NIS ITA - Science Library

International Technology Alliance in Network and Information Sciences (NIS ITA)

Welcome to the online legacy for the International Technology Alliance in Network and Information Sciences (NIS ITA). Here you will find summary information relating to this highly successful 10-year program along with a full list of publications.

The NIS ITA represented a new way of doing business: forming an international alliance of government, industry and academia to jointly conduct fundamental research. The origins of the concept were in similar national programmes, such as the US Army Collaborative Technology Alliances (CTA) and the MoD’s Defence Technology Centres (DTC). Independent Peer Review identified the NIS ITA as “an outstanding example of true, deep and enduring International Research Collaboration”.

The NIS ITA was initiated with the strategic goal of producing fundamental advances in network and information sciences to enhance distributed, secure and flexible networks for information delivery and decision-making in coalition operations. The focus has been on the hard problems associated with coalition operations. This focus, coupled with the existing research interests and expertise of the two-nation, multi-organization, inter-discipline Alliance has brought a sharp focus to the programme, enabling different skills from academia, industry and government to be used together to great effect. Independent Peer Review identified that the NIS ITA has “significantly advanced the state-of-the-art in network and information science”.

You can read more about the NIS ITA on wikipedia, and access all of the legacy materials here.

The remainder of this page lists all of the publications from the NIS ITA program.

Paper type 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 total
journal 0 18 18 37 22 21 31 23 23 9 5 207
patent 0 1 0 0 2 3 11 16 12 10 0 55
external conference 3 80 129 104 127 67 75 65 69 71 9 799
internal conference 0 36 60 43 45 37 62 32 41 6 0 362
invited talk 0 1 0 1 3 0 3 3 4 1 0 16
book chapter 0 1 6 3 3 1 1 2 0 1 2 20
demo 0 0 0 1 0 0 3 2 2 0 0 8
tech report 2 14 7 28 13 10 24 20 29 7 2 156
poster 0 0 0 5 0 0 1 2 1 0 0 9
software 0 0 0 0 0 1 2 0 0 0 1 4
phd thesis 0 2 0 1 1 2 2 1 1 1 0 11
workshop 0 0 0 0 0 1 1 0 1 0 0 3
total 5 153 220 223 216 143 216 166 183 106 19 1650

Publications

All of the publications from the NIS ITA program are listed in the table below.

id type title authors date venue collaboration
doc-x0031 external conference Formulating Conceptual Models for Reasoning about a Civil-Military Domain using ITA Controlled English
  • Cheryl Giammanco (ARL)
  • David Mott (IBM UK)
  • Ray McGowan (ARL)
Sep-2016 Knowledge Systems for Coalition Operations (KSCO), 2016 international with government
doc-3123 tech report Island of Zombies, a logical problem to explore conceptualising in CE
  • David Mott (IBM UK)
May-2016 single institute
doc-3165 tech report The ITA Controlled English Report (Prolog version)
  • David Mott (IBM UK)
May-2016 single institute
doc-1670b software Prolog-based ITA Controlled English Reasoning System
  • David Mott (IBM UK)
Apr-2016 single institute
doc-x0011 external conference Robust monitor placement for network tomography in dynamic networks
  • Ting He (IBM US)
  • Liang Ma (Imperial)
  • Athanasios Gkelias (Imperial)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Apr-2016 IEEE International Conference on Computer Communications (InfoCom), 2016 international with government
doc-x0012 external conference Optimization Framework with Reduced Complexity for Sensor Networks with In-Network Processing
  • Sepideh Nazemi (Imperial)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
Apr-2016 IEEE Wireless Communications and Networking Conference (WCNC), 2016 international with government
doc-x0034 book chapter Inferring Network Topologies in MANETs: Application to Service Redeployment
  • Simone Silvestri (PSU)
  • Brett Holbert (PSU)
  • Petr Novotny (Imperial)
  • Thomas La Porta (PSU)
  • Alexander Wolf (Imperial)
  • Ananthram Swami (ARL)
Apr-2016 Advances in Computer Communications and Networks - from green, mobile, pervasive networking to big data computing. River Publisher, April, 2016. international
doc-x1047 external conference Next-generation neurosynaptic tactical ISR systems
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
Apr-2016 International Society for Optics and Photonics - Defense, Security and Sensing, 2016 single institute
doc-x1048 external conference From Open Source Communications to Knowledge
  • Alun Preece (Cardiff)
  • Colin Roberts (Cardiff)
  • David Rogers (Cardiff)
  • Will Webberley (Cardiff)
  • Martin Innes (Cardiff)
  • Dave Braines (IBM UK)
Apr-2016 International Society for Optics and Photonics - Defense, Security and Sensing, 2016 collaborative
doc-x1049 external conference Agile Development of Ontologies Through Conversation
  • Dave Braines (IBM UK)
  • Amardeep Bhattal (IBM UK)
  • Geeth de Mel (IBM US)
  • Alun Preece (Cardiff)
Apr-2016 International Society for Optics and Photonics - Defense, Security and Sensing, 2016 collaborative with government
doc-x0022 journal Aggregating Crowdsourced Quantitative Claims: Additive and Multiplicative Models
  • Wentao Ouyang (UCLA)
  • Lance Kaplan (ARL)
  • Alice Toniolo (Aberdeen)
  • Mani Srivastava (UCLA)
  • Timothy Norman (Aberdeen)
Feb-2016 IEEE Trans. on Knowledge and Data Engineering international with government
doc-x0483 external conference Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples
  • Changchang Liu
  • Supriyo Chakraborty (UCLA)
  • Prateek Mittal
Feb-2016 The Network and Distributed System Security Symposium 2016 collaborative
doc-x0057 external conference Information Sharing for Collective Sensemaking
  • Yuqing Tang (CMU)
  • Christian Lebiere (CMU)
  • Katia Sycara (CMU)
  • Don Morrison (CMU)
  • Michael Lewis
  • Paul Smart (Southampton)
2016 Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, USA. international
doc-x0325 journal A Markovian Model for Coarse Timescale Channel Variation in Wireless Networks
  • Anand Seetharam (UMass)
  • Jim Kurose (UMass)
  • Dennis Goeckel (UMass)
2016 IEEE Transactions on Vehicular Technology, Volume:PP, Issue:99 single institute
doc-x0457 external conference Conversational intelligence analysis
  • Alice Toniolo (Aberdeen)
  • Alun Preece (Cardiff)
  • Will Webberley (Cardiff)
  • Timothy Norman (Aberdeen)
  • Paul Sullivan (ARL)
  • Tim Dropps (Honeywell)
Jan-2016 Proceedings of the 17th International Conference on Distributed Computing and Networking (p. 42). ACM. international with government
doc-x0756 journal Parallel and Streaming Truth Discovery in Large-Scale Quantitative Crowdsourcing
  • Wentao Ouyang (UCLA)
  • Lance Kaplan (ARL)
  • Alice Toniolo (Aberdeen)
  • Mani Srivastava (UCLA)
  • Timothy Norman (Aberdeen)
Jan-2016 IEEE Transactions on Parallel and Distributed Systems international with government
doc-x1025 journal General Graph Data De-anonymization: From Mobility Traces to Social Networks
  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa (IBM US)
  • Raheem Beyah
2016 ACM Transactions on Information Systems Security (TIS- SEC), 2016 collaborative
doc-x1026 journal Structural Data De-anonymization: Theory and Practice
  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa (IBM US)
  • Raheem Beyah
2016 ACM Transactions of Networking (ToN), 2016 collaborative
doc-x1055 book chapter Emerging Digital Technologies: Implications for Extended Conceptions of Cognition and Knowledge
  • Paul Smart (Southampton)
Jan-2016 A. J. Carter, A. Clark, J. Kallestrup, O. S. Palermos & D. Pritchard (Eds.), Extended Epistemology, Ofxord University Press, Oxford, UK single institute
doc-2645a external conference Internet Media Upload Caching for Poorly-Connected Regions
  • Paul Schmitt
  • Ramya Raghavendra (IBM US)
  • Elizabeth Belding
Dec-2015 Proceedings of the 2015 Annual Symposium on Computing for Development (pp. 41-49). ACM collaborative
doc-x0384 patent Anonymizing Location Information of a Mobile Device
  • Saritha Arunkumar (IBM UK)
  • Stephen Pipes (IBM UK)
  • Mudhakar Srivatsa (IBM US)
Dec-2015 U.S. Patent No. 20,150,350,890 international
doc-x0486 external conference Design, Implementation, and Evaluation of Energy-Aware Multi-Path TCP
  • Yeon-sup Lim (UMass)
  • Yung-Chih Chen (UMass)
  • Erich Nahum (IBM US)
  • Don Towsley (UMass)
  • Richard Gibbens (Cambridge)
  • Emmanuel Cecchet (UMass)
Dec-2015 ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2015 international
doc-x1052 patent Efficient two party oblivious transfer using a leveled fully homomorphic encryption
  • Graham Bent (IBM UK)
  • Flavio Bergamaschi (IBM UK)
Dec-2015 GB920150053US1 single institute
doc-x1053 patent Performing efficient comparison operations on encrypted data
  • Graham Bent (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • David Bacon (IBM US)
Dec-2015 GB920150015US1 international
doc-x0037 external conference Controlled and Uncontrolled English for Ontology Editing
  • Brian Donohue
  • Doug Kutach
  • Bob Ganger
  • Rod Rudnicki
  • Tien Pham (ARL)
  • Geeth de Mel (IBM US)
  • Amardeep Bhattal (IBM UK)
  • Dave Braines (IBM UK)
Nov-2015 Semantic Technology for Intelligence, Defense and Security (STIDS 2015), Fairfax, VA, Nov 2015. international with government
doc-x0548 external conference Experimental Results on the use of Genetic Algorithms for Scaling Virtualized Network Functions
  • Windhya Rankothge
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Nov-2015 Network Function Virtualization and Software Defined Network (NFV-SDN), 2015 IEEE Conference on international
doc-x0722 patent Node-level sub-queries in distributed databases
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
Nov-2015 U.S. Patent No. 9,183,260. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0007 external conference Emulation-Based Study of Dynamic Service Placement in Mobile Micro-Clouds
  • Shiqiang Wang (Imperial)
  • Kevin Chan (ARL)
  • Rahul Urgaonkar (IBM US)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
Oct-2015 IEEE Military Communications Conference, 2015 international with government
doc-x0008 external conference Security-aware Service Migration for Tactical Mobile-Micro Clouds
  • Ertugrul Ciftcioglu (IBM US)
  • Kevin Chan (ARL)
  • Rahul Urgaonkar (IBM US)
  • Shiqiang Wang (Imperial)
  • Ting He (IBM US)
Oct-2015 IEEE Military Communications Conference, 2015 international with government
doc-x0013 external conference Multicast vs. Unicast for Loss Tomography on Tree Topologies
  • Chang Liu (UMass)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Theodoros Salonidis (IBM US)
  • Andrei Bejan (Cambridge)
  • Philip Yu (IBM US)
Oct-2015 IEEE Military Communications Conference, 2015 international with government
doc-x0080 external conference Network Science collaborative experimentation methods and tools to accelerate network science innovation within the ITA and NS-CTA
  • Kelvin Marcus (ARL)
  • Maroun Touma (IBM US)
  • Flavio Bergamaschi (IBM UK)
Oct-2015 IEEE Military Communications Conference, 2015 international with government
doc-x0185 external conference Thin layer approach to increase reliability in ad hoc network
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
  • Mohit Tiwari
  • Bao-Hong Shen
Oct-2015 IEEE Military Communications Conference, 2015 collaborative
doc-x0512 external conference Dynamic placement of composite software services in hybrid wireless networks
  • Petr Novotny (Imperial)
  • Rahul Urgaonkar (IBM US)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Oct-2015 IEEE Military Communications Conference, 2015 international
doc-x0581 external conference Global attestation of location in mobile devices
  • Saritha Arunkumar (IBM UK)
  • Mudhakar Srivatsa (IBM US)
  • Murat Sensoy (Aberdeen)
  • Muttukrishnan Rajarajan
Oct-2015 IEEE Military Communications Conference, 2015 international
doc-x0624 external conference Integridb: Verifiable SQL for outsourced databases
  • Yupeng Zhang (UMD)
  • Jonathan Katz (UMD)
  • Charalampos Papamanthou (UMD)
Oct-2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1480-1491). ACM single institute
doc-x0657 external conference Low-Overhead Gaussian-Process Training for Indoor Positioning Systems
  • Paul Martin (UCLA)
  • Jan Medvesek (UCL)
  • Andrew Symington (UCLA)
  • Mani Srivastava (UCLA)
  • Stephen Hailes (UCL)
Oct-2015 Proceedings of the 2015 International Conference on Indoor Positioning and Indoor Navigation (IPIN), IEEE Xplore international
doc-x0869 external conference Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks
Variants: doc-2908
  • Nan Hu (PSU)
  • Thomas La Porta (PSU)
  • Novella Bartolini
Oct-2015 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015 collaborative
doc-x0888 external conference Social Signal Processing for Real-Time Situational Understanding: A Vision and Approach
  • Kasthuri Jayarajah
  • Shuochao Yao
  • Raghava Mutharaju (IBM US)
  • Archan Misra (IBM US)
  • Geeth de Mel (IBM US)
  • Julie Skipper
  • Tarek Abdelzaher
  • Mike Kolodny (ARL)
Oct-2015 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015 international with government
doc-2849b internal conference Conversational Sensemaking
Variants: doc-2849a
  • Alun Preece (Cardiff)
  • Will Webberley (Cardiff)
  • Dave Braines (IBM UK)
Sep-2015 9th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2910 external conference Using a Cognitive Architecture to Control the Behaviour of Virtual Robots
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
Sep-2015 EuroAsianPacific Joint Conference on Cognitive Science, Turin, Italy, 25 - 27 Sep 2015. 6pp international
doc-2998 internal conference Use of Controlled English to Bridge the Gap Between Tactical and Strategic Echelons
  • Jinny Yan
  • Hannah Grosso
  • Theodore Hoel
  • Dave Braines (IBM UK)
  • Alun Preece (Cardiff)
Sep-2015 9th Annual Fall Meeting of the International Technology Alliance international
doc-x0006 journal Dynamic Service Migration and Workload Scheduling in Edge-Clouds
  • Rahul Urgaonkar (IBM US)
  • Shiqiang Wang (Imperial)
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
  • Kevin Chan (ARL)
  • Kin Leung (Imperial)
Sep-2015 Elsevier Journal of Performance Evaluation, Vol 91 Issue C, pages 205-228, September 2015 international with government
doc-x0367 internal conference An Algebra for Vague Expressions
  • Federico Cerutti (Cardiff)
  • Dave Braines (IBM UK)
  • Lance Kaplan (ARL)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Gavin Pearson (DSTL)
  • Alice Toniolo (Aberdeen)
Sep-2015 9th Annual Fall Meeting of the International Technology Alliance international
doc-x0383 external conference AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems
  • Takamasa Higuchi
  • Paul Martin (UCLA)
  • Supriyo Chakraborty (UCLA)
  • Mani Srivastava (UCLA)
Sep-2015 Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 1119-1130). ACM. collaborative
doc-x0386 internal conference Applications of Directed Percolation in Wireless Networks
  • Saikat Guha (BBN)
  • Prithwish Basu (BBN)
Sep-2015 9th Annual Fall Meeting of the International Technology Alliance single institute
doc-x0393 internal conference Argumentation, CE, MARF: a comparison and integration
  • David Mott (IBM UK)
  • Yuqing Tang (CMU)
  • Federico Cerutti (Cardiff)
Sep-2015 9th Annual Fall Meeting of the International Technology Alliance international
doc-x0426 external conference CAreDroid: Adaptation Framework for Android Context-Aware Applications

