Publications

Displaying publications 761 through 780 out of 1066.

Publications

2004

  1. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4901 downloads, 15 citations.
  2. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3785 downloads, 9 citations.
  3. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3320 downloads, 22 citations.
  4. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9482 downloads, 1 citation.
  5. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 9386 downloads, 65 citations.
  6. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 11284 downloads, 183 citations.
  7. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 16 downloads, 26 citations.
  8. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7340 downloads.
  9. D. Chakraborty and H. Lei, "Pervasive Enablement of Business Processes", InProceedings, 2nd International Conference on Pervasive Computing and Communications, January 2004, 3268 downloads, 41 citations.
  10. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3234 downloads, 6 citations.
  11. A. Kunjithapatham, "Personal Agents on Semantic Web", MastersThesis, UMBC, January 2004.
  12. D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
  13. A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1369 downloads, 3 citations.
  14. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 6087 downloads, 154 citations.
  15. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3797 downloads, 52 citations.
  16. W. Krueger, J. Nilsson, T. Oates, and T. Finin, "Automatically Generated DAML Markup for Semistructured Documents", InBook, Agent-Mediated Knowledge Management, January 2004, 2282 downloads, 11 citations.

2003

  1. A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
  2. O. Streltchenko, "Exploring Trading Dynamics in a Derivative Securities Market of Heterogeneous Agents", PhdThesis, UMBC, December 2003.
  3. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3565 downloads, 30 citations.
  4. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 3220 downloads, 38 citations.