Systems using the Phantom Serializing Compiler (ACN, TG), pp. 742–747.
ICML-1999-BrodieD #induction #learning #using- Learning to Ride a Bicycle using Iterated Phantom Induction (MB, GD), pp. 57–66.
VLDB-1983-Reimer #concurrent #problem- Solving the Phantom Problem by Predicative Optimistic Concurrency Control (MR), pp. 81–88.