Best paper and best community paper award
  • Salma Elmalaki (UCLA)
  • Lucas Wanner
  • Mani Srivastava (UCLA)
Sep-2015 Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (pp. 386-399). ACM collaborative
doc-x0604 internal conference IBN for Negotiating Policy-based Asset Sharing in Collaborative Environments
  • Christos Parizas (Cardiff)
  • Geeth de Mel (IBM US)
  • Alun Preece (Cardiff)
  • Murat Sensoy (Aberdeen)
  • Seraphin Calo (IBM US)
  • Tien Pham (ARL)
Sep-2015 9th Annual Fall Meeting of the International Technology Alliance international
doc-x0014 external conference Inferring Network Topologies in MANETs Applied to Service Redeployment
  • Simone Silvestri (PSU)
  • Brett Holbert (PSU)
  • Petr Novotny (Imperial)
  • Thomas La Porta (PSU)
  • Alexander Wolf (Imperial)
  • Ananthram Swami (ARL)
Aug-2015 International Conference on Computer Communication and Networks (ICCCN), 2015, Las Vegas, Aug 2015 international with government
doc-x0544 external conference Experiences Deploying a Transparent Split TCP Middlebox and the Implications for NFV
  • Franck Le (IBM US)
  • Erich Nahum (IBM US)
  • Vasilieos Pappas (IBM US)
  • Maroun Touma (IBM US)
  • Dinesh Verma (IBM US)
Aug-2015 Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization (pp. 31-36). ACM. single institute
doc-x0766 external conference Planning over MDPs through Probabilistic HTNs
  • Yuqing Tang (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Simon Parsons (CUNY)
Aug-2015 Proceedings of the AAAI-11 Workshop on Generalized Planning. collaborative
doc-x1054 patent Comparison and search operations on encrypted
  • Graham Bent (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • David Bacon (IBM US)
Aug-2015 GB920150016US1 international
doc-2901 external conference Representative Agents and the Contract Negotiation Cold Start Problem
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
  • Chris Burnett (Aberdeen)
Jul-2015 24th International Joint Conference on Artificial Intelligence, 2015 collaborative
doc-2903 external conference Markov Argumentation Random Fields
  • Yuqing Tang (CMU)
  • Katia Sycara (CMU)
  • Nir Oren (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
Jul-2015 24th International Joint Conference on Artificial Intelligence, 2015 international
doc-2909 external conference Building a "living database" for human-machine intelligence analysis
  • Dave Braines (IBM UK)
  • John Ibbotson (IBM UK)
  • Darren Shaw (IBM UK)
  • Alun Preece (Cardiff)
Jul-2015 18th International Conference on Information FUSION collaborative
doc-x0001 external conference Advances in Network Sciences via Collaborative Multi-Disciplinary Research
  • Dinesh Verma (IBM US)
  • Will Leland (BBN)
  • Tien Pham (ARL)
  • Ananthram Swami (ARL)
  • Greg Cirincione (ARL)
Jul-2015 18th International Conference on Information FUSION collaborative with government
doc-x0024 journal You Can't Get There From Here: Sensor Scheduling with Refocusing Delays
Variants: doc-937
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Matthew Johnson (CUNY)
  • Lance Kaplan (ARL)
  • Thomas La Porta (PSU)
Jul-2015 Wireless Networks, vol. 21, no. 8, pp. 1683-1698, Jul 2015 collaborative with government
doc-x0026 external conference FUSE-BEE: Fusion of Subjective Opinions through Behavior Estimation
  • Murat Sensoy (Aberdeen)
  • Lance Kaplan (ARL)
  • Gonul Ayci
  • Geeth de Mel (IBM US)
Jul-2015 18th International Conference on Information FUSION international with government
doc-x0812 external conference Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework
  • Edelmira Pasarella
  • Jorge Lobo (IBM US)
Jul-2015 Computer Security Foundations Symposium (CSF), 2015 IEEE 28th (pp. 232-242). IEEE collaborative
doc-x0966 external conference Trust metric integration in resource constrained networks via data fusion
  • Thomas Babbitt (RPI)
  • Boleslaw Szymanski (RPI)
Jul-2015 18th International Conference on Information FUSION single institute
doc-2722 external conference Trust Management in Delay Tolerant Networks Utilizing Erasure Coding
  • Thomas Babbitt (RPI)
  • Boleslaw Szymanski (RPI)
Jun-2015 IEEE International Conference on Communications (ICC), 2015 single institute
doc-2773 tech report Inferring Network Topologies in MANETs Applied to Service Deployment
  • Simone Silvestri (PSU)
  • Brett Holbert (PSU)
  • Petr Novotny (Imperial)
  • Thomas La Porta (PSU)
  • Alexander Wolf (Imperial)
  • Ananthram Swami (ARL)
Jun-2015 Pennsylvania State University international
doc-2841 external conference Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs
  • Shiqiang Wang (Imperial)
  • Rahul Urgaonkar (IBM US)
  • Kevin Chan (ARL)
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
  • Kin Leung (Imperial)
Jun-2015 IEEE International Conference on Communications (ICC), 2015 international with government
doc-2889 external conference Fisher Information-based Experiment Design for Network Tomography

