Publications

Displaying publications 761 through 780 out of 1067.

Publications

2004

  1. M. Cornwell, J. E. Just, and L. Kagal, "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams", InProceedings, Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2), April 2004, 3760 downloads.
  2. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4901 downloads, 15 citations.
  3. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3785 downloads, 9 citations.
  4. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3321 downloads, 22 citations.
  5. L. Kagal, M. Paoucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara, "Authorization and Privacy for Semantic Web Services", InProceedings, First International Semantic Web Services Symposium, AAAI 2004 Spring Symposium, March 2004, 9483 downloads, 1 citation.
  6. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 9387 downloads, 65 citations.
  7. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 11285 downloads, 183 citations.
  8. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 16 downloads, 26 citations.
  9. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7340 downloads.
  10. D. Chakraborty and H. Lei, "Pervasive Enablement of Business Processes", InProceedings, 2nd International Conference on Pervasive Computing and Communications, January 2004, 3269 downloads, 41 citations.
  11. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3234 downloads, 6 citations.
  12. A. Kunjithapatham, "Personal Agents on Semantic Web", MastersThesis, UMBC, January 2004.
  13. D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
  14. A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1371 downloads, 3 citations.
  15. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 6088 downloads, 154 citations.
  16. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3801 downloads, 52 citations.
  17. W. Krueger, J. Nilsson, T. Oates, and T. Finin, "Automatically Generated DAML Markup for Semistructured Documents", InBook, Agent-Mediated Knowledge Management, January 2004, 2283 downloads, 11 citations.

2003

  1. A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
  2. O. Streltchenko, "Exploring Trading Dynamics in a Derivative Securities Market of Heterogeneous Agents", PhdThesis, UMBC, December 2003.
  3. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3565 downloads, 30 citations.