9 papers:
- ICPC-2015-SchermannBPLG #commit
- Discovering loners and phantoms in commit and issue data (GS, MB, SP, PL, HCG), pp. 4–14.
- SAC-2015-HuangSZSXD #privacy #pseudo
- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
- ICPR-2014-Arora0JP #3d
- 3D Fingerprint Phantoms (SSA, KC, AKJ, NGP), pp. 684–689.
- PPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability #using
- PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
- CASE-2009-BeraN #using
- A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
- ASPLOS-2009-BurceaM #branch #design #named
- Phantom-BTB: a virtualized branch target buffer design (IB, AM), pp. 313–324.
- DATE-2005-NaculG #compilation #embedded #lightweight #multi #using
- Lightweight Multitasking Support for Embedded Systems using the Phantom Serializing Compiler (ACN, TG), pp. 742–747.
- ICML-1999-BrodieD #induction #learning #using
- Learning to Ride a Bicycle using Iterated Phantom Induction (MB, GD), pp. 57–66.
- VLDB-1983-Reimer #concurrent #problem
- Solving the Phantom Problem by Predicative Optimistic Concurrency Control (MR), pp. 81–88.