Outstanding Student Paper
  • Ting He (IBM US)
  • Chang Liu (UMass)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Theodoros Salonidis (IBM US)
  • Andrei Bejan (Cambridge)
  • Paul Yu (ARL)
Jun-2015 SIGMETRICS Perform. Eval. Rev. 43, 1 (June 2015), 389-402 international with government
doc-2915a external conference Rateless and Pollution-Attack-Resilient Network Coding
  • Wentao Huang
  • Ting Wang (IBM US)
  • Xin Hu (IBM US)
  • Jiyong Jang (IBM US)
  • Theodoros Salonidis (IBM US)
Jun-2015 Information Theory (ISIT), 2015 IEEE International Symposium on (pp. 2623-2627). IEEE collaborative
doc-x0478 external conference Delay Tolerant Harvesting of Monitoring Data for MANET-Hosted Service-Based Systems
  • Petr Novotny (Imperial)
  • Bong Jun Ko (IBM US)
  • Alexander Wolf (Imperial)
Jun-2015 Services Computing (SCC), 2015 IEEE International Conference on (pp. 9-16). IEEE international
doc-x0965 external conference Trust management in resource constraint networks
  • Thomas Babbitt (RPI)
  • Boleslaw Szymanski (RPI)
Jun-2015 10th Annual Symposium on Information Assurance (ASIA'15) (p. 51) single institute
doc-x0967 patent Trustworthiness of processed data
  • Saritha Arunkumar (IBM UK)
  • Stephen Pipes (IBM UK)
  • Mudhakar Srivatsa (IBM US)
Jun-2015 U.S. Patent No. 20,150,156,185 international
doc-x0980 external conference Understanding user behavior via mobile data analysis
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Jun-2015 Communication Workshop (ICCW), 2015 IEEE International Conference on (pp. 1563-1568). IEEE single institute
doc-2635 external conference Argumentation Random Field
  • Yuqing Tang (CMU)
  • Alice Toniolo (Aberdeen)
  • Katia Sycara (CMU)
  • Nir Oren (Aberdeen)
May-2015 Eleventh international workshop on argumentation in multi-agent systems international
doc-2847 external conference Global Approximations for Principal Agent Theory
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
  • Chris Burnett (Aberdeen)
May-2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 collaborative
doc-2860 external conference Strategies for Truth Discovery under Resource Constraints
  • Anthony Etuk (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Murat Sensoy (Aberdeen)
May-2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 single institute
doc-2861 external conference Agent support to reasoning with different types of evidence in intelligence analysis
  • Alice Toniolo (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Anthony Etuk (Aberdeen)
  • Federico Cerutti (Cardiff)
  • Wentao Ouyang (UCLA)
  • Mani Srivastava (UCLA)
  • Nir Oren (Aberdeen)
  • Tim Dropps (Honeywell)
  • John Allen (Honeywell)
  • Paul Sullivan (ARL)
May-2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 international with government
doc-2899 external conference Supporting Situation Understanding For The 2014 Nato Summit Through Human-Information Interaction
  • Alun Preece (Cardiff)
  • Will Webberley (Cardiff)
  • Dave Braines (IBM UK)
May-2015 NATO IST/SET-126 Symposium on Information Fusion (Hard and Soft) for Intelligence, Surveillance & Reconnaissance (ISR) collaborative
doc-2915b external conference Crowdsourcing for Argument Verification in Intelligence Analysis: A Position Paper
  • Alice Toniolo (Aberdeen)
  • Wentao Ouyang (UCLA)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
May-2015 Argumentation in Multi-Agent Systems (ArgMAS), 2015 international
doc-x0009 journal Network Capability in Localizing Node Failures via End-to-end Path Measurements
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
May-2015 IEEE/ACM Transactions on Networking, May 2015, revised Dec 2015 international with government
doc-x0038 external conference Sensor and Information Fusion for Actionable Intelligence at the Tactical Edge
  • Tien Pham (ARL)
  • Geeth de Mel (IBM US)
  • Jim Schoening
  • Bob Ganger
May-2015 NATO IST-SET-126 RSM Symposium on Information Fusion (Hard and Soft) for ISR, Norfolk, VA, May 2015. international with government
doc-x0039 external conference Interest-based Negotiation for Asset Sharing Policies
  • Christos Parizas (Cardiff)
  • Geeth de Mel (IBM US)
  • Alun Preece (Cardiff)
  • Murat Sensoy (Aberdeen)
  • Seraphin Calo (IBM US)
  • Tien Pham (ARL)
May-2015 XIX International Workshop on Coordination, Organizations, Institutions and Norms in Multi-agent Systems Coordination (COIN15), Istanbul, Turkey, May 2015 international with government
doc-x0466 external conference Crowdsourcing for Argument Verification in Intelligence Analysis
  • Alice Toniolo (Aberdeen)
  • Wentao Ouyang (UCLA)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
May-2015 Workshop on Logical Aspects of Multi-Agent Systems (LAMAS 2015) international
doc-x0524 external conference Enabling Intelligence Analysis through Agent-Support: the CISpaces Toolkit
  • Alice Toniolo (Aberdeen)
  • Hengfei Li (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Wentao Ouyang (UCLA)
  • Mani Srivastava (UCLA)
  • Paul Sullivan (ARL)
May-2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 international with government
doc-x0908 external conference Supporting reasoning with different types of evidence in intelligence analysis
  • Alice Toniolo (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Anthony Etuk (Aberdeen)
  • Federico Cerutti (Cardiff)
  • Wentao Ouyang (UCLA)
  • Mani Srivastava (UCLA)
  • Paul Sullivan (ARL)
May-2015 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 international with government
doc-2758 external conference On optimal monitor placement for localizing node failures via network tomography
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
Apr-2015 Performance Evaluation, 91, 16-37 international with government
doc-2793a external conference Optimal multicast in dense multi-channel multi-radio wireless networks
  • Rahul Urgaonkar (IBM US)
  • Prithwish Basu (BBN)
  • Saikat Guha (BBN)
  • Ananthram Swami (ARL)
Apr-2015 IEEE International Conference on Computer Communications (InfoCom), 2015 collaborative with government
doc-2849a external conference Conversational Sensemaking
Variants: doc-2849b
  • Alun Preece (Cardiff)
  • Will Webberley (Cardiff)
  • Dave Braines (IBM UK)
  • Thomas La Porta (PSU)
  • Nan Hu (PSU)
  • Wentao Ouyang (UCLA)
  • Mani Srivastava (UCLA)
Apr-2015 International Society for Optics and Photonics - Defense, Security and Sensing, 2015 international
doc-2850 external conference Tasking the Tweeters: Obtaining Actionable Information from Human Sensors
  • Alun Preece (Cardiff)
  • Will Webberley (Cardiff)
  • Dave Braines (IBM UK)
Apr-2015 International Society for Optics and Photonics - Defense, Security and Sensing, 2015 collaborative
doc-2852 external conference Collaborative human-machine analysis using a Controlled Natural Language
  • David Mott (IBM UK)
  • Don Shemanski (PSU)
  • Cheryl Giammanco (ARL)
  • Dave Braines (IBM UK)
Apr-2015 International Society for Optics and Photonics - Defense, Security and Sensing, 2015 international with government
doc-2857b external conference Detecting Distributed Signature-based Intrusion: The Case of Multi-Path Routing Attacks
  • Jiefei Ma (Imperial)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Apr-2015 IEEE International Conference on Computer Communications (InfoCom), 2015 international
doc-x0079 external conference Computing on encrypted data and its applicability to a coalition operations environment
  • Graham Bent (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • Hamish Hunt (IBM UK)
Apr-2015 International Society for Optics and Photonics - Defense, Security and Sensing, 2015 single institute
doc-x0720 external conference Next place predictions based on user mobility traces
  • Bhaskar Prabhala (PSU)
  • Thomas La Porta (PSU)
Apr-2015 IEEE International Conference on Computer Communications (InfoCom), 2015 single institute
doc-x0898 external conference Spatial and temporal considerations in next place predictions
  • Bhaskar Prabhala (PSU)
  • Thomas La Porta (PSU)
Apr-2015 IEEE International Conference on Computer Communications (InfoCom), 2015 single institute
doc-x1010 external conference The use of visual programming tools and techniques for rapid in field ad-hoc edge of the network situational application integration in a coalition environment
  • Dave Conway-Jones (IBM UK)
Apr-2015 International Society for Optics and Photonics - Defense, Security and Sensing, 2015 single institute
doc-2912 external conference Cognitive and Probabilistic Models of Group Decision Making
  • Yuqing Tang (CMU)
  • Christian Lebiere (CMU)
  • Katia Sycara (CMU)
  • Don Morrison (CMU)
  • Paul Smart (Southampton)
Mar-2015 24th Conference on Behavior Representation in Modeling and Simulation international
doc-2572 external conference Multi-Client Verifiable Computation with Stronger Security Guarantees
  • Samuel Dov Gordon (UMD)
  • Jonathan Katz (UMD)
  • Feng-Hao Liu (UMD)
  • Elaine Shi (UMD)
  • Hong-Sheng Zhou
Feb-2015 Theory of Cryptography (pp. 144-168). Springer Berlin Heidelberg collaborative
doc-2829 phd thesis Truth Discovery under Resource Constraints
  • Anthony Etuk (Aberdeen)
Feb-2015 single institute
doc-2830 external conference Debiasing crowdsourced quantitative characteristics in local businesses and services
  • Wentao Ouyang (UCLA)
  • Lance Kaplan (ARL)
  • Paul Martin (UCLA)
  • Alice Toniolo (Aberdeen)
  • Mani Srivastava (UCLA)
  • Timothy Norman (Aberdeen)
Feb-2015 Proceedings of the 14th International Conference on Information Processing in Sensor Networks (pp. 190-201). ACM international with government
doc-2858 external conference Towards Making Network Function Virtualization a Cloud Computing Service
  • Windhya Rankothge
  • Jiefei Ma (Imperial)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Feb-2015 Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 89-97). IEEE international
doc-2862 external conference GeoSpatial Access Control for Mobile Devices
  • Saritha Arunkumar (IBM UK)
  • Berker Soyluoglu (CUNY)
  • Murat Sensoy (Aberdeen)
  • Mudhakar Srivatsa (IBM US)
  • Muttukrishnan Rajarajan
Feb-2015 Region 10 Symposium (TENSYMP), 2015 IEEE (pp. 86-89). IEEE international
doc-2884 invited talk Knowledge-based Security
  • Piotr Mardziel (UMD)
  • Mike Hicks (UMD)
  • Mudhakar Srivatsa (IBM US)
Feb-2015 collaborative
doc-2891 external conference Access Control in Publicly Verifiable Outsourced Computation
  • James Alderman (RHUL)
  • Christian Janson (RHUL)
  • Carlos Cid (RHUL)
  • Jason Crampton (RHUL)
Feb-2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 657-662). ACM single institute
doc-2892 tech report Revocation in Publicly Verifiable Outsourced Computation
Variants: doc-2866
  • James Alderman (RHUL)
  • Christian Janson (RHUL)
  • Carlos Cid (RHUL)
  • Jason Crampton (RHUL)
Feb-2015 Crypto Archives single institute
doc-2893 external conference Picking v.s. Guessing Secrets: A Game-Theoretic Analysis
  • Arman Khouzani (RHUL)
  • Piotr Mardziel (UMD)
  • Carlos Cid (RHUL)
  • Mudhakar Srivatsa (IBM US)
Feb-2015 Computer Security Foundations Symposium (CSF), 2015 IEEE 28th (pp. 243-257). IEEE international
doc-2900 external conference When is Lying the Right Choice?
  • Federico Cerutti (Cardiff)
  • Artemis Parvizi (Aberdeen)
  • Alice Toniolo (Aberdeen)
  • Dave Braines (IBM UK)
  • Geeth de Mel (IBM US)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Gavin Pearson (DSTL)
  • Stephen Pipes (IBM UK)
  • Paul Sullivan (ARL)
Feb-2015 Language and Ontologies, 43 international with government
doc-2902 tech report Results of Experimental Realization of Inference Management Firewall on Information Fabric
  • Stephen Pipes (IBM UK)
  • Federico Cerutti (Cardiff)
  • Alice Toniolo (Aberdeen)
  • Paul Sullivan (ARL)
Feb-2015 international
doc-2904 external conference Dynamic Service Migration in Mobile Edge-Clouds
  • Shiqiang Wang (Imperial)
  • Rahul Urgaonkar (IBM US)
  • Murtaza Zafer (IBM US)
  • Ting He (IBM US)
  • Kevin Chan (ARL)
  • Kin Leung (Imperial)
Feb-2015 In IFIP Networking Conference (IFIP Networking), 2015 (pp. 1-9). IEEE international with government
doc-2905 journal Online Workload Placement with Provable Performance Guarantees in Cloud Environments
  • Shiqiang Wang (Imperial)
  • Murtaza Zafer (IBM US)
  • Kin Leung (Imperial)
Feb-2015 IEEE Transactions on Parallel and Distributed Systems international
doc-2906 external conference An online method for minimizing network monitoring overhead
  • Simone Silvestri (PSU)
  • Rahul Urgaonkar (IBM US)
  • Murtaza Zafer (IBM US)
  • Bong Jun Ko (IBM US)
Feb-2015 Distributed Computing Systems (ICDCS), 2015 IEEE 35th International Conference on (pp. 268-277). IEEE collaborative
doc-2908 tech report Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks
Variants: doc-x0869
  • Nan Hu (PSU)
  • Thomas La Porta (PSU)
  • Novella Bartolini
Feb-2015 PSU Tech Report collaborative
doc-2911 book chapter Integrating ACT-R Cognitive Models with the Unity Game Engine
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
Feb-2015 IGI Global, Hershey, Pennsylvania, USA international
doc-2916 journal Partial Observable Update for Subjective Logic and Its Application for Trust Estimation
  • Lance Kaplan (ARL)
  • Murat Sensoy (Aberdeen)
  • Supriyo Chakraborty (UCLA)
  • Geeth de Mel (IBM US)
Feb-2015 Information Fusion international with government
doc-2895 tech report Examples of Natural Deduction
  • David Mott (IBM UK)
Jan-2015 single institute
doc-x0058 external conference Place Recognition and Topological Map Learning in a Virtual Cognitive Robot
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
2015 17th International Conference on Artificial Intelligence, Las Vegas, Nevada, USA. international
doc-x0059 external conference Situating Cognition within the Virtual World
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
2015 6th International Conference on Applied Human Factors and Ergonomics, Las Vegas, Nevada, USA. international
doc-x0469 patent Data collection from networked devices
  • Seraphin Calo (IBM US)
  • Raheleh Dilmaghani (IBM US)
  • Douglas Freimuth (IBM US)
  • Raghu Ganti (IBM US)
  • Keith Grueneberg (IBM US)
  • Fan Ye (IBM US)
2015 U.S. Patent No. 8,935,368. Washington, DC: U.S. Patent and Trademark Office. Chicago single institute
doc-x0559 journal Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
2015 Journal of Network and Systems Management, 23(3), 753-793. single institute
doc-x0586 external conference Handling Uncertainty: An Extension of DL-Lite with Subjective Logic
  • Jhonatan Garcia (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
  • Katia Sycara (CMU)
  • Yuqing Tang (CMU)
  • Federico Cerutti (Cardiff)
2015 Proc. of 28th International Workshop on Description Logics (DL 2015) international
doc-x0588 external conference Hardness of learning problems over Burnside groups of exponent 3
  • Nelly Fazio (CUNY)
  • Kevin Iga
  • Antonio Nicolosi
  • Ludovic Perret
  • William Skeith (CUNY)
2015 Designs, Codes and Cryptography, 75(1), 59-70. collaborative
doc-x0678 journal Minimum congestion mapping in a cloud
Variants: doc-x0677
  • Nikhil Bansal (IBM US)
  • Kang-won Lee (IBM US)
  • Viswanath Nagarajan (IBM US)
  • Murtaza Zafer (IBM US)
2015 SIAM Journal on Computing, 44(3), 819-843 single institute
doc-x0705 patent Multi-tier indexing methodology for scalable mobile device data collection
  • Seraphin Calo (IBM US)
  • Raheleh Dilmaghani (IBM US)
  • Douglas Freimuth (IBM US)
  • Raghu Ganti (IBM US)
  • Fan Ye (IBM US)
2015 U.S. Patent No. 9,014,161. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0732 tech report On markov argumentation random fields
Variants: doc-2779
  • Yuqing Tang (CMU)
  • Nir Oren (Aberdeen)
  • Alice Toniolo (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
  • Katia Sycara (CMU)
2015 Technical report, ITACS (https://www.usukitacs. com/node/2903). international
doc-x0743 journal On-demand discovery of software service dependencies in MANETs
  • Petr Novotny (Imperial)
  • Bong Jun Ko (IBM US)
  • Alexander Wolf (Imperial)
2015 Network and Service Management, IEEE Transactions on, 12(2), 278-292. international
doc-x0764 tech report Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report)
  • Arman Khouzani (RHUL)
  • Piotr Mardziel (UMD)
  • Carlos Cid (RHUL)
  • Mudhakar Srivatsa (IBM US)
2015 arXiv preprint arXiv:1505.02325. international
doc-x0806 patent Rate adaptive transmission of wireless broadcast packets
  • Donnie Kim (UCLA)
  • Kang-won Lee (IBM US)
  • Ramya Raghavendra (IBM US)
  • Yang Song (IBM US)
  • Starsky Wong (IBM US)
2015 U.S. Patent No. 9,173,071. Washington, DC: U.S. Patent and Trademark Office collaborative
doc-x0809 external conference Rateless Pollution-Attack-Resilient Network Coding for Data Streams in Hybrid Coalition Networks
  • Wentao Huang
  • Ting Wang (IBM US)
  • Xin Hu (IBM US)
  • Jiyong Jang (IBM US)
  • Theodoros Salonidis (IBM US)
2015 IEEE International Symposium on Information Theory (ISIT) (p. 1) collaborative
doc-x0827 patent Reliable multicast broadcast in wireless networks
  • Kang-won Lee (IBM US)
  • Ramya Raghavendra (IBM US)
  • Yang Song (IBM US)
  • Starsky Wong (IBM US)
2015 U.S. Patent No. 9,059,847. Washington, DC: U.S. Patent and Trademark Office single institute
doc-x1044 journal netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks
Variants: doc-1753
  • Srikar Tati (PSU)
  • Scott Rager (PSU)
  • Bong Jun Ko (IBM US)
  • Guohong Cao (PSU)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
2015 IEEE Trans. Dependable & Secure Computing, 2015 collaborative with government
doc-2872 external conference Lightweight Authentication of Freshness in Outsourced Key-Value Stores
  • Yuzhe Tang
  • Ting Wang (IBM US)
  • Ling Liu
  • Xin Hu (IBM US)
  • Jiyong Jang (IBM US)
Dec-2014 Proceedings of the 30th Annual Computer Security Applications Conference (pp. 176-185). ACM collaborative
doc-2894 tech report Experimentation on Controlled English based on Logic Reasoning
  • David Mott (IBM UK)
Dec-2014 single institute
doc-2914 journal Declarative Framework for Specification, Simulation and Analysis of Distributed Applications
  • Jiefei Ma (Imperial)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Dec-2014 IEEE Transactions on Knowledge and Data Engineering international
doc-2726 external conference Node Failure Localization via Network Tomography
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
  • Jessica Lowe (DSTL)
Nov-2014 Proceedings of the 2014 Conference on Internet Measurement Conference (pp. 195-208). ACM international with government
doc-2764b journal Reasoning with Streamed Uncertain Information from Unreliale Resources
  • Saritha Arunkumar (IBM UK)
  • Murat Sensoy (Aberdeen)
  • Mudhakar Srivatsa (IBM US)
  • Muttukrishnan Rajarajan
Nov-2014 Expert Systems with Applications 42.22 (2015): 8381-8392. international
doc-2765b journal A review paper on Preserving Privacy in Mobile Environments
  • Saritha Arunkumar (IBM UK)
  • Muttukrishnan Rajarajan
  • Mudhakar Srivatsa (IBM US)
Nov-2014 Journal of Network and Computer Applications 53 (2015): 74-90. international
doc-2768 external conference MSPlayer: Multi-Source and multi-Path LeverAged YoutubER
  • Yung-Chih Chen (UMass)
  • Don Towsley (UMass)
  • Ramin Khalili (UMass)
Nov-2014 Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 263-270). ACM single institute
doc-2782 tech report Human-Information Interaction (peer review report)
  • David Mott (IBM UK)
  • Ping Xue
  • Ann Copestake (Cambridge)
  • Paul Smart (Southampton)
  • Alun Preece (Cardiff)
  • Dave Braines (IBM UK)
  • Katia Sycara (CMU)
Nov-2014 international
doc-2833 tech report More complex semantics in ELICIT sentences
  • David Mott (IBM UK)
Nov-2014 single institute
doc-2834 tech report Solving the Three Ties Problem in Controlled English
  • David Mott (IBM UK)
Nov-2014 single institute
doc-2835 demo AFM 2014 demonstration of fact extraction and NL processing
  • David Mott (IBM UK)
  • Ping Xue
Nov-2014 international
doc-2836 tech report Rich Explanation when performing CE reasoning
  • David Mott (IBM UK)
Nov-2014 single institute
doc-2840 workshop The Analysis Game (workshop presentation)
  • David Mott (IBM UK)
Nov-2014 8th Annual Fall Meeting of the International Technology Alliance single institute
doc-2843 journal Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation
  • Qiang Zeng (PSU)
  • Mingyi Zhao (PSU)
  • Peng Liu (PSU)
  • Poonam Yadav (IBM US)
  • Seraphin Calo (IBM US)
  • Jorge Lobo (IBM US)
Nov-2014 IEEE Transactions on Data and Knowledge Engineering collaborative
doc-2848 external conference An Inference Management Architecture for Risk-Aware Data Sharing in Mobile Networks
  • Stephen Pipes (IBM UK)
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
Nov-2014 ICPADS 2014 international
doc-2851 tech report Markov Argumentation Random Fields-based Linchpin Sensitivity Analysis
  • Yuqing Tang (CMU)
  • Katia Sycara (CMU)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
Nov-2014 usukitacs.com international
doc-2856 tech report On the zero-additional leak privacy of location traces using model-based falsification of data
  • Supriyo Chakraborty (UCLA)
  • Yasser Shoukry (UCLA)
  • Mani Srivastava (UCLA)
Nov-2014 usukitacs.com single institute
doc-2863 external conference GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation

