Publications

Displaying publications 821 through 840 out of 1073.

Publications

2003

  1. J. Pinkston, "Hidden Processes: The Implication for Intrusion Detection", InProceedings, Proceedings of the IEEE International Workshop on Information Assurance, May 2003, 24 citations.
  2. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 897 downloads.
  3. B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 2189 downloads.
  4. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3407 downloads, 4 citations.
  5. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 downloads, 51 citations.
  6. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 1565 downloads.
  7. M. A. Grasso, "Interdisciplinary computer science, guest editor introduction", Article, ACM Crossroads, March 2003, 1474 downloads.
  8. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2837 downloads, 11 citations.
  9. K. P. Joshi, A. Joshi, and Y. Yesha, "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 2974 downloads, 20 citations.
  10. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Intelligent Ad hoc Marketing within Hotspot Networks", TechReport, University of Maryland, Baltimore county, March 2003, 108 downloads.
  11. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 5010 downloads, 16 citations.
  12. E. Perlman and A. Java, "Predictive Mining of Time Series Data in Astronomy", Article, Astronomical Data Analysis Software and Systems XII ASP Conference Series, January 2003, 2511 downloads, 12 citations.
  13. X. Luan, Y. Peng, and T. Finin, "Learning in the Broker Agent", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 1251 downloads.
  14. Y. Zou, T. Finin, Y. Peng, A. Joshi, and R. S. Cost, "Agent Communication in DAML World", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 1264 downloads.

2002

  1. H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 10231 downloads.
  2. D. Chakraborty and A. Joshi, "Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments", Article, Mobile Computing Communications Review (MC2R), December 2002, 3152 downloads.
  3. L. Ding, Y. Shi, Z. Ding, R. Pan, and T. Finin, "UMBCTAC: A Balanced Bidding Agent", TechReport, UMBC Technical Report TR-02-15, December 2002, 4251 downloads.
  4. F. Perich, "Me-Centric Domain Server: Changing the Way Services See You", TechReport, University of Maryland, Baltimore County, December 2002, 4130 downloads.
  5. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3917 downloads, 17 citations.
  6. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1467 downloads.