Publications
Displaying publications 821 through 840 out of 1092.
Publications
2003
- W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 214 downloads.
- Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "TAGA: Travel Market Framework in Agentcities (Demonstration)", InProceedings, Proceedings of the 18th International Joint Conference on Artificial Intelligence, August 2003, 300 downloads.
- H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 8070 downloads, 614 citations.
- Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "TAGA: Trading Agent Competition in Agentcities", InProceedings, Workshop on Trading Agent Design and Analysis, held at 18th Int. Joint Conf. on Artificial Intelligence,, August 2003, 258 downloads.
- J. Mayfield and T. Finin, "Information retrieval on the Semantic Web: Integrating inference and retrieval", InProceedings, Proceedings of the SIGIR Workshop on the Semantic Web, August 2003, 6342 downloads, 76 citations.
- J. Pinkston, J. Undercoffer, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems, July 2003, 1905 downloads, 150 citations.
- W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
- H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 3629 downloads, 99 citations.
- S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 3374 downloads.
- M. Sheshagiri, M. desJardins, and T. Finin, "A Planner for Composing Services Described in DAML-S", InProceedings, Proceedings of the AAMAS Workshop on Web Services and Agent-based Engineering,, June 2003, 2998 downloads, 159 citations.
- M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 218 downloads, 12 citations.
- W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1499 downloads.
- J. Butler, J. Undercoffer, and J. Pinkston, "Hidden processes: the implication for intrusion detection", InProceedings, IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 2003, 100 downloads.
- S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Innovative Concepts for Agent-Based Systems. WRAC 2002., June 2003, 238 downloads.
- D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, June 2003, 3797 downloads.
- L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 5215 downloads, 341 citations.
- A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1769 downloads, 21 citations.
- W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 1062 downloads.
- B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 2350 downloads.
- A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3652 downloads, 4 citations.