Best paper award
  • Chang Liu (UMass)
  • Austin Harris
  • Martin Maas
  • Mike Hicks (UMD)
  • Mohit Tiwari
  • Elaine Shi (UMD)
Nov-2014 Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 87-101). ACM collaborative
doc-2866 external conference Revocation in Publicly Verifiable Outsourced Computation
Variants: doc-2892
  • James Alderman (RHUL)
  • Christian Janson (RHUL)
  • Carlos Cid (RHUL)
  • Jason Crampton (RHUL)
Nov-2014 Information Security and Cryptology (pp. 51-71). Springer International Publishing single institute
doc-x0889 external conference Social spring: encounter-based path refinement for indoor tracking systems
  • Paul Martin (UCLA)
  • Yasser Shoukry (UCLA)
  • Prashanth Swaminathan (UCLA)
  • Wentao Ouyang (UCLA)
  • Mani Srivastava (UCLA)
Nov-2014 Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings (pp. 156-159). ACM. single institute
doc-2624 external conference Location Privacy - Where to Enforce?
  • Saritha Arunkumar (IBM UK)
  • Mudhakar Srivatsa (IBM US)
  • Muttukrishnan Rajarajan
Oct-2014 IEEE Military Communications Conference, 2014 international
doc-2669a external conference Mobility-Induced Service Migration in Mobile Micro-Clouds
  • Shiqiang Wang (Imperial)
  • Rahul Urgaonkar (IBM US)
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
  • Kevin Chan (ARL)
  • Kin Leung (Imperial)
Oct-2014 IEEE Military Communications Conference, 2014 international with government
doc-2677 external conference Representing Uncertainty in CE
  • Ping Xue
  • Stephen Poteet
  • Anne Kao
  • David Mott (IBM UK)
  • Cheryl Giammanco (ARL)
Oct-2014 IEEE Military Communications Conference, 2014 international with government
doc-2721 external conference Dynamic Policy Enforcement using Restriction Set Theoretic Expressions (RSTE)
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
Oct-2014 IEEE Military Communications Conference, 2014 single institute
doc-2724 external conference Optimal Caching and Routing in Hybrid Networks
  • Mostafa Dehghan (UMass)
  • Anand Seetharam (UMass)
  • Ting He (IBM US)
  • Theodoros Salonidis (IBM US)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Oct-2014 IEEE Military Communications Conference, 2014 collaborative
doc-x0040 external conference Distributed Decision Making at the Tactical Edge: An Agile Hybrid Human-Machine Processing Approach
  • Dave Braines (IBM UK)
  • Geeth de Mel (IBM US)
  • Tien Pham (ARL)
  • Alun Preece (Cardiff)
Oct-2014 2014 Military Sensing Symposium BAMS, Springfield, VA, Oct 2014. international with government
doc-x0614 patent Increasing resilience of a network service
  • Dipyaman Banerjee
  • Venkateshwara Madduri
  • Mudhakar Srivatsa (IBM US)
Oct-2014 U.S. Patent No. 8,869,035 collaborative
doc-2569c internal conference Conversational Sensing
Variants: doc-2569a
  • Alun Preece (Cardiff)
  • Chris Gwilliams (Cardiff)
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Dave Braines (IBM UK)
  • Jon Bakdash (ARL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2670 external conference Obfuscation of Semantic Data: Restricting the Spread of Sensitive Information
  • Federico Cerutti (Cardiff)
  • Geeth de Mel (IBM US)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Artemis Parvizi (Aberdeen)
  • Paul Sullivan (ARL)
  • Alice Toniolo (Aberdeen)
Sep-2014 Description Logics (pp. 434-446) international with government
doc-2703 external conference Argumentation-based collaborative intelligence analysis in CISpaces
  • Alice Toniolo (Aberdeen)
  • Tim Dropps (Honeywell)
  • Wentao Ouyang (UCLA)
  • John Allen (Honeywell)
  • Daniel Johnson (Honeywell)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Mani Srivastava (UCLA)
Sep-2014 Fifth International Conference on Computational Models of Argumentation (COMMA) (pp. 481-482) international
doc-2745 internal conference Cognitive Architectures and Virtual Worlds: Integrating ACT-R with the XNA Framework
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
  • Christian Lebiere (CMU)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2746 internal conference Socially-Distributed Cognition and Cognitive Architectures: Towards an ACT-R-Based Cognitive Social Simulation Capability
  • Paul Smart (Southampton)
  • Yuqing Tang (CMU)
  • Paul Stone (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2748 internal conference Challenges solved and unsolved in Fact Extraction from Natural Language
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
  • Ann Copestake (Cambridge)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2753 internal conference Representing Natural Language Expressions of Uncertainty in CE
  • Ping Xue
  • Stephen Poteet
  • David Mott (IBM UK)
  • Cheryl Giammanco (ARL)
  • Anne Kao
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2754 internal conference Investigating the use of distributional semantics to expand domain vocabulary
  • Diarmuid O'Seaghdha (Cambridge)
  • Ann Copestake (Cambridge)
  • David Mott (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2756 internal conference Reasoning under Uncertainty in Controlled English: an Argumentation-based Perspective
  • Federico Cerutti (Cardiff)
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Stephen Pipes (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2759 tech report The Project 4 integrated demonstration
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
Sep-2014 single institute
doc-2760 internal conference Beyond the graph: Telling the story with PROV and Controlled English
  • Darren Richardson (Southampton)
  • Luc Moreau (Southampton)
  • David Mott (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2762 internal conference Applying Human-Information Interaction Techniques to Assess Community Impacts of the 2014 NATO Summit
  • Alun Preece (Cardiff)
  • Will Webberley (Cardiff)
  • Irena Spasic (Cardiff)
  • Martin Innes (Cardiff)
  • Colin Roberts (Cardiff)
  • Sarah Tucker (Cardiff)
  • Dave Braines (IBM UK)
  • Darren Shaw (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2763 internal conference Modeling Uncertainty in Controlled Natural Language for Crowdsourcing
  • Wentao Ouyang (UCLA)
  • Dave Braines (IBM UK)
  • Alun Preece (Cardiff)
  • Mani Srivastava (UCLA)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2767 internal conference Ontology-Based Data Access over Subjective Ontologies
  • Jhonatan Garcia (Aberdeen)
  • Achille Fokoue (IBM US)
  • Jeff Pan (Aberdeen)
  • Katia Sycara (CMU)
  • Yuqing Tang (CMU)
  • Federico Cerutti (Cardiff)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2770 internal conference Managing Information Sharing in Coalitions through Credible Obfuscation
Variants: doc-x0661
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
  • Geeth de Mel (IBM US)
  • Lance Kaplan (ARL)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Stephen Pipes (IBM UK)
  • Murat Sensoy (Aberdeen)
  • Mani Srivastava (UCLA)
  • Paul Sullivan (ARL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2772 internal conference Optimal Monitor Selection using Measurement Correlation
  • Simone Silvestri (PSU)
  • Rahul Urgaonkar (IBM US)
  • Murtaza Zafer (IBM US)
  • Bong Jun Ko (IBM US)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2774 internal conference On the Impacts of Information Sharing
  • Yuqing Tang (CMU)
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2775 internal conference Inference Management in the Experimentation Framework
  • Stephen Pipes (IBM UK)
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2779 internal conference On Markov Argumentation Random Fields
Variants: doc-x0732
  • Yuqing Tang (CMU)
  • Nir Oren (Aberdeen)
  • Alice Toniolo (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
  • Katia Sycara (CMU)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2780 internal conference Civil-Military Domain Modeling in Controlled English
  • Cheryl Giammanco (ARL)
  • David Mott (IBM UK)
  • Ray McGowan (ARL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2781 internal conference Practical Applications of Controlled English in a Tactical Environment
  • Jonathan Theiss
  • Michael Shares
  • Dave Braines (IBM UK)
  • John Ibbotson (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2783 internal conference An Offline Optimal SPARQL Query Planning Approach to Evaluate Online Heuristic Planners
Variants: doc-2685
  • Achille Fokoue (IBM US)
  • Mihaela Bornea (IBM US)
  • Julian Dolby (IBM US)
  • Kavitha Srinivas (IBM US)
  • Yuqing Tang (CMU)
  • Katia Sycara (CMU)
  • Jeff Pan (Aberdeen)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2784 internal conference Dynamic Service Placement in Hybrid Wireless Networks
  • Petr Novotny (Imperial)
  • Rahul Urgaonkar (IBM US)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2785 internal conference Dynamic Multi-Layer Management of Service Based Systems in Hybrid Wireless Networks
  • Petr Novotny (Imperial)
  • Syed Shah (RPI)
  • Christos Parizas (Cardiff)
  • Alexander Wolf (Imperial)
  • Boleslaw Szymanski (RPI)
  • Alun Preece (Cardiff)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2786 internal conference Delay Tolerant Harvesting of Monitoring Data in Mobile Ad Hoc Networks
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2787 internal conference Assessing the credibility of information in collaborative intelligence analysis
  • Alice Toniolo (Aberdeen)
  • Wentao Ouyang (UCLA)
  • Tim Dropps (Honeywell)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
  • John Allen (Honeywell)
  • Geeth de Mel (IBM US)
  • Paul Sullivan (ARL)
  • Scott Mastin (ARL)
  • Gavin Pearson (DSTL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2788 internal conference Source Selection and Fusion in Resource-Constrained Environments
  • Anthony Etuk (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Mudhakar Srivatsa (IBM US)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2792 internal conference An approach to argumentation-based reasoning under uncertainty
  • Hengfei Li (Aberdeen)
  • Alice Toniolo (Aberdeen)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance single institute
doc-2794 internal conference Understanding the Information Flow Dynamics in Coalition Networks: A Game Theoretic Analysis
  • Supriyo Chakraborty (UCLA)
  • Federico Cerutti (Cardiff)
  • Mani Srivastava (UCLA)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2796 internal conference Accountability as a Service
  • Alun Preece (Cardiff)
  • Boleslaw Szymanski (RPI)
  • John Ibbotson (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2798 internal conference Multi-layer Human-in-the-loop Service Management Utilizing Rule-based Policies and Set Theoretic Expressions
  • Syed Shah (RPI)
  • Christos Parizas (Cardiff)
  • Geeth de Mel (IBM US)
  • Boleslaw Szymanski (RPI)
  • Alun Preece (Cardiff)
  • Dominic Harries (IBM UK)
  • John Ibbotson (IBM UK)
  • Stephen Pipes (IBM UK)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2804 internal conference Assessing the Applicability of Commercial Cloud Distributed Processing Techniques to Mobile Micro-Cloud Deployments
  • Adele Freeman (Roke)
  • Katy Warr (Roke)
  • Howard Tripp (Roke)
  • Shiqiang Wang (Imperial)
  • Kin Leung (Imperial)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2810 internal conference A security model for micro-cloud technology in hybrid tactical environments,
  • Howard Tripp (Roke)
  • Katy Warr (Roke)
  • Adele Freeman (Roke)
  • Peng Liu (PSU)
  • Shiqiang Wang (Imperial)
  • Kin Leung (Imperial)
  • Jorge Lobo (IBM US)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2811 internal conference Mobile Micro-Cloud Scenario: Distributed Application Deployment to Track and Intercept a Vehicle of Interest
  • Katy Warr (Roke)
  • Howard Tripp (Roke)
  • Adele Freeman (Roke)
  • Paul Sullivan (ARL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2837 internal conference Node Failure Localization in Communication Networks via Network Tomography
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
  • Jessica Lowe (DSTL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2838 internal conference Experiment Design for Link Loss Tomography
  • Chang Liu (UMass)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Theodoros Salonidis (IBM US)
  • Andrei Bejan (Cambridge)
  • Paul Yu (ARL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2839 internal conference Monitor Placement for Maximizing Network Identifiability via End-to-end Path Measurements
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2842 internal conference Authorization Information Leakage Control in Collaborative Distributed Query Processing
  • Mingyi Zhao (PSU)
  • Peng Liu (PSU)
  • Fan Ye (IBM US)
  • Jorge Lobo (IBM US)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2844 internal conference Improving Energy Efficiency of MPTCP
  • Yeon-sup Lim (UMass)
  • Yung-Chih Chen (UMass)
  • Erich Nahum (IBM US)
  • Don Towsley (UMass)
  • Richard Gibbens (Cambridge)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2845 internal conference On Enhancing Multipath Data Transport via Traffic Splitting
  • Andrei Bejan (Cambridge)
  • Adele Freeman (Roke)
  • Richard Gibbens (Cambridge)
  • Robert Hancock (Roke)
  • Don Towsley (UMass)
  • Howard Tripp (Roke)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2846 internal conference MSPlayer: Multi-Source Multi-Path Video Streaming
  • Yung-Chih Chen (UMass)
  • Don Towsley (UMass)
  • Ramin Khalili (UMass)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance single institute
doc-2853 internal conference Robust Multicast in Mobility-induced Dynamic Networks
  • Saikat Guha (BBN)
  • Prithwish Basu (BBN)
  • Don Towsley (UMass)
  • Andrei Bejan (Cambridge)
  • Richard Gibbens (Cambridge)
  • Ananthram Swami (ARL)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-2870 internal conference Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks
  • Mostafa Dehghan (UMass)
  • Anand Seetharam (UMass)
  • Ting He (IBM US)
  • Theodoros Salonidis (IBM US)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
  • Bo Jiang (UMass)
  • Ramesh Sitaraman (UMass)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2871 internal conference Adaptive stream query planning for hybrid coalition networks
  • Daniel O'Keeffe (Imperial)
  • Theodoros Salonidis (IBM US)
  • Peter Pietzuch (Imperial)
Sep-2014 8th Annual Fall Meeting of the International Technology Alliance international
doc-x0015 external conference A distributed, energy-efficient and QoI-aware framework for in-network processing
  • Sepideh Nazemi (Imperial)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
Sep-2014 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2014 international with government
doc-x0922 patent Techniques for Policy Aware Service Composition
  • Seraphin Calo (IBM US)
  • Raheleh Dilmaghani (IBM US)
  • Keith Grueneberg (IBM US)
  • Jorge Lobo (IBM US)
  • Jiaying Xu
  • Petros Zerfos (IBM US)
Sep-2014 U.S. Patent Application No. 13/769,469 collaborative
doc-x0988 patent Using penalty and reward to aggregate data to assess trust
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
Sep-2014 U.S. Patent No. 8,825,577 single institute
doc-2126 journal Improving Coalition Planning by Making Plans Alive
  • Jitu Patel (DSTL)
  • Michael Dorneich
  • David Mott (IBM UK)
  • Ali Bahrami
  • Cheryl Giammanco (ARL)
Aug-2014 IEEE Intelligent Systems international with government
doc-2637 external conference Truth Discovery in Crowdsourced Detection of Spatial Events
  • Wentao Ouyang (UCLA)
  • Mani Srivastava (UCLA)
  • Alice Toniolo (Aberdeen)
  • Timothy Norman (Aberdeen)
Aug-2014 Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 461-470). ACM international
doc-2685 external conference An Offline Optimal SPARQL Query Planning Approach to Evaluate Online Heuristic Planners
Variants: doc-2783
