Publications

Displaying publications 801 through 820 out of 1067.

Publications

2003

  1. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 20 downloads.
  2. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "TAGA: Travel Market Framework in Agentcities (Demonstration)", InProceedings, Proceedings of the 18th International Joint Conference on Artificial Intelligence, August 2003, 57 downloads.
  3. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 7576 downloads, 614 citations.
  4. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "TAGA: Trading Agent Competition in Agentcities", InProceedings, Workshop on Trading Agent Design and Analysis, held at 18th Int. Joint Conf. on Artificial Intelligence,, August 2003, 42 downloads.
  5. J. Mayfield and T. Finin, "Information retrieval on the Semantic Web: Integrating inference and retrieval", InProceedings, Proceedings of the SIGIR Workshop on the Semantic Web, August 2003, 6069 downloads, 76 citations.
  6. J. Pinkston, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1625 downloads, 50 citations.
  7. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  8. H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 3393 downloads, 99 citations.
  9. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 3176 downloads.
  10. M. Sheshagiri, M. desJardins, and T. Finin, "A Planner for Composing Services Described in DAML-S", InProceedings, Proceedings of the AAMAS Workshop on Web Services and Agent-based Engineering,, June 2003, 2759 downloads, 159 citations.
  11. M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 10 downloads, 12 citations.
  12. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1184 downloads.
  13. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Innovative Concepts for Agent-Based Systems. WRAC 2002., June 2003, 19 downloads.
  14. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, June 2003, 3560 downloads.
  15. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4962 downloads, 341 citations.
  16. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1545 downloads, 21 citations.
  17. J. Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003, 24 citations.
  18. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 858 downloads.
  19. B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 2161 downloads.
  20. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3360 downloads, 4 citations.