Tags: mobile

Publications

2021

  1. A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 309 downloads.

2017

  1. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1563 downloads.
  2. P. K. Das, "Context-Dependent Privacy and Security Management on Mobile Devices", PhdThesis, Ph.D. Dissertation, August 2017, 960 downloads.
  3. P. K. Das, A. Joshi, and T. Finin, "App behavioral analysis using system calls", InProceedings, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2017, 1428 downloads.
  4. A. L. Kashyap, "Deep Representation of Lyrical Style and Semantics for Music Recommendation", PhdThesis, University of Maryland, Baltimore County, May 2017, 235 downloads.

2016

  1. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1182 downloads.
  2. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1249 downloads.
  3. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 1990 downloads.

2015

  1. P. Pappachan, R. Yus, P. K. Das, S. Mehrotra, T. Finin, and A. Joshi, "Building a Mobile Applications Knowledge Base for the Linked Data Cloud", InProceedings, 1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015), co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 1152 downloads.
  2. P. Pappachan, R. Yus, P. K. Das, S. Mehrotra, T. Finin, and A. Joshi, "Mobipedia: Mobile Applications Linked Data", InProceedings, 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 1225 downloads.
  3. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 1146 downloads.

2014

  1. P. Pappachan, R. Yus, A. Joshi, and T. Finin, "Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas", InProceedings, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014), October 2014, 1480 downloads.
  2. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1169 downloads.
  3. P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 2524 downloads.
  4. T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, "Privacy in a World of Mobile Devices", InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014, 1245 downloads.
  5. P. Pappachan, "A Semantic and Collaborative Approach to Community Health-care in Underserved Areas", MastersThesis, UMBC, July 2014, 1288 downloads.
  6. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 2994 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1268 downloads.
  2. P. K. Das, D. Ghosh, A. Joshi, and T. Finin, "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 5069 downloads.
  3. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1669 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  2. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1399 downloads.
  3. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1493 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1757 downloads.
  2. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1724 downloads.
  3. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2785 downloads.
  4. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1640 downloads.
  5. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1378 downloads.
  6. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1447 downloads.
  7. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1932 downloads.
  8. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1852 downloads, 1 citation.

2010

  1. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2964 downloads, 7 citations.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2898 downloads, 4 citations.
  2. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 154 downloads.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1941 downloads, 7 citations.
  4. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2008

  1. A. Java, "Mining Social Media Communities and Content", PhdThesis, University of Maryland, Baltimore County, December 2008, 56588 downloads.
  2. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2128 downloads, 1 citation.
  3. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2622 downloads, 1 citation.
  4. J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1712 downloads.
  5. S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1738 downloads.
  6. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2572 downloads, 1 citation.
  7. A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Gurumurthy, and A. Joshi, "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 3157 downloads.
  8. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2639 downloads.

2007

  1. A. Java, X. Song, T. Finin, and B. Tseng, "Why We Twitter: Understanding Microblogging Usage and Communities", InProceedings, Procedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007, August 2007, 61140 downloads, 342 citations.
  2. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2565 downloads.
  3. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3238 downloads, 16 citations.
  4. S. Dornbush and A. Joshi, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs", InProceedings, Vehicular Technology Conference, April 2007, 4211 downloads, 40 citations.
  5. S. Dornbush, J. English, T. Oates, Z. Segall, and A. Joshi, "XPod: A Human Activity Aware Learning Mobile Music Player", InProceedings, Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 4215 downloads, 13 citations.

2006

  1. L. Ding and T. Finin, "Characterizing the Semantic Web on the Web", InProceedings, Proceedings of the 5th International Semantic Web Conference, November 2006, 6561 downloads, 82 citations.
  2. A. A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi, "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications", InProceedings, Proceedings of the 15th ACM international conference on Information and knowledge management, November 2006, 4929 downloads.
  3. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 3034 downloads.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3996 downloads, 5 citations.
  5. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1829 downloads, 1 citation.

2005

  1. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 7764 downloads, 18 citations.
  2. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3410 downloads, 11 citations.
  3. F. Perich, A. Joshi, and R. Chirkova, "Data Management for Mobile Ad-Hoc Networks", InBook, Enabling Technologies for Wireless e-Business Applications, July 2005, 5200 downloads, 2 citations.
  4. W. Jensen, S. Gavrila, and V. Korolev, "Proximity-Based Authentication for Mobile Devices", InProceedings, Proceedings of The 2005 International Conference on Security and Management, June 2005, 1801 downloads.
  5. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Collaborative Joins in a Pervasive Computing Environment", Article, VLDB Journal, April 2005, 4352 downloads, 15 citations.
  6. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 4710 downloads, 67 citations.

2004

  1. H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 7435 downloads, 17 citations.
  2. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  3. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  4. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  5. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4422 downloads, 32 citations.
  6. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5505 downloads, 30 citations.
  7. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.
  8. D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 4268 downloads, 8 citations.
  9. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 1931 downloads.
  10. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1691 downloads, 70 citations.
  11. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4820 downloads, 15 citations.
  12. J. Undercofer, "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7248 downloads.
  13. D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
  14. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3722 downloads, 52 citations.