  • Achille Fokoue (IBM US)
  • Mihaela Bornea (IBM US)
  • Julian Dolby (IBM US)
  • Anastasios Kementsietsidis (IBM US)
  • Kavitha Srinivas (IBM US)
Aug-2014 Web Information Systems Engineering-WISE 2014 (pp. 480-495). Springer International Publishing single institute
doc-2689 external conference Data De-anonymization: From Mobility Traces to Online Social Networks
  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa (IBM US)
  • Jing He
  • Raheem Beyah
Aug-2014 ISC 2014 collaborative
doc-2694 external conference ALITHEIA: Towards Practical Verifiable Graph Processing
  • Yupeng Zhang (UMD)
  • Charalampos Papamanthou (UMD)
  • Jonathan Katz (UMD)
Aug-2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 856-867). ACM single institute
doc-2702 external conference Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an Empirical Evaluation
  • Federico Cerutti (Cardiff)
  • Nava Tintarev (Aberdeen)
  • Nir Oren (Aberdeen)
Aug-2014 ECAI 2014 (pp. 207-212) collaborative
doc-2719 external conference How Green is Multipath TCP for Mobile Devices?
  • Yeon-sup Lim (UMass)
  • Yung-Chih Chen (UMass)
  • Erich Nahum (IBM US)
  • Don Towsley (UMass)
  • Richard Gibbens (Cambridge)
Aug-2014 Proceedings of the 4th workshop on All things cellular: operations, applications, & challenges (pp. 3-8). ACM international
doc-2730 external conference Efficiently Verifiable Computation on Encrypted Data
  • Dario Fiore
  • Rosario Gennaro (CUNY)
  • Valerio Pastro (CUNY)
Aug-2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 844-855). ACM collaborative
doc-2743 external conference Quantifying Herding Effects in Crowd Wisdom
  • Ting Wang (IBM US)
  • Dashun Wang (IBM US)
  • Fei Wang (IBM US)
Aug-2014 Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1087-1096). ACM single institute
doc-2744 external conference Structural Data De-anonymization: Quantification, Practice, and Implications
  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa (IBM US)
  • Raheem Beyah
Aug-2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 1040-1053). ACM collaborative
doc-2752 tech report Solving the Analysis Game with Controlled English
  • David Mott (IBM UK)
Aug-2014 single institute
doc-2757 poster Fact Extraction and Reasoning using ITA Controlled English (Poster for CNL14)
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Ann Copestake (Cambridge)
Aug-2014 CNL14 international
doc-2766 external conference Adversary Gain vs. Defender Loss in Quantified Information Flow
  • Piotr Mardziel (UMD)
  • Mario Alvim
  • Mike Hicks (UMD)
Aug-2014 Proceedings of the International Workshop on Foundations of Computer Security (FCS) collaborative
doc-2776 demo Multitiered Inference Management for Context-Aware Information Masking
  • Stephen Pipes (IBM UK)
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
Aug-2014 international
doc-2778 tech report Initial Realization of Inference Management in Information Fabric
  • Stephen Pipes (IBM UK)
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
Aug-2014 international
doc-x0010 journal Inferring Link Metrics from End-to-End Path Measurements: Identifiability and Monitor Placement
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Aug-2014 IEEE/ACM Transactions on Networking, 22(4), 1351-1368 international with government
doc-x0786 patent Propagating a query in a federated database
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • John Ibbotson (IBM UK)
Aug-2014 U.S. Patent No. 8,812,535. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-2574 external conference Trust Estimation and Fusion of Uncertain Information by Exploiting Consistency
  • Lance Kaplan (ARL)
  • Murat Sensoy (Aberdeen)
  • Geeth de Mel (ARL)
Jul-2014 17th International Conference on Information FUSION international with government
doc-2675 external conference Natural Language Fact Extraction and Domain Reasoning using Controlled English
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Ann Copestake (Cambridge)
Jul-2014 10th Annual DELPH-IN Summit, Tomar, Portugal international
doc-2697 external conference Enabling CoIST Users: D2D at the Network Edge
  • Dave Braines (IBM UK)
  • Alun Preece (Cardiff)
  • Geeth de Mel (IBM US)
  • Tien Pham (ARL)
Jul-2014 17th International Conference on Information FUSION international with government
doc-2723 journal Towards Relevancy Aware Service Oriented Systems in WSNs
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Christopher Gibson (IBM UK)
Jul-2014 Services Computing, IEEE Transactions on (Vol 7, Issue 4, 2014) international
doc-2791 external conference Scalable Routing for Tag-Based Information-Centric Networking
  • Michele Paplini
  • Antonio Carzaniga
  • Koorosh Khazaei
  • Alexander Wolf (Imperial)
Jul-2014 Proceedings of the 1st international conference on Information-centric networking (pp. 17-26). ACM collaborative
doc-x0913 patent System and method for secure information sharing with untrusted recipients
  • Janusz Marecki (IBM US)
  • Mudhakar Srivatsa (IBM US)
Jul-2014 U.S. Patent No. 8,793,211 single institute
doc-2571 external conference Soldier Decision-Making for Allocation of Intelligence, Surveillance, and Reconnaissance Assets
  • Jon Bakdash (ARL)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
Jun-2014 International Command and Control Research Technology Symposium (ICCRTS), 2014 international with government
doc-2619 external conference Towards a Cognitively Realistic Computational Model of Team Problem Solving Using ACT-R Agents and the ELICIT Experimentation Framework
  • Paul Smart (Southampton)
  • Darren Richardson (Southampton)
  • Katia Sycara (CMU)
  • Yuqing Tang (CMU)
Jun-2014 International Command and Control Research Technology Symposium (ICCRTS), 2014 international
doc-2687 external conference CISpaces, towards a system for online collaborative argument construction and debate
  • Alice Toniolo (Aberdeen)
  • Wentao Ouyang (UCLA)
  • Tim Dropps (Honeywell)
  • John Allen (Honeywell)
  • Daniel Johnson (Honeywell)
  • Geeth de Mel (IBM US)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Mani Srivastava (UCLA)
Jun-2014 Proceedings of the First International Workshop on Arguing on the Web 2.0, 2014 international with government
doc-2716 external conference On Bufferbloat and Delay Analysis of MultiPath TCP in Wireless Networks
  • Yung-Chih Chen (UMass)
  • Don Towsley (UMass)
Jun-2014 Networking Conference, 2014 IFIP (pp. 1-9). IEEE single institute
doc-x0035 external conference Layered Percolation
  • Saikat Guha (BBN)
  • Don Towsley (UMass)
  • Cagatay Capar (UMass)
  • Ananthram Swami (ARL)
  • Prithwish Basu (BBN)
Jun-2014 NetSci 2014 collaborative with government
doc-2502b invited talk Authenticated Data Structures, Generically
Variants: doc-2502a
  • Jonathan Katz (UMD)
May-2014 single institute
doc-2559 journal Subjective Logic Operators in Trust Assessment: an Empirical Study
  • Federico Cerutti (Cardiff)
  • Lance Kaplan (ARL)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Alice Toniolo (Aberdeen)
May-2014 Information Systems Frontiers Journal international with government
doc-2560a journal Reasoning about the Impacts of Information Sharing
  • Yuqing Tang (CMU)
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
  • Chatschik Bisdikian (IBM US)
May-2014 Information Systems Frontiers 17.4 (2015): 725-742. international
doc-2563 external conference Using Cognitive Architectures to Study Issues in Team Cognition in a Complex Task Environment
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
  • Yuqing Tang (CMU)
May-2014 International Society for Optics and Photonics - Defense, Security and Sensing, 2014 international
doc-2565d invited talk WYSTERIA: A Programming Language for Generic, Mixed-Mode Multiparty Computations
Variants: doc-x1001
  • Mike Hicks (UMD)
May-2014 single institute
doc-2569a external conference Conversational Sensing
Variants: doc-2569c
  • Alun Preece (Cardiff)
  • Chris Gwilliams (Cardiff)
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Jon Bakdash (ARL)
  • Dave Braines (IBM UK)
May-2014 International Society for Optics and Photonics - Defense, Security and Sensing, 2014 international with government
doc-2570 external conference Agile Sensor Tasking for COIST using Natural Language Knowledge Representation and Reasoning
  • Dave Braines (IBM UK)
  • Geeth de Mel (IBM US)
  • Chris Gwilliams (Cardiff)
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Flavio Bergamaschi (IBM UK)
  • Alun Preece (Cardiff)
May-2014 International Society for Optics and Photonics - Defense, Security and Sensing, 2014 collaborative with government
doc-2576 external conference Sharing Policies for Multi-Partner Asset Management in Smart Environments
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
May-2014 NOMS 2014 international
doc-2613 external conference Multi-Input Functional Encryption
  • Dov Gordon
  • Jonathan Katz (UMD)
  • Feng-Hao Liu (UMD)
  • Elaine Shi (UMD)
  • Hong-Sheng Zhou
May-2014 IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014 collaborative
doc-2618 external conference Cognitive Social Simulation and Collective Sensemaking: An Approach Using the ACT-R Cognitive Architecture
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
May-2014 6th International Conference on Advanced Cognitive Technologies and Applications (COGNITIVE 2014), Venice, IT, 25 - 29 May 2014. 10pp international
doc-2629 external conference Making informed decisions with provenance and argumentation schemes
  • Alice Toniolo (Aberdeen)
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
May-2014 Argumentation in Multi-Agent Systems (ArgMAS), 2014 international
doc-2660 external conference Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation
  • Xin Hu (IBM US)
  • Ting Wang (IBM US)
  • Marc Stoecklin (IBM US)
  • Douglas Schales (IBM US)
  • Jiyong Jang (IBM US)
  • Reiner Sailer (IBM US)
May-2014 Security and Privacy Workshops (SPW), 2014 IEEE (pp. 61-64). IEEE single institute
doc-2676 tech report ITA Controlled English and its applications
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Ping Xue
  • Stephen Poteet
May-2014 ITACS international
doc-2688 external conference Automating Efficient RAM-Model Secure Computation
  • Chang Liu (UMass)
  • Yan Huang (UMD)
  • Elaine Shi (UMD)
  • Jonathan Katz (UMD)
  • Mike Hicks (UMD)
May-2014 Security and Privacy (SP), 2014 IEEE Symposium on (pp. 623-638). IEEE collaborative
doc-2691 tech report ITA Project 4 common demonstration
  • David Mott (IBM UK)
May-2014 single institute
doc-2695 tech report ACT-R CE Integration Module Design Specification
  • Paul Stone (IBM UK)
May-2014 ITACS single institute
doc-2701 tech report Preliminary Report on Privacy in Trust/Reputation Mechanism
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Mani Srivastava (UCLA)
  • Alice Toniolo (Aberdeen)
May-2014 international
doc-2704 invited talk Reasoning about information use and mis-use
  • Nir Oren (Aberdeen)
May-2014 single institute
doc-2705 tech report Information Fabric and the Experimentation Framework
  • Stephen Pipes (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • Ben Hardill (IBM UK)
May-2014 single institute
doc-2715 external conference Virtual information exchange: enabling secure, dynamic, and policy-controlled interoperation
  • Geeth de Mel (IBM US)
  • David Wood (IBM US)
  • Seraphin Calo (IBM US)
  • Keith Grueneberg (IBM US)
  • Dave Braines (IBM UK)
  • Paul Sullivan (ARL)
  • Tien Pham (ARL)
  • Dinesh Verma (IBM US)
May-2014 International Society for Optics and Photonics - Defense, Security and Sensing, 2014 international with government
doc-2717 journal Multi-source Multipath HTTP (mHTTP): A Proposal
  • Jae Kim
  • Yung-Chih Chen (UMass)
  • Ramin Khalili (UMass)
  • Don Towsley (UMass)
  • Anja Feldmann
May-2014 ACM SIGMETRICS Performance Evaluation Review, 42(1), 583-584 collaborative
doc-2720 external conference An operational framework to reason about policy behavior in trust management systems
  • Edelmira Pasarella
  • Jorge Lobo (IBM US)
May-2014 AMW 2014: Alberto Mendelzon Workshop on Foundations of Data Management: Proceedings of the 8th Alberto Mendelzon Workshop on Foundations of Data Management: Cartagena de Indias, Colombia, June 4-6, 2014.(CEUR Workshop Proceedings; 1189) collaborative
doc-x0078 external conference Practical use of a framework for network science experimentation
  • Andrew Toth (ARL)
  • Flavio Bergamaschi (IBM UK)
May-2014 International Society for Optics and Photonics - Defense, Security and Sensing, 2014 international with government
doc-x0560 external conference Fine-grained policy control in US Army Research Laboratory (ARL) multimodal signatures database
  • Kelly Bennett (ARL)
  • Keith Grueneberg (IBM US)
  • David Wood (IBM US)
  • Seraphin Calo (IBM US)
May-2014 International Society for Optics and Photonics - Defense, Security and Sensing, 2014 collaborative with government
doc-x0796 external conference Quantifying information flow for dynamic secrets
  • Piotr Mardziel (UMD)
  • Mario Alvim
  • Mike Hicks (UMD)
  • Michael Clarkson
May-2014 2014 IEEE Symposium on Security and Privacy (SP) (pp. 540-555). IEEE. collaborative
doc-x0883 external conference Sharing smart environment assets in dynamic multi-partner scenarios
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
May-2014 Network Operations and Management Symposium (NOMS), 2014 IEEE (pp. 1-6). IEEE international
doc-x1001 external conference Wysteria: A programming language for generic, mixed-mode multiparty computations
Variants: doc-2565d
  • Aseem Rastogi (UMD)
  • Matthew Hammer (UMD)
  • Mike Hicks (UMD)
May-2014 Security and Privacy (SP), 2014 IEEE Symposium on (pp. 655-670). IEEE single institute
doc-2484 external conference Monitor Placement for Maximal Identifiability in Network Tomography
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Apr-2014 IEEE International Conference on Computer Communications (InfoCom), 2014 international with government
doc-2486 external conference Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices
Variants: doc-2597
  • Yeon-sup Lim (UMass)
  • Yung-Chih Chen (UMass)
  • Erich Nahum (IBM US)
  • Don Towsley (UMass)
  • Kang-won Lee (IBM US)
Apr-2014 IEEE International Conference on Computer Communications (InfoCom), 2014 collaborative
doc-2587 external conference ipShield: A Framework For Enforcing Context-Aware Privacy
  • Supriyo Chakraborty (UCLA)
  • Chenguang Shen (UCLA)
  • Kasturi Raghavan (UCLA)
  • Yasser Shoukry (UCLA)
  • Matt Millar (UCLA)
  • Mani Srivastava (UCLA)
Apr-2014 NSDI single institute
doc-2690 tech report Extending CE to include adjunct expressions
  • David Mott (IBM UK)
  • Stephen Poteet
Apr-2014 ITACS international
doc-2706 external conference Robust Network Tomography in the Presence of Failures
  • Srikar Tati (PSU)
  • Simone Silvestri (PSU)
  • Ting He (IBM US)
  • Thomas La Porta (PSU)
Apr-2014 Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on (pp. 481-492). IEEE collaborative
doc-2812 external conference On the Complexity of Optimal Routing and Content Caching in Heterogeneous Networks
  • Mostafa Dehghan (UMass)
  • Anand Seetharam (UMass)
  • Bo Jiang (UMass)
  • Ting He (IBM US)
  • Theodoros Salonidis (IBM US)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
  • Ramesh Sitaraman (UMass)
Apr-2014 IEEE International Conference on Computer Communications (InfoCom), 2014 collaborative
doc-2586 external conference Multitiered Inference Management Architecture for Participatory Sensing
  • Stephen Pipes (IBM UK)
  • Supriyo Chakraborty (UCLA)
Mar-2014 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2014 international
doc-x0754 external conference Outsourcing multi-version key-value stores with verifiable data freshness
  • Yuqing Tang (CMU)
  • Ting Wang (IBM US)
  • Xin Hu (IBM US)
  • Reiner Sailer (IBM US)
  • Ling Liu
  • Peter Pietzuch (Imperial)
Mar-2014 Data Engineering (ICDE), 2014 IEEE 30th International Conference on (pp. 1214-1217). IEEE. international
doc-2359 external conference Verifiable Oblivious Storage
  • Daniel Apon (UMD)
  • Jonathan Katz (UMD)
  • Elaine Shi (UMD)
  • Aishwarya Thiruvengadam (UMD)
Feb-2014 Public-Key Cryptography-PKC 2014 (pp. 131-148). Springer Berlin Heidelberg single institute
doc-2526 external conference Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption
  • Joseph Soryal (CUNY)
  • Irippuge Perera (CUNY)
  • Ihab Darwish (CUNY)
  • Nelly Fazio (CUNY)
  • Rosario Gennaro (CUNY)
  • Tarek Saadawi (CUNY)
Feb-2014 Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on (pp. 472-479). IEEE single institute
doc-2565b invited talk WYSTERIA: A Programming Language for Generic, Mixed-Model Multiparty Computations
  • Mike Hicks (UMD)
Feb-2014 single institute
doc-2603 tech report On Interpreting the ELICIT sentences
  • David Mott (IBM UK)
Feb-2014 single institute
doc-2604 tech report Conceptualisation of ELICIT sentences in CE
  • David Mott (IBM UK)
Feb-2014 single institute
doc-2605 tech report Running ELICIT sentences through the ERG system
  • David Mott (IBM UK)
Feb-2014 single institute
doc-2611 tech report 'Tank' revisited - Handling of Ambiguous Sentences in CE
  • David Mott (IBM UK)
Feb-2014 single institute
doc-2612 tech report CE-based mechanisms for handling ambiguity in Natural Language
  • David Mott (IBM UK)
Feb-2014 single institute
doc-2625 journal Cross-cloud MapReduce: A Result Integrity Check Framework on Hybrid Clouds
  • Yi Wang (Southampton)
  • Jinpeng Wei
  • Mudhakar Srivatsa (IBM US)
Feb-2014 Intl Journal of Cloud Computing (IJCC) international
doc-2626 external conference De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information
  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa (IBM US)
  • Jing He
  • Raheem Beyah
Feb-2014 NDSS 2014 collaborative
doc-2627 external conference Optimal Contracts for Outsourced Computation
  • Viet Pham (RHUL)
  • Arman Khouzani (RHUL)
  • Carlos Cid (RHUL)
Feb-2014 Decision and Game Theory for Security (pp. 79-98). Springer International Publishing single institute
doc-2631 external conference Generalizing Homomorphic MACs for Arithmetic Circuits
  • Dario Catalano
  • Dario Fiore
  • Rosario Gennaro (CUNY)
  • Luca Nizzardo
Feb-2014 Public-Key Cryptography-PKC 2014 (pp. 538-555). Springer Berlin Heidelberg collaborative
doc-2633 tech report Architecture Options for Realization of Inference Management in Information Fabric
  • Stephen Pipes (IBM UK)
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
  • Christopher Gibson (IBM UK)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Mani Srivastava (UCLA)
Feb-2014 ITACS international
doc-2636 tech report Argumentation Random Field for Linchpin Analysis
  • Yuqing Tang (CMU)
  • Alice Toniolo (Aberdeen)
  • Katia Sycara (CMU)
  • Nir Oren (Aberdeen)
Feb-2014 Technical Report international
doc-2638a tech report Empirical Study: Is CDN Working Well in Cellular Networks?
  • Guan-Hua Tu (UCLA)
  • Raghu Ganti (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Songwu Lu (UCLA)
Feb-2014 Technical report collaborative
doc-2639 journal Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
Variants: doc-1902
  • Srikar Tati (PSU)
  • Bong Jun Ko (IBM US)
  • Guohong Cao (PSU)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
Feb-2014 IEEE Transactions on Parallel and Distributed Systems collaborative with government
doc-2643 tech report Balancing Behavioral Privacy and Information Utility in Sensory Data Flows
Variants: doc-1877
  • Supriyo Chakraborty (UCLA)
Feb-2014 single institute
doc-2644 tech report Thoughts on Uncertainty in Natural Language
  • Stephen Poteet
  • Ping Xue
  • David Mott (IBM UK)
  • Anne Kao
Feb-2014 international
doc-x0351 patent Adaptive remote decision making under quality of information requirements
  • Chatschik Bisdikian (IBM US)
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
Feb-2014 U.S. Patent No. 8,660,022 single institute
doc-x0396 patent Assessing response routes in a network
  • Graham Bent (IBM UK)
  • Tom Berman (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
Feb-2014 U.S. Patent Application 14/171,256 single institute
doc-2607 tech report Natural Language and Uncertainty, P4T2, Face to Face 2014
  • David Mott (IBM UK)
  • Stephen Poteet
  • Anne Kao
  • Ping Xue
  • Ann Copestake (Cambridge)
Jan-2014 ITA Face-to-face 2014 international
doc-2610 tech report Simple Uncertainty Example
  • David Mott (IBM UK)
Jan-2014 single institute
doc-2630 journal Human-Machine Conversations to Support Multi-Agency Missions
  • Alun Preece (Cardiff)
  • Dave Braines (IBM UK)
  • Diego Pizzocaro (Cardiff)
  • Christos Parizas (Cardiff)
Jan-2014 ACM SIGMOBILE Mobile Computing and Communications Review, Volume 18 Issue 1 collaborative
doc-2815 external conference Distributed Route Aggregation on the Global Network
  • Joao Luis Sobrinho
  • Laurent Vanbever
  • Franck Le (IBM US)
  • Jennifer Rexford
2014 Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 161-172). ACM collaborative
doc-x0041 journal Efficient solutions framework for optimal multitask resource assignments for data fusion in wireless sensor networks
  • Srikanth Hariharan
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Tien Pham (ARL)
2014 ACM Transactions on Sensor Networks (TOSN), 2014. collaborative with government
doc-x0202 journal Authenticated broadcast with a partially compromised public-key infrastructure
Variants: doc-x0112
  • Dov Gordon
  • Jonathan Katz (UMD)
  • Ranjit Kumaresan (UMD)
  • Arkady Yerukhimovich (UMD)
2014 Information and Computation, 234, 17-25 collaborative
doc-x0318 journal A Generic Admission-Control Methodology for Packet Networks
  • Chi Harold Liu
  • Kin Leung (Imperial)
  • Athanasios Gkelias (Imperial)
2014 Wireless Communications, IEEE Transactions on, 13(2), 604-617 collaborative
doc-x0375 external conference An operational framework to reason about policy behavior in trust management systems (High-level Work)
  • Edelmira Pasarella
  • Jorge Lobo (IBM US)
2014 AMW 2014: Alberto Mendelzon Workshop on Foundations of Data Management: Proceedings of the 8th Alberto Mendelzon Workshop on Foundations of Data Management: Cartagena de Indias, Colombia, June 4-6, 2014.(CEUR Workshop Proceedings; 1189). 2014. collaborative
doc-x0377 external conference Analysis and Refinement of Temporal Relation Aggregation
  • Taylor Cassidy (ARL)
  • Heng Ji (RPI)
2014 COLING (pp. 1556-1566). Chicago collaborative with government
doc-x0401 patent Assigning gateways for heterogeneous wireless mobile networks
  • Sid Chau (Cambridge)
  • Kang-won Lee (IBM US)
  • Starsky Wong (IBM US)
2014 U.S. Patent No. 8,855,010. Washington, DC: U.S. Patent and Trademark Office. international
doc-x0407 patent Automated query path reporting in distributed databases
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
2014 U.S. Patent No. 8,626,747. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0501 journal Distributed stochastic cross-layer optimization for multi-hop wireless networks with cooperative communications
  • Shusen Yang (Imperial)
  • Zhengguo Sheng (Imperial)
  • Julie McCann (Imperial)
  • Kin Leung (Imperial)
2014 Mobile Computing, IEEE Transactions on, 13(10), 2269-2282. single institute
doc-x0625 phd thesis Intelligent Resource Selection for Sensor-task Assignment: A Knowledge-based Approach
Variants: doc-822
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
2014 Doctoral dissertation, Aberdeen University single institute
doc-x0630 external conference ipShield: A Framework For Enforcing Context-Aware Privacy on Android
  • Supriyo Chakraborty (UCLA)
  • Chenguang Shen (UCLA)
  • Kasturi Raghavan (UCLA)
  • Matt Millar (UCLA)
  • Mani Srivastava (UCLA)
2014 USENIX NSDI, 2014 single institute
doc-x0661 tech report Managing Information Sharing in Coalitions through Credible Obfuscation
Variants: doc-2770
  • Federico Cerutti (Cardiff)
  • Supriyo Chakraborty (UCLA)
  • Geeth de Mel (IBM US)
  • Lance Kaplan (ARL)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Paul Sullivan (ARL)
2014 Technical report, ITA international
doc-x0709 journal MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation
  • Xin Hu (IBM US)
  • Ting Wang (IBM US)
  • Marc Stoecklin (IBM US)
  • Douglas Schales (IBM US)
  • Jiyong Jang (IBM US)
  • Reiner Sailer (IBM US)
2014 EURASIP Journal on Information Security, 2014(1), 1-9. single institute
doc-x0751 journal Optimization-based resource allocation in communication networks
  • George Tychogiorgos (Imperial)
  • Kin Leung (Imperial)
2014 Computer Networks, 66, 32-45. single institute
doc-x0818 patent Reconciling network management data
  • Dakshi Agrawal (IBM US)
  • Matthew Duggan (IBM UK)
  • Vasilieos Pappas (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Kristian Stewart (IBM UK)
  • Murtaza Zafer (IBM US)
2014 U.S. Patent No. 8,898,269. Washington, DC: U.S. Patent and Trademark Office international
doc-x0859 patent Secure user authentication in a dynamic network
  • Graham Bent (IBM UK)
  • Dominic Harries (IBM UK)
2014 U.S. Patent Application No. 14/193,127 single institute
doc-x0881 patent Serving time critical information to mobile devices
  • Dakshi Agrawal (IBM US)
  • Franck Le (IBM US)
  • Mudhakar Srivatsa (IBM US)
2014 U.S. Patent No. 8,880,030. Washington, DC: U.S. Patent and Trademark Office single institute
doc-x0899 journal Stage: Stereotypical trust assessment through graph extraction
  • Murat Sensoy (Aberdeen)
  • Burcu Yilmaz (Aberdeen)
  • Timothy Norman (Aberdeen)
2014 Computational Intelligence single institute
doc-x0902 external conference Structure based data de-anonymization of social networks and mobility traces
  • Shouling Ji
  • Weiqing Li
  • Mudhakar Srivatsa (IBM US)
  • Jing He
  • Raheem Beyah
2014 Information Security (pp. 237-254). Springer International Publishing collaborative
doc-x0909 journal Supporting Trust Assessment and Decision Making in Coalitions
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
  • Nir Oren (Aberdeen)
2014 Intelligent Systems, IEEE,29(4), 18-24 international
doc-x0938 journal Throughput maximization in mobile WSN scheduling with power control and rate selection
  • Yosef Alayev (CUNY)
  • Fangfei Chen (PSU)
  • Yun Hou (Imperial)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
  • Kin Leung (Imperial)
2014 Wireless Communications, IEEE Transactions on, 13(7), 4066-4079 international
doc-x0946 external conference Towards a rich sensing stack for IoT devices
  • Chenguang Shen (UCLA)
  • Haksoo Choi (UCLA)
  • Supriyo Chakraborty (UCLA)
  • Mani Srivastava (UCLA)
2014 Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on (pp. 424-427). IEEE single institute
doc-x0999 journal Why Amazon's Ratings Might Mislead You: The Story of Herding Effects
  • Ting Wang (IBM US)
  • Dashun Wang (IBM US)
2014 Big Data, 2(4), 196-204 single institute
doc-2042 external conference Fully Homomorphic Message Authenticators
  • Rosario Gennaro (CUNY)
  • Daniel Wichs (IBM US)
Dec-2013 IACR Annual International Conference on the Theory and Application of Cryptology and Information (ASIACRYPT), 2013 collaborative
doc-2481 external conference Link Identifiability in Communication Networks with Two Monitors
Variants: doc-2594
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Dec-2013 IEEE Global Communications Conference (GlobeCom), 2013 international with government
doc-x0771 patent Policy evolution with machine learning
  • Pau-Chen Cheng (IBM US)
  • John Clark
  • Yow Tzu Lim
  • Pankaj Rohatgi (IBM US)
Dec-2013 U.S. Patent No. 8,606,724. Washington, DC: U.S. Patent and Trademark Office. international
doc-x0788 patent Providing a Sensor Composite Service Based on Operational and Spatial Constraints
  • Chatschik Bisdikian (IBM US)
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
  • Syed Shah (RPI)
  • Petros Zerfos (IBM US)
Dec-2013 U.S. Patent Application No. 14/135,911. international
doc-2317 external conference Human Factors in Intelligence, Surveillance, and Reconnaissance: Gaps for Soldiers and Technology Recommendations
  • Jon Bakdash (ARL)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
Nov-2013 IEEE Military Communications Conference, 2013 international with government
doc-2349 external conference Inferring Military Activity in Hybrid Networks through Cache Behavior
  • Mostafa Dehghan (UMass)
  • Dennis Goeckel (UMass)
  • Ting He (IBM US)
  • Don Towsley (UMass)
Nov-2013 IEEE Military Communications Conference, 2013 collaborative
doc-2368 external conference Self-Optimization in Future Hybrid Networks
  • Rahul Urgaonkar (IBM US)
  • Saikat Guha (BBN)
  • Prithwish Basu (BBN)
  • Howard Tripp (Roke)
  • Timothy Freeman (Roke)
  • Robert Hancock (Roke)
  • Anand Seetharam (UMass)
  • Jim Kurose (UMass)
  • Wei Wei (UMass)
  • Jessica Connah (DSTL)
Nov-2013 IEEE Military Communications Conference, 2013 international with government
doc-2372 external conference Reliable Multicast Clouds
  • Ryan Irwin (BBN)
  • Prithwish Basu (BBN)
Nov-2013 IEEE Military Communications Conference, 2013 single institute
doc-2544 demo Syncoin3001 Demonstration of CE fact extraction Fall Meeting 2013 (contains 23 documents)
  • David Mott (IBM UK)
  • Ann Copestake (Cambridge)
  • Ping Xue
Nov-2013 international
doc-2562 tech report Writing an ERG mal-rule
  • David Mott (IBM UK)
Nov-2013 single institute
doc-2564 tech report Is 'male' a mass noun: searching for mal-rules and justifications
  • David Mott (IBM UK)
Nov-2013 single institute
doc-2566 external conference Quantifying Information Flow for Time Varying Data
  • Piotr Mardziel (UMD)
  • Mike Hicks (UMD)
  • Mudhakar Srivatsa (IBM US)
Nov-2013 Proceedings of the IEEE Symposium on Security and Privacy (S&P) collaborative
doc-2568 tech report Moving from linguistic semantics to domain semantics in SYNCOIN3000
  • David Mott (IBM UK)
Nov-2013 single institute
doc-2573 tech report Installing the ERG system on Linux
  • David Mott (IBM UK)
Nov-2013 single institute
doc-2580 tech report Online Application Placement with Provable Performance Guarantees in Cloud Environments
  • Shiqiang Wang (Imperial)
  • Murtaza Zafer (IBM US)
  • Kin Leung (Imperial)
Nov-2013 ICDCS international
doc-2584 external conference Secure Outsourcing of Big Key-Value Storage with Freshness Authenticity
  • Yuzhe Tang
  • Ting Wang (IBM US)
  • Xin Hu (IBM US)
  • Reiner Sailer (IBM US)
  • Peter Pietzuch (Imperial)
  • Ling Liu
Nov-2013 IEEE International Conference on Data Engineering 2014 international
doc-2585 external conference IncBm-Tree: Outsourcing Big Stream with Authenticated Freshness
Variants: doc-2542
  • Yuzhe Tang
  • Ting Wang (IBM US)
  • Xin Hu (IBM US)
  • Reiner Sailer (IBM US)
  • Peter Pietzuch (Imperial)
Nov-2013 IEEE International Conference on Data Engineering (ICDE) international
doc-x0753 external conference Optimizing Control Overhead for Power-aware Routing in Wireless Networks
Variants: doc-2195
  • Anand Seetharam (UMass)
  • Bo Jiang (UMass)
  • Dennis Goeckel (UMass)
  • Jim Kurose (UMass)
  • Robert Hancock (Roke)
Nov-2013 IEEE Military Communications Conference, 2013 international
doc-2247 external conference Broadcast Steganography
  • Nelly Fazio (CUNY)
  • Antonio Nicolosi
  • Irippuge Perera (CUNY)
Oct-2013 Topics in Cryptology-CT-RSA 2014 (pp. 64-84). Springer International Publishing collaborative
doc-2275 external conference Resource Allocation with Non-Deterministic Demands and Profits
  • Nan Hu (PSU)
  • Diego Pizzocaro (Cardiff)
  • Matthew Johnson (CUNY)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
Oct-2013 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2013 international
doc-2377 external conference Human-Machine Conversations to Support Mission-Oriented Information Provision

