Publications
Displaying publications 961 through 980 out of 1079.
Publications
- S. Cranefield, S. Willmott, and T. Finin, "Overview of the Workshop on Ontologies in Agent Systems", InProceedings, Proceedings of the Workshop on Ontologies in Agent Systems, July 2001, 152 downloads.
- R. S. Cost, T. Finin, J. Lakhani, E. Miller, C. Nicholas, and I. Soboroff, "Developing communicating software agents in Tcl", InProceedings, Proceedings of the Fifth Annual Tcl/Tk Workshop, August 1997, 151 downloads.
- C. Grasso, T. Finin, M. A. Grasso, Y. Yesha, and A. Joshi, "Intelligent Agents and UICDS", InProceedings, Workshop on Emergency Management: Incident, Resource and Supply Chain Management, November 2009, 151 downloads.
- A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 146 downloads.
- X. Luan, Y. Peng, and T. Finin, "Learning in Broker Agent", InProceedings, Proceedings of the Sixteenth National Conference on Artificial Intelligence, AAAI-99, July 1999, 145 downloads.
- M. M. Rahman, "Mining social data to extract intellectual knowledge", Article, arXiv eprint , September 2012, 144 downloads.
- C. Weir, R. McEntire, B. SIlk, and T. Finin, "Unisys: MUC-3 test results and analysis", InProceedings, Proceedings of the Third Message Understanding Conference, May 1991, 144 downloads.
- O. Clark, K. P. Joshi, and T. Reynolds, "Global Relevance of Online Health Information Sources: A Case Study of Experiences and Perceptions of Nigerians", InProceedings, AMIA 2024 Annual Symposium, November 2024, 143 downloads.
- A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 142 downloads, 51 citations.
- L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Project Centaurus: A Framework for Indoor Mobile Services", TechReport, UMBC, November 2000, 141 downloads.
- T. Finin, "Tracking Wires on Printed Circuit Boards", TechReport, MIT, October 1973, 139 downloads.
- W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 138 downloads.
- P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 135 downloads.
- M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 135 downloads.
- L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 135 downloads.
- S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Innovative Concepts for Agent-Based Systems. WRAC 2002., June 2003, 132 downloads.
- Y. K. Labrou and T. Finin, "Towards a Standard for an Agent Communication Language", InProceedings, Working Notes of the AAAI Fall Symposium on Communicative Action in Humans and Machines, November 1997, 130 downloads.
- P. Morrison, "The Mind of the Machine", Article, Technology Review, 130 downloads.
- W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 127 downloads.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 126 downloads, 26 citations.