Tags: ad hoc

Publications

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1356 downloads.
  2. L. Han, "Schema Free Querying of Semantic Data", PhdThesis, University of Maryland, Baltimore County, August 2014, 1658 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 122 downloads.

2011

  1. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 2045 downloads, 1 citation.

2010

  1. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 274 downloads.
  2. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3196 downloads, 7 citations.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 1993 downloads.
  2. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3152 downloads, 4 citations.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2113 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2319 downloads, 1 citation.
  2. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2798 downloads, 1 citation.
  3. S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1897 downloads.
  4. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2748 downloads, 1 citation.
  5. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2594 downloads.

2007

  1. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3404 downloads, 16 citations.

2006

  1. L. Ding and T. Finin, "Characterizing the Semantic Web on the Web", InProceedings, Proceedings of the 5th International Semantic Web Conference, November 2006, 6892 downloads, 82 citations.
  2. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 3219 downloads.
  3. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4205 downloads, 10 citations.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4235 downloads, 5 citations.
  5. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4252 downloads, 13 citations.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3651 downloads, 11 citations.
  2. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3457 downloads.
  3. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7530 downloads, 96 citations.

2004

  1. M. Cornwell, J. E. Just, and L. Kagal, "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams", InProceedings, Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2), April 2004, 3902 downloads.
  2. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5002 downloads, 15 citations.
  3. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3868 downloads, 9 citations.
  4. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7428 downloads.

2003

  1. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 7677 downloads.
  2. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 7029 downloads, 42 citations.
  3. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Innovative Concepts for Agent-Based Systems. WRAC 2002., June 2003, 115 downloads.
  4. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2904 downloads, 11 citations.
  5. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Intelligent Ad hoc Marketing within Hotspot Networks", TechReport, University of Maryland, Baltimore county, March 2003, 178 downloads.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1531 downloads.
  2. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3266 downloads, 13 citations.
  3. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  4. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 4303 downloads, 218 citations.

2000

  1. A. Joshi, "On Proxy Agents, Mobility, and Web Access", Article, ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET), December 2000, 2959 downloads, 77 citations.