Best paper award
  • Alun Preece (Cardiff)
  • Dave Braines (IBM UK)
  • Diego Pizzocaro (Cardiff)
  • Christos Parizas (Cardiff)
Oct-2013 Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking (pp. 43-50). ACM collaborative
doc-2439 internal conference A Working Implementation of Secure Keyword Search on Files Stored over Untrusted Servers
  • Rosario Gennaro (CUNY)
  • Javier Pajuelo (CUNY)
  • Kevin Sekniqi (CUNY)
  • William Skeith (CUNY)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance single institute
doc-2479 internal conference Collaborative Intelligence Analysis for Effective Decision Making
  • Alice Toniolo (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Nir Oren (Aberdeen)
  • Mani Srivastava (UCLA)
  • Jeffrey Starr (Honeywell)
  • Daniel Johnson (Honeywell)
  • John Allen (Honeywell)
  • Geeth de Mel (IBM US)
  • Sue Toth (ARL)
  • Scott Mastin (ARL)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2480 internal conference On the benefits of argumentation schemes in deliberative dialogue for collaborative decision-making
  • Alice Toniolo (Aberdeen)
  • Timothy Norman (Aberdeen)
  • David Mott (IBM UK)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2483 external conference Identifiability of Link Metrics Based on End-to-end Path Measurements
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Oct-2013 Proceedings of the 2013 conference on Internet measurement conference (pp. 391-404). ACM international with government
doc-2490 internal conference Using ACT-R to Model Collective Sensemaking in Military Coalition Environments
  • Darren Richardson (Southampton)
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
  • Cheryl Giammanco (ARL)
  • Gavin Powell
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2492 internal conference Revisiting Mix-Zones for Location Information Flow Control
  • Mudhakar Srivatsa (IBM US)
  • Raghu Ganti (IBM US)
  • Mike Hicks (UMD)
  • Saritha Arunkumar (IBM UK)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2494 internal conference Policy Enabled Real-time Information Flow Control Across Multiple Administrative Domains
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2498 internal conference Using the English Resource Grammar to extend fact extraction capabilities
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
  • Ann Copestake (Cambridge)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2499 internal conference Exploring the use of Controlled English for communication with ACT-R agents
  • David Mott (IBM UK)
  • Paul Stone (IBM UK)
  • Darren Richardson (Southampton)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2500 internal conference Demonstrating enhanced fact extraction capabilities using Controlled English
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
  • Ann Copestake (Cambridge)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2501 internal conference Peer-to-Peer Ontological Reasoning in Military Coalition Data Networks
  • Padmashree Ravindra (IBM US)
  • Achille Fokoue (IBM US)
  • Patrick Dantressangle (IBM UK)
  • Jeff Pan (Aberdeen)
  • Paul Stone (IBM UK)
  • Katia Sycara (CMU)
  • Yuqing Tang (CMU)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2503 internal conference Leveraging Controlled English at the Network Edge for Policy-Based Management of ISR Services
  • Christos Parizas (Cardiff)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2504 internal conference Extending the NS-CTA RTD2D Platform to the Wireless Sensor Network Edge
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2505 internal conference CE-Based Policies Conflict Analysis for Sensor Services Management in Information Fabric
  • Christos Parizas (Cardiff)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2508 internal conference Sources of Uncertainty in Facts Extracted from Natural Language
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance single institute
doc-2513 internal conference Decentralized Policy Confidentiality Preserving Query Planning in Coalition Networks
  • Mingyi Zhao (PSU)
  • Peng Liu (PSU)
  • Fan Ye (IBM US)
  • Jorge Lobo (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2515 internal conference Efficient Multicast in Hybrid Wireless Networks
  • Prithwish Basu (BBN)
  • Sid Chau (Cambridge)
  • Andrei Bejan (Cambridge)
  • Richard Gibbens (Cambridge)
  • Saikat Guha (BBN)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2517 internal conference Enhancing Specification and Analysis of Declarative Distributed Computing and Comparison with Existing Approaches
  • Jiefei Ma (Imperial)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2518 internal conference A simulation environment for distributed applications
  • Andrei Petric (Imperial)
  • Jiefei Ma (Imperial)
  • David Wood (IBM US)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2520 internal conference Distributed Pattern Matching using Declarative Networking Framework
  • Jiefei Ma (Imperial)
  • David Wood (IBM US)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2522 internal conference Security-aware Application Placement in a Mobile Micro-cloud
  • Shiqiang Wang (Imperial)
  • Murtaza Zafer (IBM US)
  • Kin Leung (Imperial)
  • Ting He (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2523 internal conference Mobile Micro-Cloud: Application Classification, Mapping, and Deployment
  • Shiqiang Wang (Imperial)
  • Guan-Hua Tu (UCLA)
  • Raghu Ganti (IBM US)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Howard Tripp (Roke)
  • Katy Warr (Roke)
  • Murtaza Zafer (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2542 internal conference INCBM-TREE : Outsourcing Big Stream with Authenticated Freshness
Variants: doc-2585
  • Yuzhe Tang
  • Ting Wang (IBM US)
  • Xin Hu (IBM US)
  • Reiner Sailer (IBM US)
  • Peter Pietzuch (Imperial)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2543 internal conference Adaptive Data Stream Processing for Hybrid Coalition Networks: Challenges and Initial Solutions
  • Jim Kurose (UMass)
  • Daniel O'Keeffe (Imperial)
  • Peter Pietzuch (Imperial)
  • Theodoros Salonidis (IBM US)
  • Anand Seetharam (UMass)
  • Don Towsley (UMass)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2567 internal conference Location Information Flow Control in Coalition Networks
  • Saritha Arunkumar (IBM UK)
  • Mudhakar Srivatsa (IBM US)
  • Mike Hicks (UMD)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2575 internal conference Localizing Network Problems in Tactical Hybrid Wireless Networks
  • Murtaza Zafer (IBM US)
  • Bong Jun Ko (IBM US)
  • Kang-won Lee (IBM US)
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2583 internal conference Data Stream Processing for Hybrid Coalition Networks (HCNs): Demo
  • ABM Musa
  • Theodoros Salonidis (IBM US)
  • Seraphin Calo (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance collaborative
doc-2593 internal conference Efficient Identification of Additive Link Metrics via Network Tomography
Variants: doc-2482
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Don Towsley (UMass)
  • Ananthram Swami (ARL)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2594 internal conference Link Identifiability in Communication Networks with Two Monitors
Variants: doc-2481
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2595 internal conference Measurement Design Framework for Network Tomography Using Fisher Information
  • Chang Liu (UMass)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
  • Theodoros Salonidis (IBM US)
  • Kin Leung (Imperial)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2596 internal conference A Measurement-based Study of MultiPath TCP Performance over Wireless Networks
Variants: doc-2371
  • Yung-Chih Chen (UMass)
  • Yeon-sup Lim (UMass)
  • Richard Gibbens (Cambridge)
  • Erich Nahum (IBM US)
  • Ramin Khalili (UMass)
  • Don Towsley (UMass)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance international
doc-2597 internal conference Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices
Variants: doc-2486
  • Yeon-sup Lim (UMass)
  • Yung-Chih Chen (UMass)
  • Erich Nahum (IBM US)
  • Don Towsley (UMass)
  • Kang-won Lee (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance collaborative
doc-x0640 internal conference Knowledge inference for optimizing and enforcing secure computations
  • Piotr Mardziel (UMD)
  • Mike Hicks (UMD)
  • Jonathan Katz (UMD)
  • Matthew Hammer (UMD)
  • Aseem Rastogi (UMD)
  • Mudhakar Srivatsa (IBM US)
Oct-2013 7th Annual Fall Meeting of the International Technology Alliance collaborative
doc-x0917 patent Systems and methods for provisioning sensing resources for mobile sensor networks
  • Dakshi Agrawal (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Murtaza Zafer (IBM US)
Oct-2013 U.S. Patent Application No. 13/432,337 single institute
doc-2547 tech report Developing an ACT-R Model of Collective Sensemaking. I. Research Context, Motivating Factors and Research Focus Areas
  • Paul Smart (Southampton)
  • Darren Richardson (Southampton)
  • Katia Sycara (CMU)
  • Paul Stone (IBM UK)
  • Cheryl Giammanco (ARL)
  • Gavin Powell
Sep-2013 N/A international
doc-x0314 external conference A Fluid Model Study of Multipath Communication in a Hybrid Network for a Moving Convoy
Variants: doc-2059
  • Andrei Bejan (Cambridge)
  • Richard Gibbens (Cambridge)
  • Yeon-sup Lim (UMass)
  • Don Towsley (UMass)
Sep-2013 25th International Teletraffic Congress (ITC'25), 10-12 September 2013. international
doc-x0334 external conference A performance analysis study of multipath routing in a hybrid network with mobile users
  • Andrei Bejan (Cambridge)
  • Richard Gibbens (Cambridge)
  • Yeon-sup Lim (UMass)
  • Don Towsley (UMass)
Sep-2013 Teletraffic Congress (ITC), 2013 25th International (pp. 1-9). IEEE. international
doc-x0380 patent Analysis of IT resource performance to business organization
  • Chatschik Bisdikian (IBM US)
  • Joel Branch (IBM US)
  • Vasilieos Pappas (IBM US)
Sep-2013 U.S. Patent No. 8,539,018. Washington, DC: U.S. Patent and Trademark Office single institute
doc-2334 external conference An Empirical Evaluation of Geometric Subjective Logic Operators
  • Federico Cerutti (Cardiff)
  • Alice Toniolo (Aberdeen)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
Aug-2013 Agreement Technologies (pp. 90-104). Springer Berlin Heidelberg collaborative
doc-2335 external conference A Framework for Using Trust to Assess Risk in Information Sharing
  • Chatschik Bisdikian (IBM US)
  • Yuqing Tang (CMU)
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
Aug-2013 Agreement Technologies (pp. 135-149). Springer Berlin Heidelberg international
doc-2360 external conference Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields
  • Nelly Fazio (CUNY)
  • Rosario Gennaro (CUNY)
  • Irippuge Perera (CUNY)
  • William Skeith (CUNY)
Aug-2013 IACR Annual International Cryptology Conference (CRYPTO), 2013 single institute
doc-2364 external conference Protecting Data Against Unwanted Inferences
  • Supriyo Chakraborty (UCLA)
  • Nicolas Bitouze (UCLA)
  • Mani Srivastava (UCLA)
  • Lara Dolecek (UCLA)
Aug-2013 Information Theory Workshop (ITW), 2013 IEEE (pp. 1-5). IEEE single institute
doc-2367 journal A Declarative Approach to Distributed Computing: Specification, Execution and Analysis
  • Jiefei Ma (Imperial)
  • Franck Le (IBM US)
  • David Wood (IBM US)
  • Alessandra Russo (Imperial)
  • Jorge Lobo (IBM US)
Aug-2013 Theory and Practice of Logic Programming 13.4-5 (2013): 815-830. international
doc-2436 poster Decentralised Certificateless Public-Key Infrastructure
  • Saritha Arunkumar (IBM UK)
  • Graham Bent (IBM UK)
  • Carlos Cid (RHUL)
  • Wei Zhang (RHUL)
Aug-2013 CCC IMA collaborative
doc-2493 invited talk Using LLVM for Program Analysis and Transformation
  • Mike Hicks (UMD)
Aug-2013 single institute
doc-2495 tech report Survey on argumentation schemes and linchpin analysis
  • Yuqing Tang (CMU)
  • Katia Sycara (CMU)
  • Federico Cerutti (Cardiff)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
Aug-2013 ITACS international
doc-2509 tech report Report on the use of the English Resource Grammar to extend fact extraction capabilities
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
Aug-2013 international
doc-2512 tech report Motivating Scenario
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
Aug-2013 international
doc-2514 invited talk Fact Extraction using Controlled English and the English Resource Grammar
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
Aug-2013 international
doc-2524 demo Mobile Micro-Cloud: Demo
  • Xiping Wang (IBM US)
  • Ramya Raghavendra (IBM US)
  • Raghu Ganti (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Dinesh Verma (IBM US)
Aug-2013 single institute
doc-2535 external conference IntegrityMR: Integrity Assurance Framework for Big Data Analytics and Management Applications
  • Yongzhi Wang
  • Jinpeng Wei
  • Mudhakar Srivatsa (IBM US)
  • Yucong Duan
  • Wencai Du
Aug-2013 Big Data, 2013 IEEE International Conference on (pp. 33-40). IEEE collaborative
doc-2050 journal On the Complexity of the BKW Algorithm on LWE
  • Martin Albrecht (RHUL)
  • Carlos Cid (RHUL)
  • Jean-Charles Faugere
  • Robert Fitzpatrick (RHUL)
  • Ludovic Perret
Jul-2013 Design Codes Cryptography collaborative
doc-2305 external conference TIDY: A Trust-Based Approach to Information Fusion through Diversity
  • Anthony Etuk (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Chatschik Bisdikian (IBM US)
  • Mudhakar Srivatsa (IBM US)
Jul-2013 16th International Conference on Information FUSION international
doc-2312 external conference Assessing Trust over Uncertain Rules and Streaming Data
  • Saritha Arunkumar (IBM UK)
  • Mudhakar Srivatsa (IBM US)
  • Dave Braines (IBM UK)
  • Murat Sensoy (Aberdeen)
Jul-2013 16th International Conference on Information FUSION international
doc-2345 external conference Reasoning Under Uncertainty: Variations of Subjective Logic Deduction
  • Lance Kaplan (ARL)
  • Murat Sensoy (Aberdeen)
  • Yuqing Tang (CMU)
  • Supriyo Chakraborty (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Geeth de Mel (ARL)
Jul-2013 16th International Conference on Information FUSION international with government
doc-2390 tech report Installing the ERG and PET parser on Linux
  • David Mott (IBM UK)
Jul-2013 single institute
doc-2478 external conference Argument Schemes and Provenance to Support Collaborative Intelligence Analysis
  • Alice Toniolo (Aberdeen)
  • Federico Cerutti (Cardiff)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
Jul-2013 Proceedings of the Third International Conference on Advanced Collaborative Networks, Systems and Applications (pp. 51-54) collaborative
doc-2482 external conference Efficient Identification of Additive Link Metrics via Network Tomography