2003

  1. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 3150 downloads, 38 citations.
  2. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4366 downloads, 44 citations.
  3. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 7377 downloads.
  4. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 6714 downloads, 42 citations.
  5. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  6. F. Perich, A. Joshi, and Y. Yesha, "Neighborhood-Consistent Transaction Management for Pervasive Computing Environments", InProceedings, 14th International Conference on Database and Expert Systems Applications (DEXA 2003), September 2003, 4755 downloads, 11 citations.
  7. F. Perich, A. Joshi, and Y. Yesha, "Collaborative Joins in a Pervasive Computing Environment", TechReport, University of Maryland, Baltimore County, August 2003, 4157 downloads.
  8. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  9. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  10. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Lecture Notes in Artificial Intelligence, June 2003.
  11. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4883 downloads, 341 citations.
  12. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 788 downloads.
  13. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 1439 downloads.
  14. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2736 downloads, 11 citations.
  15. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 4844 downloads, 16 citations.

2002

  1. F. Perich, "Me-Centric Domain Server: Changing the Way Services See You", TechReport, University of Maryland, Baltimore County, December 2002, 4010 downloads.
  2. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3781 downloads, 17 citations.
  3. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1350 downloads.
  4. S. Avancha, V. Korolev, A. Joshi, and Y. Yesha, "On Experiments with a Transport Protocol for Pervasive Computing Environments", Article, Computer Networks, November 2002, 2942 downloads, 3 citations.
  5. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3104 downloads, 13 citations.
  6. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", InProceedings, UMBC SRC, November 2002, 4948 downloads.
  7. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2635 downloads, 19 citations.
  8. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", TechReport, University of Maryland, Baltimore County, November 2002, 1285 downloads.
  9. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  10. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3059 downloads.
  11. O. V. Ratsimor, D. Chakraborty, S. Tolia, D. Khushraj, A. Kunjithapatham, A. Joshi, T. Finin, and Y. Yesha, "Allia: Alliance-based Service Discovery for Ad-Hoc Environments", InProceedings, ACM Mobile Commerce Workshop, September 2002, 3022 downloads, 132 citations.
  12. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 4072 downloads, 218 citations.
  13. D. Chakraborty, F. Perich, A. Joshi, and Y. Yesha, "Middleware for Mobile Information Access", InProceedings, 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002), September 2002, 3874 downloads, 17 citations.
  14. F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, "Profile Driven Data Management for Pervasive Environments", InProceedings, 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002, 4725 downloads, 41 citations.
  15. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1477 downloads.
  16. F. Perich, "A Service for Aggregating and Interpreting Contextual Information", TechReport, Hewlett-Packard Laboratories, August 2002.
  17. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.
  18. D. Chakraborty, F. Perich, A. Joshi, and Y. Yesha, "Middleware for Mobile Information Systems", TechReport, University of Maryland, Baltimore County, March 2002, 3700 downloads.
  19. S. Avancha, D. Chakraborty, H. Chen, L. Kagal, F. Perich, and A. Joshi, "Issues in Data Management for Pervasive Environments", InProceedings, NSF Workshop on Context-Aware Mobile Database Management, January 2002, 4162 downloads, 2 citations.
  20. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 752 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9162 downloads, 214 citations.
  2. F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4728 downloads.
  3. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "DReggie: Semantic Service Discovery for M-Commerce Applications", InProceedings, Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS), October 2001, 5693 downloads, 96 citations.
  4. D. Chakraborty, F. Perich, and A. Joshi, "An Agent-Based Approach to Ubiquitous Information Access", TechReport, University of Maryland, Baltimore County, October 2001, 3857 downloads.
  5. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4357 downloads, 17 citations.
  6. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4348 downloads.
  7. O. V. Ratsimor, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment", InProceedings, ACM Mobile Commerce Workshop, July 2001, 5146 downloads, 39 citations.
  8. V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001.
  9. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 5995 downloads, 57 citations.
  10. H. Chen and A. Joshi, "Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether", Article, Cluster Computing, February 2001, 3756 downloads, 69 citations.

2000

  1. C. Pullela, L. Xu, D. Chakraborty, and A. Joshi, "Component based Architecture for Mobile Information Access", InProceedings, International Conference on Parallel Processing (ICPP 2000), August 2000, 14 citations.
  2. H. Chen, T. Finin, A. Joshi, D. Chakraborty, and L. Xu, "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 2662 downloads, 30 citations.

1999

  1. D. Chakraborty and H. Chen, "Service Discovery in The Future for Mobile Commerce", Article, ACM Crossroads, November 1999, 3200 downloads, 47 citations.
  2. L. Kagal, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing", TechReport, Technical Report, TR CS-01-06, November 1999, 143 downloads.
  3. S. Quirolgico and K. Canfield, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 2825 downloads, 5 citations.
  4. Y. K. Labrou and Y. Peng, "The Interoperability Problem: Bringing together Mobile Agents and Agent Communication Languages,", InProceedings, Proceedings of the Hawaii International Conference On System Sciences, January 1999, 2519 downloads, 29 citations.

1998

  1. H. Bharadvaj, A. Joshi, and S. Auephanwiriyakul, "An Active Transcoding Proxy to Support Mobile Web Access", InProceedings, 17th IEEE Symposium on Reliable Distributed Systems, October 1998, 3738 downloads, 176 citations.
  2. A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 6 citations.
  3. Y. Peng and Y. K. Labrou, "Mobile agents can benefit from standards efforts on interagent communication", Article, IEEE Communications Magazine, July 1998, 2121 downloads, 26 citations.