Tags: ad hoc

Publications

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1372 downloads.
  2. L. Han, "Schema Free Querying of Semantic Data", PhdThesis, University of Maryland, Baltimore County, August 2014, 1673 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 138 downloads.

2011

  1. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 2061 downloads, 1 citation.

2010

  1. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 316 downloads.
  2. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3215 downloads, 7 citations.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 2014 downloads.
  2. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3175 downloads, 4 citations.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2128 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2341 downloads, 1 citation.
  2. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2815 downloads, 1 citation.
  3. S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1912 downloads.
  4. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2764 downloads, 1 citation.
  5. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2611 downloads.

2007

  1. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3418 downloads, 16 citations.

2006

  1. L. Ding and T. Finin, "Characterizing the Semantic Web on the Web", InProceedings, Proceedings of the 5th International Semantic Web Conference, November 2006, 6933 downloads, 82 citations.
  2. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 3235 downloads.
  3. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4241 downloads, 10 citations.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4259 downloads, 5 citations.
  5. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4267 downloads, 13 citations.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3674 downloads, 11 citations.
  2. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3471 downloads.
  3. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7547 downloads, 96 citations.

2004

  1. M. Cornwell, J. E. Just, and L. Kagal, "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams", InProceedings, Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2), April 2004, 3923 downloads.
  2. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5019 downloads, 15 citations.
  3. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3884 downloads, 9 citations.
  4. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7441 downloads.

2003

  1. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 7701 downloads.
  2. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 7057 downloads, 42 citations.
  3. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Innovative Concepts for Agent-Based Systems. WRAC 2002., June 2003, 132 downloads.
  4. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2915 downloads, 11 citations.
  5. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Intelligent Ad hoc Marketing within Hotspot Networks", TechReport, University of Maryland, Baltimore county, March 2003, 195 downloads.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1551 downloads.
  2. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3284 downloads, 13 citations.
  3. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  4. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 4320 downloads, 218 citations.

2000

  1. A. Joshi, "On Proxy Agents, Mobility, and Web Access", Article, ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET), December 2000, 2977 downloads, 77 citations.