Publications
Displaying publications 981 through 1000 out of 1074.
Publications
- M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 101 downloads, 12 citations.
- T. Finin, "CRA Policy Blog Available as an RSS Channel", Article, Computing Research News, September 2004, 100 downloads.
- W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 100 downloads.
- M. A. Grasso and e., "Survey of handheld computing among medical students", Article, Computer Methods and Programs in Biomedicine, June 2006, 99 downloads.
- M. A. Grasso and C. Grasso, "Feasibility study of voice-driven data collection in animal drug toxicology studies", Article, Computers in Biology and Medicine, July 1994, 97 downloads, 14 citations.
- V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001, 89 downloads.
- M. A. Grasso, "Automated speech recognition in medical applications", Article, MD Computing, January 1995, 88 downloads, 15 citations.
- C. Tilmes, M. Linda, and A. J. Fleig, "Development of two Science Investigator-led Processing Systems (SIPS) for NASA's Earth Observation System (EOS)", InProceedings, IEEE Geoscience and Remote Sensing Symposium, 2004, December 2004, 75 downloads.
- O. Clark, K. P. Joshi, and T. Reynolds, "Global Relevance of Online Health Information Sources: A Case Study of Experiences and Perceptions of Nigerians", InProceedings, AMIA 2024 Annual Symposium, November 2024, 68 downloads.
- F. Perich, "A Service for Aggregating and Interpreting Contextual Information", TechReport, Hewlett-Packard Laboratories, August 2002.
- J. Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003, 24 citations.
- A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
- , "A Perspective on the Scalability of MPLS Signaling", TechReport, UMBC, November 2001.
- L. Kagal, "An Agent Approach to Security for Pervasive Computing Environments", InProceedings, Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02), July 2002.
- A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
- D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
- H. Chen, "Developing a Dynamic Distributed Intelligent Agent Framework Based on the Jini Architecture", TechReport, Master's thesis, December 1999, 30 citations.
- S. Avancha, D. Chakraborty, D. Gada, T. Kamdar, and A. Joshi, "Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents", InProceedings, Proc. Conference on Design and Modeling of Wireless Networks, ITCom, August 2001.
- C. Pullela, L. Xu, D. Chakraborty, and A. Joshi, "Component based Architecture for Mobile Information Access", InProceedings, International Conference on Parallel Processing (ICPP 2000), August 2000, 14 citations.
- L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.