Jereme Haack

According to our database1, Jereme Haack authored at least 24 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
VAST Challenge 2018: Suspense at the Wildlife Preserve.
Proceedings of the 13th IEEE Conference on Visual Analytics Science and Technology, 2018

2017
VAST Challenge 2017: Mystery at the Wildlife Preserve.
Proceedings of the 12th IEEE Conference on Visual Analytics Science and Technology, 2017

2016
VOLTTRON™: Using distributed control and sensing to integrate buildings and the grid.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

2014
Defense on the Move: Ant-Based Cyber Defense.
IEEE Secur. Priv., 2014

The transactional network platform: poster abstract.
Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings, 2014

2013
Psychosocial and Cultural Modeling in Human Computation Systems: A Gamification Approach.
Proceedings of the Handbook of Human Computation, 2013

Ants, To-Go: A Portable Demonstration of Large Infrastructure Cyber Defense.
Proceedings of the 7th IEEE International Conference on Self-Adaptation and Self-Organizing Systems Workshops, 2013

VOLTTRON™: An agent platform for integrating electric vehicles and Smart Grid.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Volttron: an agent platform for the smart grid.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
Modeling Emergence in Neuroprotective Regulatory Networks.
Proceedings of the Complex Sciences - Second International Conference, 2012

2011
Technosocial Predictive Analytics for Illicit Nuclear Trafficking.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2011

Bio-Inspired Enterprise Security.
Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2011

Ant-Based Cyber Security.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Generating a synthetic video dataset.
Proceedings of the 3rd BELIV'10 Workshop: BEyond time and errors: novel evaLuation methods for Information Visualization, 2010

2009
VAST contest dataset use in education.
Proceedings of the 4th IEEE Symposium on Visual Analytics Science and Technology, 2009

Agent-Based Knowledge Discovery for Modeling & Simulation.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

2008
Predicting Computer System Failures Using Support Vector Machines.
Proceedings of the First USENIX Workshop on the Analysis of System Logs, 2008

Creating realistic, scenario-based synthetic data for test and evaluation of information analytics software.
Proceedings of the BELIV 2008, 2008

2006
Understanding the dynamics of collaborative multi-party discourse.
Inf. Vis., 2006

Threat stream data generator: creating the known unknowns for test and evaluation of visual analytics tools.
Proceedings of the 2006 AVI Workshop on BEyond time and errors: novel evaluation methods for information visualization, 2006

2004
Integration of a Text Search Engine with a Java Messaging Service.
Proceedings of the Software Engineering and Middleware, 4th International Workshop, 2004

Architecting in the Face of Uncertainty: An Experience Report.
Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), 2004

2003
Evaluating Agent Architectures: Cougaar, Aglets and AAA.
Proceedings of the Software Engineering for Multi-Agent Systems II, 2003

An Efficient, Scalable Content-Based Messaging System.
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003


  Loading...