James H. Graham

According to our database1, James H. Graham authored at least 95 papers between 1971 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
An Immersive Visualization Tool for Teaching and Simulation of Smart Grid Technologies.
CoRR, 2015

2014
Pedestrian detection using mixed partial derivative based histogram of oriented gradients.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
A Novel Approach for Lung Nodules Segmentation in Chest CT Using Level Sets.
IEEE Trans. Image Process., 2013

A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices.
Int. J. Crit. Infrastructure Prot., 2013

An interactive educational drawing system using a humanoid robot and light polarization.
Proceedings of the IEEE International Conference on Image Processing, 2013

A 3D reconstruction of the human jaw from a single image.
Proceedings of the IEEE International Conference on Image Processing, 2013

Novel variational approach for the perspective shape from shading problem using calibrated images.
Proceedings of the IEEE International Conference on Image Processing, 2013

Deformable models for random small-size objects: Case of lung nodules in CT tomography.
Proceedings of the IEEE International Conference on Acoustics, 2013

A Non-invasive Method for Measuring Blood Flow Rate in Superficial Veins from a Single Thermal Image.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

2012
An AAM-based detection approach of lung nodules from LDCT scans.
Proceedings of the 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2012

Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices.
Proceedings of the Critical Infrastructure Protection VI, 2012

2011
Differential Drive Robot Model, Simulation, and Verification.
Int. J. Comput. Their Appl., 2011

A digraph model for risk identification and mangement in SCADA systems.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Evaluation of geometric feature descriptors for detection and classification of lung nodules in low dose CT scans of the chest.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011

Variational approach for segmentation of lung nodules.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Active Learning Mashups for Tablet Classrooms.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

Intelligent Power Management for a Solar Parking Structure for Plug-in Electric Vehicles.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

2010
Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes.
Int. J. Comput. Their Appl., 2010

Toward Precise Pulmonary Nodule Descriptors for Nodule Type Classification.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2010

Surface Modeling of the Corpus Callosum from MRI Scans.
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010

Feature-Based Lung Nodule Classification.
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010

Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Robust segmentation of lung tissue in chest CT scanning.
Proceedings of the International Conference on Image Processing, 2010

Statistical modeling of the lung nodules in low dose computed tomography scans of the chest.
Proceedings of the International Conference on Image Processing, 2010

Predicting Makespan with Latin Square Replication on Computational Grids.
Proceedings of the ISCA 25th International Conference on Computers and Their Applications, 2010

2009
New Software Metrics for Evaluation and Comparison of Advanced Power Management Systems.
IEEE Syst. J., 2009

Improving the cyber security of SCADA communication networks.
Commun. ACM, 2009

Lung Nodule Modeling - A Data-Driven Approach.
Proceedings of the Advances in Visual Computing, 5th International Symposium, 2009

An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems.
Proceedings of the Critical Infrastructure Protection III, 2009

Intrusion Detection System for SCADA Networks.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements.
Proceedings of the Bioinformatics and Computational Biology, 2009

Reliability through Replication and Permutation on Desktop Grids.
Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, 2009

2008
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements.
Int. J. Inf. Manag., 2008

Designing Security-Hardened Microkernels For Field Devices.
Proceedings of the Critical Infrastructure Protection II, 2008

A Method for Detecting Windows Rootkits.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008

An Ontological Model for Assessing Security Risk Impact in SCADA Systems.
Proceedings of the ISCA 23rd International Conference on Computers and Their Applications, 2008

2007
Demand Forecasting Using Intelligent Agents with Application to a Call Processing Center.
Int. J. Comput. Their Appl., 2007

Challenge - Construction of an Adequate Digital Forensics Testbed.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Security Enhancements for Distributed Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

Improvements in SCADA and DCS Systems Security.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

Testing Security Enhanced SCADA Communication Protocols.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

Identity Management for Advanced Health Care Systems.
Proceedings of the ISCA 20th International Conference on Computer Applications in Industry and Engineering, 2007

2006
Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic.
Proceedings of the IEEE International Conference on Systems, 2006

An Application of Grid Computing to Pharmacophore Discovery Using Inductive Logic Programming.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

Dynamic Authentication Using Keystroke Biometrics.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

Security enhancement for SCADA communication protocols using augmented vulnerability trees.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

Security-enhanced remote terminal units for SCADA networks.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

2005
Computer System Security Threat Evaluation Based Upon Artificial Immunity Model and Fuzzy Logic.
Proceedings of the IEEE International Conference on Systems, 2005

FMECA Control for Software Development.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

Agent-Based Architecture for Intelligent Semi-Autonomous Robots.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

Secure SCADA Communications, Monitoring and Control over the Internet.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

Event Processing Software for Intelligent Security Monitoring and Alarm System.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

2004
Computer Immunology and Neural Network Models for Masquerader Detection.
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004

Security Considerations in DNP3 SCADA Systems.
Proceedings of the 17th International Conference on Computer Applications in Industry and Engineering, 2004

2003
A Parallel Inductive Logic Programming Data Mining System for Drug Discovery.
Int. J. Comput. Their Appl., 2003

Fusion of soft and hard computing for fault diagnosis in manufacturing systems.
Proceedings of the IEEE International Conference on Systems, 2003

Call Center Demand Forecasting using Intelligent Agents.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003

Advanced Simulation Architecture for Intelligent Autonomous Robots.
Proceedings of the 12th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2003

Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining.
Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference, 2003

2002
Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes.
Int. J. Comput. Their Appl., 2002

A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain Systems.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Fuzzy Threat Evaluation in Computer Security.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Intelligent Chemometrics-Based Approach for Chemical Process Fault Monitoring and Diagnosis.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

Multi-level Biometric-Based Authentication System.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

2001
A neuro-fuzzy approach for robot system safety.
IEEE Trans. Syst. Man Cybern. Syst., 2001

Guest Editor's Introduction.
Int. J. Comput. Their Appl., 2001

An Agent-based Architecture for Performance Tuning: Parallel Discrete-event Simulations Case Study.
Proceedings of the ISCA 14th International Conference on Parallel and Distributed Computing Systems, 2001

An Approach to Parallel Data Mining for Pharmacophore Discovery.
Proceedings of the ISCA 10th International Conference on Intelligent Systems, 2001

Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture.
Proceedings of the ISCA 10th International Conference on Intelligent Systems, 2001

2000
An Agent-Based Approach to Robust Switching Between Abstraction Levels for Fault Diagnosis.
Proceedings of the Abstraction, 2000

Computer-based monitoring and fault diagnosis for chemical processes.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

Knowledge Based Planning of Communications Networks to Support Military Ground Operations.
Proceedings of the ISCA 9th International Conference on Intelligent Systems, 2000

High Performance Computing: An Agent-based Approach.
Proceedings of the ISCA 9th International Conference on Intelligent Systems, 2000

1999
Web-based performance visualization of distributed discrete event simulation.
Proceedings of the 31st conference on Winter simulation: Simulation, 1999

1998
Evaluation of a Prototype Visualization for Distributed Simulations.
Proceedings of the 30th conference on Winter simulation, 1998

1996
Intelligent Neural Network Based Decision Unit for Robot Safety.
J. Intell. Fuzzy Syst., 1996

1995
Book Review.
Artif. Intell. Rev., 1995

1994
Diagnostic Reasoning With Fault Propagation Digraph and Sequential Testing.
IEEE Trans. Syst. Man Cybern. Syst., 1994

An Approach to Standardizing the Simulation to Knowledge System Interface.
Simul., 1994

1993
Intelligent Diagnostics in Robotics and Integrated Manufacturing Systems.
Proceedings of the 1993 IEEE International Conference on Robotics and Automation, 1993

A Simple Balanced Search Tree.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
An Investigation of a Standard Simulation-Knowledge Interface.
Proceedings of the 24th Winter Simulation Conference, 1992

1991
Object-oriented software for diagnosis of manufacturing systems.
Proceedings of the 1991 IEEE International Conference on Robotics and Automation, 1991

1989
Special computer architectures for robotics: tutorial and survey.
IEEE Trans. Robotics Autom., 1989

Computer assisted analysis of electromyographic data in diagnosis of low back pain.
Proceedings of the IEEE International Conference on Systems, 1989

1988
Research issues in robot safety.
Proceedings of the 1988 IEEE International Conference on Robotics and Automation, 1988

1985
Parallel Algorithms and Architectures for Optimal State Estimation.
IEEE Trans. Computers, 1985

Interaction with the environment: Philippe Coiffet.
Autom., 1985

1984
Comment on "automatic planning of manipulator transfer movements".
IEEE Trans. Syst. Man Cybern., 1984

Linguistic decision schemata for intelligent robots.
Autom., 1984

1982
Linguistic Decision Structures for Hierarchical Systems.
IEEE Trans. Syst. Man Cybern., 1982

1971
A note on determining the measure of coincidence of segments of a given conic.
Comput. Aided Des., 1971


  Loading...