Publications

Displaying publications 981 through 1000 out of 1074.

Publications

  1. M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 101 downloads, 12 citations.
  2. T. Finin, "CRA Policy Blog Available as an RSS Channel", Article, Computing Research News, September 2004, 100 downloads.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 100 downloads.
  4. M. A. Grasso and e., "Survey of handheld computing among medical students", Article, Computer Methods and Programs in Biomedicine, June 2006, 99 downloads.
  5. M. A. Grasso and C. Grasso, "Feasibility study of voice-driven data collection in animal drug toxicology studies", Article, Computers in Biology and Medicine, July 1994, 97 downloads, 14 citations.
  6. V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001, 89 downloads.
  7. M. A. Grasso, "Automated speech recognition in medical applications", Article, MD Computing, January 1995, 88 downloads, 15 citations.
  8. C. Tilmes, M. Linda, and A. J. Fleig, "Development of two Science Investigator-led Processing Systems (SIPS) for NASA's Earth Observation System (EOS)", InProceedings, IEEE Geoscience and Remote Sensing Symposium, 2004, December 2004, 75 downloads.
  9. O. Clark, K. P. Joshi, and T. Reynolds, "Global Relevance of Online Health Information Sources: A Case Study of Experiences and Perceptions of Nigerians", InProceedings, AMIA 2024 Annual Symposium, November 2024, 68 downloads.
  10. F. Perich, "A Service for Aggregating and Interpreting Contextual Information", TechReport, Hewlett-Packard Laboratories, August 2002.
  11. J. Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003, 24 citations.
  12. A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
  13. , "A Perspective on the Scalability of MPLS Signaling", TechReport, UMBC, November 2001.
  14. L. Kagal, "An Agent Approach to Security for Pervasive Computing Environments", InProceedings, Doctoral Consortium, The Eighteenth National Conference on Artificial Intelligence (AAAI 02), July 2002.
  15. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  16. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  17. H. Chen, "Developing a Dynamic Distributed Intelligent Agent Framework Based on the Jini Architecture", TechReport, Master's thesis, December 1999, 30 citations.
  18. S. Avancha, D. Chakraborty, D. Gada, T. Kamdar, and A. Joshi, "Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents", InProceedings, Proc. Conference on Design and Modeling of Wireless Networks, ITCom, August 2001.
  19. C. Pullela, L. Xu, D. Chakraborty, and A. Joshi, "Component based Architecture for Mobile Information Access", InProceedings, International Conference on Parallel Processing (ICPP 2000), August 2000, 14 citations.
  20. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.