default search action
William Mitchell
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i3]William Mitchell, Abbie Natkin, Paige Robertson, Marika Sullivan, Xuechen Yu, Chenxin Zhu:
Decomposition and conformal mapping techniques for the quadrature of nearly singular integrals. CoRR abs/2210.09954 (2022) - 2021
- [c14]Joy T. Wu, Nkechinyere Agu, Ismini Lourentzou, Arjun Sharma, Joseph Alexander Paguio, Jasper Seth Yao, Edward C. Dee, William Mitchell, Satyananda Kashyap, Andrea Giovannini, Leo Anthony Celi, Mehdi Moradi:
Chest ImaGenome Dataset for Clinical Reasoning. NeurIPS Datasets and Benchmarks 2021 - [i2]Joy T. Wu, Nkechinyere N. Agu, Ismini Lourentzou, Arjun Sharma, Joseph A. Paguio, Jasper S. Yao, Edward C. Dee, William Mitchell, Satyananda Kashyap, Andrea Giovannini, Leo A. Celi, Mehdi Moradi:
Chest ImaGenome Dataset for Clinical Reasoning. CoRR abs/2108.00316 (2021) - 2020
- [i1]William Mitchell, Scott H. Hawley:
Exploring Quality and Generalizability in Parameterized Neural Audio Effects. CoRR abs/2006.05584 (2020)
2010 – 2019
- 2019
- [c13]Thomas Le, William Mitchell, Behnam S. Arad:
Customized Intrusion Detection Based on a Database Audit Log. CATA 2019: 117-126 - 2017
- [j4]William Mitchell, Rinku Dewri, Ramakrishna Thurimella, Max Roschke:
A graph traversal attack on Bloom filter-based medical data aggregation. Int. J. Big Data Intell. 4(4): 217-226 (2017) - 2015
- [c12]Ramakrishna Thurimella, Rinku Dewri, William Mitchell:
Record linkage applications in health services research: opportunities and challenges. SIN 2015: 6
2000 – 2009
- 2009
- [j3]Ramakrishna Thurimella, William Mitchell:
Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks. Int. J. Inf. Secur. Priv. 3(3): 55-75 (2009) - 2005
- [j2]Rachel Henne-Wu, William Mitchell, Cui Zhang:
Support for Design by ContractTM in the CTM Programming Language. J. Object Technol. 4(7): 65-82 (2005) - [c11]Terry R. Robison, Du Zhang, William Mitchell:
Discovery agent deployment in diverse SAN environments. IRI 2005: 439-444 - 2001
- [c10]William Mitchell:
Class assertions - an emerging factor in software engineering. CATA 2001: 48-52
1980 – 1989
- 1987
- [j1]Edward Kovac, William Mitchell:
The DCS as a Universal Digital Cross-Connect System. IEEE J. Sel. Areas Commun. 5(1): 53-58 (1987) - 1984
- [c9]Norman Soong, Charles Atwood, Charles Eastman, William Mitchell, Douglas Stoker:
Blueprints for the computer city: The quest for an architect's computer. ACM Annual Conference 1984: 303-304 - 1983
- [c8]William Mitchell:
Retraining: Is it the answer to the computer faculty shortage? SIGCSE 1983: 89-98 - [c7]Carter Bays, Stephen Mitchell, Stanley P. Franklin, Ed Dubinsky, Richard H. Austing, William Mitchell:
Retraining of college faculty for computer science (Panel Session). SIGCSE 1983: 125-126 - [c6]Aaron Marcus, Del Coates, William Mitchell:
Computer graphics and visual designers (Panel Session). SIGGRAPH 1983: 275-277 - 1981
- [c5]H. R. Halladay, Rich Hendin, Roberta Weller, T. C. Cunningham, William Mitchell:
Why co-op in computer science? (Panel Discussion). SIGCSE 1981: 144-145 - [c4]William Mitchell, James Westfall:
Critique and evaluation of the Cal Poly/DPMA model curriculum for computer information systems. SIGCSE 1981: 153-170 - 1980
- [c3]William Mitchell:
Computer education in the 1980s, a somber view. SIGCSE 1980: 203-207
1970 – 1979
- 1979
- [c2]William Mitchell:
Another approach to service courses. SIGCSE 1979: 6-9 - 1978
- [c1]William Mitchell, Bruce Mabis:
Implementing a computer science curriculum merging two curriculum models. SIGCSE 1978: 151-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint