Anupam Joshi

According to our database1, Anupam Joshi
  • published at least 234 papers between 1993 and 2016.
  • has a "Dijkstra number"2 of two.

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to security, privacy and data management in mobile and pervasive systems".

Timeline

Legend:

Book 
In proceedings 
Article 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2016
Other times, other values: leveraging attribute history to link user profiles across online social networks.
Social Netw. Analys. Mining, 2016

OBD_SecureAlert: An Anomaly Detection System for Vehicles.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

Context-Sensitive Policy Based Security in Internet of Things.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

Semantic Knowledge and Privacy in the Physical Web.
Proceedings of the 4th Workshop on Society, 2016

Representing Attribute Based Access Control Policies in OWL.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

Visualization of Pain Severity Events in Clinical Records Using Semantic Structures.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

A Data Driven Approach for the Science of Cyber Security: Challenges and Directions.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Semantic Interpretation of Structured Log Files.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Detecting Botnets using a Collaborative Situational-aware IDPS.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), 2016

Automatic Extraction of Metrics from SLAs for Cloud Service Management.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Capturing Policies for Fine-Grained Access Control on Mobile Devices.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

UCO: A Unified Cybersecurity Ontology.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Streamlining Management of Multiple Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Using Data Analytics to Detect Anomalous States in Vehicles.
CoRR, 2015

Entity Type Recognition for Heterogeneous Semantic Graphs.
AI Magazine, 2015

Platys: From Position to Place-Oriented Mobile Computing.
AI Magazine, 2015

SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

Querying RDF data with text annotated graphs.
Proceedings of the 27th International Conference on Scientific and Statistical Database Management, 2015

Topic Modeling for RDF Graphs.
Proceedings of the Third International Workshop on Linked Data for Information Extraction (LD4IE2015) co-located with the 14th International Semantic Web Conference (ISWC 2015), 2015

Mobipedia: Mobile Applications Linked Data.
Proceedings of the ISWC 2015 Posters & Demonstrations Track co-located with the 14th International Semantic Web Conference (ISWC-2015), 2015

Building a Mobile Applications Knowledge Base for the Linked Data Cloud.
Proceedings of the 1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015) co-located with 14th International Semantic Web Conference (ISWC 2015), 2015

Beyond NER: Towards Semantics in Clinical Text.
Proceedings of International Workshop on Biomedical Data Mining, 2015

Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

Parallelizing natural language techniques for knowledge extraction from cloud service level agreements.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer.
IJMEI, 2014

Semantics for Privacy and Shared Context.
Proceedings of the 2nd Workshop on Society, 2014

A Semantic Context-Aware Privacy Model for FaceBlock.
Proceedings of the 2nd Workshop on Society, 2014

Demo: FaceBlock: privacy-aware pictures for google glass.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Interpreting medical tables as linked data for generating meta-analysis reports.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Rafiki: A semantic and collaborative approach to community health-care in underserved areas.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM.
Proceedings of the AMIA 2014, 2014

2013
Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy.
IEEE Trans. Knowl. Data Eng., 2013

ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones.
Mobile Computing and Communications Review, 2013

CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies.
Distributed and Parallel Databases, 2013

@i seek 'fb.me': identifying users across multiple online social networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
Proceedings of the 22nd International World Wide Web Conference, 2013

Analyzing Close Friend Interactions in Social Media.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Semantic Message Passing for Generating Linked Data from Tables.
Proceedings of the Semantic Web - ISWC 2013, 2013

Energy Efficient Sensing for Managing Context and Privacy on Smartphones.
Proceedings of the Workshop on Society, 2013

Extracting Cybersecurity Related Linked Data from Text.
Proceedings of the 2013 IEEE Seventh International Conference on Semantic Computing, 2013

Detection of Real-Time Intentions from Micro-blogs.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

Detecting data exfiltration by integrating information across layers.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Combining smart phone and infrastructure sensors to improve security in enterprise settings.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases.
Proceedings of the AMIA 2013, 2013

Text and Ontology Driven Clinical Decision Support System.
Proceedings of the AMIA 2013, 2013

2012
Security Through Collaboration and Trust in MANETs.
MONET, 2012

Characterization of social media response to natural disasters.
Proceedings of the 21st World Wide Web Conference, 2012

A Knowledge-Based Approach to Intrusion Detection Modeling.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

A Domain Independent Framework for Extracting Linked Semantic Data from Tables.
Proceedings of the Search Computing - Broadening Web Search, 2012

Securing Enterprise Data on Smartphones Using Run Time Information Flow Control.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Detection of unsafe action from laparoscopic cholecystectomy video.
Proceedings of the ACM International Health Informatics Symposium, 2012

Towards Analyzing Micro-Blogs for Detection and Classification of Real-Time Intentions.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Who's Who: Linking User's Multiple Identities on Online Social Media.
Proceedings of the 18th International Conference on Management of Data, 2012

A collaborative approach to situational awareness for cybersecurity.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Schema-free structured querying of DBpedia data.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Identifying and characterizing user communities on Twitter during crisis events.
Proceedings of the 2012 workshop on Data-driven User Behavioral Modelling and Mining from Social Media, 2012

2011
Enforcing security in semantics driven policy based networks.
Computer Standards & Interfaces, 2011

Two-stream indexing for spoken web search.
Proceedings of the 20th International Conference on World Wide Web, 2011

Generating Linked Data by Inferring the Semantics of Tables.
Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, 2011

Information Integration and Analysis: A Semantic Approach to Privacy.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Content-Based Prediction of Temporal Boundaries for Events in Twitter.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Preserving Privacy in Context-Aware Systems.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies.
Proceedings of the POLICY 2011, 2011

SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks.
Proceedings of the MILCOM 2011, 2011

ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Extracting Information about Security Vulnerabilities from Web Text.
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011

GoRelations: An Intuitive Query System for DBpedia.
Proceedings of the Semantic Web - Joint International Semantic Technology Conference, 2011

Mobile, Collaborative, Context-Aware Systems.
Proceedings of the Activity Context Representation: Techniques and Languages, 2011

2010
Using Linked Data to Interpret Tables.
Proceedings of the First International Workshop on Consuming Linked Data, 2010

T2LD: Interpreting and Representing Tables as Linked Data.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

A declarative approach for secure and robust routing.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Enforcing Security Policies in Mobile Devices Using Multiple Personas.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

A probabilistic approach to distributed system management.
Proceedings of the 7th International Conference on Autonomic Computing, 2010

Highly scalable parallel collaborative filtering algorithm.
Proceedings of the 2010 International Conference on High Performance Computing, 2010

2009
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory.
Proceedings of the MDM 2009, 2009

Assured Information Sharing Life Cycle.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Policy-Based Malicious Peer Detection in Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Improving binary classification on text problems using differential word features.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

User interests in social media sites: an exploration with micro-blogs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection.
TWEB, 2008

Analyzing the Structure and Evolution of Massive Telecom Graphs.
IEEE Trans. Knowl. Data Eng., 2008

The Information Ecology of Social Media and Online Communities.
AI Magazine, 2008

Threshold-based intrusion detection in ad hoc networks and secure AODV.
Ad Hoc Networks, 2008

RDF123: From Spreadsheets to RDF.
Proceedings of the Semantic Web - ISWC 2008, 7th International Semantic Web Conference, 2008

ROWLBAC: representing role based access control in OWL.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Role Based Access Control and OWL.
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008

Query distribution estimation and predictive caching in mobile ad hoc networks.
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2008

Wikipedia as an Ontology for Describing Documents.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Second Space: A Generative Model for the Blogosphere.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Approximating the Community Structure of the Long Tail.
Proceedings of the Second International Conference on Weblogs and Social Media, 2008

Enforcing security in semantics driven policy based networks.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Social ties and their relevance to churn in mobile telecom networks.
Proceedings of the EDBT 2008, 2008

Security through Collaboration in MANETs.
Proceedings of the Collaborative Computing: Networking, 2008

2007
A Pervasive Computing System for the Operating Room of the Future.
MONET, 2007

Using a Natural Language Understanding System to Generate Semantic Web Content.
Int. J. Semantic Web Inf. Syst., 2007

StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

A Ubiquitous Context-Aware Environment for Surgical Training.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Towards Spam Detection at Ping Servers.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Modeling Trust and Influence in the Blogosphere Using Link Polarity.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Feeds That Matter: A Study of Bloglines Subscriptions.
Proceedings of the First International Conference on Weblogs and Social Media, 2007

Utilizing Semantic Tags for Policy Based Networking.
Proceedings of the Global Communications Conference, 2007

BlogVox: Learning Sentiment Classifiers.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Trust in Pervasive Computing.
Proceedings of the Handbook of Mobile Middleware., 2006

Toward Distributed Service Discovery in Pervasive Computing Environments.
IEEE Trans. Mob. Comput., 2006

Querying in Packs: Trustworthy Data Management in Ad Hoc Networks.
IJWIN, 2006

Security and Privacy Challenges in Open and Dynamic Environments.
IEEE Computer, 2006

A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks.
Ad Hoc Networks, 2006

Integrating service discovery with routing and session management for ad-hoc networks.
Ad Hoc Networks, 2006

Semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection.
Proceedings of the 15th international conference on World Wide Web, 2006

The BlogVox Opinion Retrieval System.
Proceedings of the Fifteenth Text REtrieval Conference, 2006

A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Content and Context Aware Networking Using Semantic Tagging.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

On the structural properties of massive telecom call graphs: findings and implications.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

SVMs for the Blogosphere: Blog Identification and Splog Detection.
Proceedings of the Computational Approaches to Analyzing Weblogs, 2006

Detecting Spam Blogs: A Machine Learning Approach.
Proceedings of the Proceedings, 2006

2005
Collaborative joins in a pervasive computing environment.
VLDB J., 2005

Service Composition for Mobile Environments.
MONET, 2005

Using incremental Web log mining to create adaptive web servers.
Int. J. on Digital Libraries, 2005

On a data-driven environment for multiphysics applications.
Future Generation Comp. Syst., 2005

Social Networks Applied.
IEEE Intelligent Systems, 2005

Search on the Semantic Web.
IEEE Computer, 2005

Finding and Ranking Knowledge on the Semantic Web.
Proceedings of the Semantic Web, 2005

Enhancing Web Privacy Protection through Declarative Policies.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Secure Routing and Intrusion Detection in Ad Hoc Networks.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Active collaborations for trustworthy data management in ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices.
Proceedings of the High Performance Computing, 2005

Information Retrieval and the Semantic Web.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

How the Semantic Web is Being Used: An Analysis of FOAF Documents.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Using location information for scheduling in 802.15.3 MAC.
Proceedings of the 2nd International Conference on Broadband Networks (BROADNETS 2005), 2005

On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework.
Proceedings of the AI Technologies for Homeland Security, 2005

Swoogle: Searching for Knowledge on the Semantic Web.
Proceedings of the Proceedings, 2005

2004
Security, Trust, and Privacy in Mobile Computing Environments.
Proceedings of the Mobile Computing Handbook., 2004

Data and Services for Mobile Computing.
Proceedings of the Practical Handbook of Internet Computing., 2004

On Data Management in Pervasive Computing Environments.
IEEE Trans. Knowl. Data Eng., 2004

Service Discovery in Agent-Based Pervasive Computing Environments.
MONET, 2004

Intelligent Agents Meet the Semantic Web in Smart Spaces.
IEEE Internet Computing, 2004

A distributed service composition protocol for pervasive environments.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Semantic Web in the Context Broker Architecture.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Enforcing Policies in Pervasive Environments.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Ontology-Driven Adaptive Sensor Networks.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

