Tags: simulation

Publications

2022

  1. A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 606 downloads.
  2. A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Dixit, and N. Venkatasubramanian, "SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2022, 126 downloads.
  3. A. Chio, D. Jiang, P. Gupta, G. Bouloukakis, R. Yus, S. Mehrotra, and N. Venkatasubramanian, "Artifact: SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations", InProceedings, 20th International Conference on Pervasive Computing and Communications, March 2022, 128 downloads.
  4. M. Halem, a. kochanski, J. Mandel, P. Nguyen, R. Atlas, Z. Yang, A. Bargteil, J. Sleeman, V. Caicedo, B. Demoz, D. Chapman, and K. Patel, "A Machine Learning Plume-Resolving Model Implementation over North America for Mega-Wildland Fire Smoke Impacts on Distant Planetary Boundary Layers", InProceedings, 102nd American Meteorological Society Annual Meeting, January 2022.

2021

  1. M. Halem, K. Patel, Z. Yang, and J. Sleeman, "The Use of Machine Learning to Infer the Transport Influence of US West Coast WildFires on the US East Coast Planetary Boundary Layer", InProceedings, AGU Fall Meeting 2021, December 2021.

2019

  1. M. Murnane, M. Breitmeyer, F. Ferraro, C. Matuszek, and D. Engel, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 271 downloads.
  2. M. Murnane, M. Breitmeyer, F. Ferraro, and C. Matuszek, "Learning from Human-Robot Interactions in Modeled Scenes", InProceedings, ACM SIGGRAPH 2019 Posters, July 2019, 259 downloads.

2015

  1. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1447 downloads.

2013

  1. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1743 downloads.

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 22 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1825 downloads.
  2. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2132 downloads.
  3. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1716 downloads.

2010

  1. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 70 downloads.
  2. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3058 downloads, 7 citations.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3007 downloads, 4 citations.
  2. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2016 downloads, 7 citations.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2210 downloads, 1 citation.

2007

  1. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2649 downloads.
  2. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3310 downloads, 16 citations.
  3. M. Halem, A. Patwardhan, S. Dornbush, M. Seablom, and Y. Yesha, "Sensor Web Design Studies for Realtime Dynamic Congestion Pricing", Proceedings, PerTrans07, March 2007, 3753 downloads.

2006

  1. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 3110 downloads.
  2. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4098 downloads, 10 citations.
  3. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4107 downloads, 5 citations.
  4. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Toward Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing , February 2006, 2998 downloads, 142 citations.
  5. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4150 downloads, 13 citations.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3515 downloads, 11 citations.
  2. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3897 downloads.
  3. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 4831 downloads, 67 citations.

2004

  1. O. Streltchenko, Y. Yesha, and T. Finin, "Multi-agent simulation of financial markets", InBook, Formal Modeling in Electronic Commerce: Representation, Inference, and Strategic Interaction, December 2004, 3297 downloads, 8 citations.
  2. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, July 2004, 3746 downloads, 29 citations.
  3. F. Perich, A. Joshi, T. Finin, and Y. Yesha, "On Data Management in Pervasive Computing Environments", Article, IEEE Transactions on Knowledge and Data Engineering, May 2004, 5517 downloads, 82 citations.
  4. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4901 downloads, 15 citations.
  5. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3321 downloads, 22 citations.
  6. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3234 downloads, 6 citations.

2003

  1. O. Streltchenko, "Exploring Trading Dynamics in a Derivative Securities Market of Heterogeneous Agents", PhdThesis, UMBC, December 2003.
  2. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3565 downloads, 30 citations.
  3. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 3220 downloads, 38 citations.
  4. L. Ding, L. Zhou, and T. Finin, "Trust Based Knowledge Outsourcing for Semantic Web Agents", InProceedings, Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, October 2003, 3498 downloads, 47 citations.
  5. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Neighborhood-Consistent Transaction Management for Pervasive Computing Environments", InProceedings, 14th International Conference on Database and Expert Systems Applications (DEXA 2003), September 2003, 4874 downloads, 11 citations.
  6. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, June 2003, 3560 downloads.
  7. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2797 downloads, 11 citations.

2002

  1. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 4165 downloads, 218 citations.
  2. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3263 downloads, 1 citation.