On intrusion detection and response for mobile ad hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Agent-Based Simulation of Data-Driven Fire Propagation Dynamics.
Proceedings of the Computational Science, 2004

Swoogle: a search and metadata engine for the semantic web.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

Intelligent Agents Meet Semantic Web in a Smart Meeting Room.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

2003
Guest editorial.
VLDB J., 2003

MobiCom poster: Anamika: distributed service composition architecture for pervasive environments.
Mobile Computing and Communications Review, 2003

P2P M-commerce in pervasive environments.
SIGecom Exchanges, 2003

A Secure Infrastructure for Service Discovery and Access in Pervasive Computing.
MONET, 2003

Using DAML+OIL to classify intrusive behaviours.
Knowledge Eng. Review, 2003

An ontology for context-aware pervasive computing environments.
Knowledge Eng. Review, 2003

On Using a Warehouse to Analyze Web Logs.
Distributed and Parallel Databases, 2003

Secure sensor networks for perimeter protection.
Computer Networks, 2003

A Policy Based Approach to Security for the Semantic Web.
Proceedings of the Semantic Web, 2003

Modeling Computer Attacks: An Ontology for Intrusion Detection.
Proceedings of the Recent Advances in Intrusion Detection, 6th International Symposium, 2003

A Policy Language for a Pervasive Computing Environment.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Using OWL in a Pervasive Computing Broker.
Proceedings of the Ontologies in Agent Systems 2003, 2003

Towards a Pervasive Grid.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

On the Grid and Sensor Networks.
Proceedings of the 4th International Workshop on Grid Computing (GRID 2003), 2003

Fuzzy clustering for intrusion detection.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Panel on computational intelligence for homeland defense and counterterrorism.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Neighborhood-Consistent Transaction Management for Pervasive Computing Environments.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments.
Wireless Networks, 2002

Agents, Turst, and Information Access on the Semantic Web.
SIGMOD Record, 2002

Intelligent Agents for Mobile and Embedded Devices.
Int. J. Cooperative Inf. Syst., 2002

ITtalks: A Case Study in the Semantic Web and DAML+OIL.
IEEE Intelligent Systems, 2002

Enhanced Service Discovery in Bluetooth.
IEEE Computer, 2002

On experiments with a transport protocol for pervasive computing environments.
Computer Networks, 2002

Agent Communication in DAML World.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

Agents Making Sense of the Semantic Web.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

Creating Context-Aware Software Agents.
Proceedings of the Innovative Concepts for Agent-Based Systems, 2002

Allia: alliance-based service discovery for ad-hoc environments.
Proceedings of the 2nd International Workshop on Mobile Commerce, 2002

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments.
Proceedings of the Web Services, 2002

Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Adaptive Multimedia System Architecture for Improving QoS in Wireless Networks.
Proceedings of the Advances in Multimedia Information Processing, 2002

GSD: a novel group-based service discovery protocol for MANETS.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

MobileIQ: A Framework for Mobile Information Access.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

A Reactive Service Composition Architecture for Pervasive Computing Environments.
Proceedings of the Mobile and Wireless Communications, 2002

Middleware for Mobile Information Access.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Profile Driven Data Management for Pervasive Environments.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

Information retrieval on the semantic web.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002

2001
Low-complexity fuzzy relational clustering algorithms for Web mining.
IEEE Trans. Fuzzy Systems, 2001

Broadband Wireless.
J. High Speed Networks, 2001

Communications - Trust-Based Security in Pervasive Computing Environments.
IEEE Computer, 2001

Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether.
Cluster Computing, 2001

Agents2Go: an infrastructure for location-dependent service discovery in the mobile electronic commerce environment.
Proceedings of the 1st International Workshop on Mobile Commerce, 2001

ITTALKS: A Case Study in the Semantic Web and DAML.
Proceedings of SWWS'01, The first Semantic Web Working Symposium, Stanford University, California, USA, July 30, 2001

Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks.
Proceedings of the Developing an Infrastructure for Mobile and Wireless Systems, 2001

Data mining "to go": ubiquitous KDD for mobile and distributed environments.
KDD Tutorials, 2001

An End-End Approach to Wireless Web Access.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Centaurus: A Framework for Intelligent Services in a Mobile Environment.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001

Transport protocols in wireless networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

An Expertise Recommender Using Web Mining.
Proceedings of the Fourteenth International Florida Artificial Intelligence Research Society Conference, 2001

ITTALKS: An Application of Agents in the Semantic Web.
Proceedings of the Engineering Societies in the Agents World II, 2001

Information Agents for Mobile and Embedded Devices.
Proceedings of the Cooperative Information Agents V, 5th International Workshop, 2001

2000
On proxy agents, mobility, and web access.
MONET, 2000

Extracting Web User Profiles Using Relational Competitive Fuzzy Clustering.
International Journal on Artificial Intelligence Tools, 2000

A Component Based Architecture for Mobile Information Access.
Proceedings of the 2000 International Workshop on Parallel Processing, 2000

Multi-Agent Systems, Internet and Applications - Introduction.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

On Mining Web Access Logs.
ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2000

1999
Guest Editorial.
Distributed and Parallel Databases, 1999

Multiagent Systems on the Net - Introduction.
Commun. ACM, 1999

Warehousing and Mining Web Logs.
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999

On mobility and agents.
Proceedings of the Mobile Networks and Computing, 1999

1998
Scene Change Detection Techniques for Video Database Systems.
Multimedia Syst., 1998

Multiagent System Support of Networked Scientific Computing.
IEEE Internet Computing, 1998

Multidisciplinary Problem Solving Environments for Computational Science.
Advances in Computers, 1998

Personalization & Asynchronicity to Support Mobile Web Access.
Proceedings of the CIKM'98 First Workshop on Web Information and Data Management (WIDM'98), 1998

Interactive Image Retrieval over the Internet.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Security in Mobile Systems.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

An Active Transcoding Proxy to Support Mobile Web Access.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

On Fuzzy Clustering and Content Based Access to Networked Video Databases.
Proceedings of the RIDE'98, 1998

1997
Video Database Systems - Issues, Products and Applications
Advances in Database Systems 5, Kluwer, ISBN: 978-0-7923-9872-1, 1997

On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques.
IEEE Trans. Neural Networks, 1997

Notebook interfaces for networked scientific computing: design and WWW implementation.
Concurrency - Practice and Experience, 1997

On Disconnected Browsing of Distributed Information.
Proceedings of the 7th International Workshop on Research Issues in Data Engineering (RIDE '97) High Performance Database Management for Large-Scale Applications, 1997

A MultiAgent Environment for MPSE's.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

Panel on Cooperative MultiAgent Systems for the Web.
Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, 1997

1996
PYTHIA: A Knowledge-Based System to Select Scientific Algorithms.
ACM Trans. Math. Softw., 1996

Software Architecture of Ubiquitous Scientific Computing Environments for Mobile Platforms.
MONET, 1996

Internet, education, and the Web.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Web Intelligent Query - Disconnected Web Browsing using Cooperative Techniques.
Proceedings of the First IFCIS International Conference on Cooperative Information Systems (CoopIS'96), 1996

1995
On the problem of correspondence in range data and some inelastic uses for elastic nets.
IEEE Trans. Neural Networks, 1995

On correspondence, line tokens and missing tokens.
Pattern Recognition, 1995

To Learn or Not do Learn.
Proceedings of the Adaption and Learning in Multi-Agent Systems, 1995

SciAgents-an agent based environment for distributed, cooperative scientific computing.
Proceedings of the Seventh International Conference on Tools with Artificial Intelligence, 1995

1993
Correspondence problem in image sequence analysis.
Pattern Recognition, 1993

Backpropagation learns Marr's operator.
Biological Cybernetics, 1993


  Loading...