Best paper award
Variants: doc-2593
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Don Towsley (UMass)
  • Ananthram Swami (ARL)
Jul-2013 Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on (pp. 581-590). IEEE international with government
doc-2488 external conference TRIBE: Trust Revision for Information Based on Evidence
  • Murat Sensoy (Aberdeen)
  • Geeth de Mel (ARL)
  • Lance Kaplan (ARL)
  • Tien Pham (ARL)
  • Timothy Norman (Aberdeen)
Jul-2013 16th International Conference on Information FUSION international with government
doc-2491 external conference Cross-Path Inference Attacks on Multipath TCP
  • Zubair Shafiq (IBM US)
  • Franck Le (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Don Towsley (UMass)
Jul-2013 Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks (p. 15). ACM collaborative
doc-2502a journal Authenticated Data Structures, Generically
Variants: doc-2502b
  • Andrew Miller (UMD)
  • Mike Hicks (UMD)
  • Jonathan Katz (UMD)
  • Elaine Shi (UMD)
Jul-2013 ACM SIGPLAN Notices (Vol. 49, No. 1, pp. 411-423). ACM single institute
doc-2369 journal Rewards, Costs and Flexibility in Dynamic Resource Allocation: A Stochastic Optimal Control Approach
Variants: doc-2370
  • Xuefeng Gao
  • You Lu (UCLA)
  • Mayank Sharma (IBM US)
  • Mark Squillante (IBM US)
  • Joost Bosman
Jun-2013 ACM SIGMETRICS Performance Evaluation Review, 41(3), 61-63 collaborative
doc-2506 external conference Controlled English for Effective Communication during Coalition Operations
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Cheryl Giammanco (ARL)
Jun-2013 International Command and Control Research Technology Symposium (ICCRTS), 2013 international with government
doc-x0789 patent QA Based on Context Aware, Real-Time Information from Mobile Devices
  • Seraphin Calo (IBM US)
  • Douglas Freimuth (IBM US)
  • Raghu Ganti (IBM US)
  • James Fan (IBM US)
  • Fan Ye (IBM US)
Jun-2013 U.S. Patent Application No. 13/912,147. single institute
doc-2045 external conference Quadratic Span Programs and Succinct NIZKs without PCPs
  • Rosario Gennaro (CUNY)
  • Craig Gentry (IBM US)
  • Bryan Parno
  • Mariana Raykova
May-2013 IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013 international
doc-2057e external conference Multicasting under Multi-domain and Hierarchical Constraints
Variants: doc-2057a
  • Prithwish Basu (BBN)
  • Sid Chau (Cambridge)
  • Richard Gibbens (Cambridge)
  • Saikat Guha (BBN)
  • Ryan Irwin (BBN)
May-2013 Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on (pp. 524-531). IEEE international
doc-2221 external conference Reasoning about Uncertain Information and Conflict Resolution through Trust Revision
  • Murat Sensoy (Aberdeen)
  • Achille Fokoue (IBM US)
  • Jeff Pan (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Yuqing Tang (CMU)
  • Nir Oren (Aberdeen)
  • Katia Sycara (CMU)
May-2013 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2013 international
doc-2283 external conference Quantum noise limited optical communication with low probability of detection
  • Boulat Bash (UMass)
  • Saikat Guha (BBN)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
May-2013 Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on (pp. 1715-1719). IEEE collaborative
doc-2303 external conference Price Based Routing for Event Driven Prioritized Traffic in Wireless Sensor Networks
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
May-2013 Network Science Workshop (NSW), 2013 IEEE 2nd (pp. 1-8). IEEE single institute
doc-2306 external conference Understanding the Cognitive Impact of Emerging Web Technologies
  • Paul Smart (Southampton)
May-2013 1st International Web for Wellbeing & Human Performance Workshop, Paris, France single institute
doc-2319a phd thesis Models of argument for deliberative dialogue in complex domains
  • Alice Toniolo (Aberdeen)
May-2013 single institute
doc-2329 tech report OptiMeas: Optimized Measurement Selection in Network Tomography
  • Srikar Tati (PSU)
  • Simone Silvestri (PSU)
  • Ting He (IBM US)
  • Thomas La Porta (PSU)
May-2013 collaborative
doc-2339 invited talk Presentation on Controlled English at the NS-CTA bootcamp (April 2013)
  • Dave Braines (IBM UK)
May-2013 single institute
doc-2340 tech report BPP11 Summary of NL processing and Fact Extraction
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
May-2013 ITACS international
doc-2341 tech report 4th Battalion Communications Report
  • David Mott (IBM UK)
May-2013 single institute
doc-2342 tech report BPP11 NL processing and fact extraction (CE embedded Word document)
  • David Mott (IBM UK)
May-2013 single institute
doc-2343 external conference Dempster-Shafer Argument Schemes
  • Yuqing Tang (CMU)
  • Nir Oren (Aberdeen)
  • Simon Parsons (CUNY)
  • Katia Sycara (CMU)
May-2013 Argumentation in Multi-Agent Systems (ArgMAS), 2013 international
doc-2344 external conference Position-based Trust Update in Delegation Chains
  • Chris Burnett (Aberdeen)
  • Nir Oren (Aberdeen)
May-2013 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2013 single institute
doc-2346 tech report Development of a Simulation Capability to Support Experimental Analyses of Collective Sensemaking
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
  • Darren Richardson (Southampton)
May-2013 international
doc-2355 external conference Constructing Controlled English for Both Human Usage and Machine Processing
  • Ping Xue
  • Stephen Poteet
  • Anne Kao
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
May-2013 RuleML 2013 international
doc-2357 journal An Efficient Heuristic Approach to Detecting Graph Isomorphism Based on Combinations of Highly Discriminating Invariants
  • Matthias Dehmer
  • Martin Grabner
  • Abbe Mowshowitz (CUNY)
  • Frank Emmert-Streib
May-2013 Advances in Computational Mathematics 2013 international
doc-2362 external conference Robust Confidentiality Preserving Data Delivery in Federated Coalition Networks
  • Lu Su (IBM US)
  • Yunlong Gao
  • Fan Ye (IBM US)
  • Peng Liu (PSU)
  • Oktay Gunluk (IBM US)
  • Tom Berman (IBM UK)
  • Seraphin Calo (IBM US)
  • Tarek Abdelzaher
May-2013 Networking Conference, 2014 IFIP (pp. 1-9). IEEE international
doc-2370 journal Stochastic Optimal Control for a Class of General Dynamic Resource Allocation Problems
Variants: doc-2369
  • Xuefeng Gao
  • You Lu (UCLA)
  • Mayank Sharma (IBM US)
  • Mark Squillante (IBM US)
  • Joost Bosman
May-2013 Performance Evaluation Review collaborative
doc-2371 external conference A Measurement-based Study of MultiPath TCP Performance over Wireless Networks
Variants: doc-2596
  • Yung-Chih Chen (UMass)
  • Yeon-sup Lim (UMass)
  • Richard Gibbens (Cambridge)
  • Erich Nahum (IBM US)
  • Ramin Khalili (UMass)
  • Don Towsley (UMass)
May-2013 Proceedings of the 2013 conference on Internet measurement conference (pp. 455-468). ACM international
doc-x0780 patent Privacy Preserving Query Method and System for Use in Federated Coalition Networks
  • Tom Berman (IBM UK)
  • Seraphin Calo (IBM US)
  • Lu Su (IBM US)
  • David Vyvyan (IBM UK)
  • Fan Ye (IBM US)
May-2013 U.S. Patent Application No. 13/887,873. international
doc-1866 external conference Endhost-Based Shortest Path Routing in Dynamic Networks: An Online Learning Approach
  • Ting He (IBM US)
  • Dennis Goeckel (UMass)
  • Ramya Raghavendra (IBM US)
  • Don Towsley (UMass)
Apr-2013 IEEE International Conference on Computer Communications (InfoCom), 2013 collaborative
doc-2225 external conference Managing ISR sharing policies at the network edge using Controlled English
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international
doc-2228a external conference CE-SAM: a conversational interface for ISR mission support
  • Diego Pizzocaro (Cardiff)
  • Christos Parizas (Cardiff)
  • Alun Preece (Cardiff)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Jon Bakdash (ARL)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international with government
doc-2230 external conference Exploring the Dynamics of Collective Cognition Using a Computational Model of Cognitive Dissonance
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
  • Darren Richardson (Southampton)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international
doc-2252 external conference A System Architecture for Decision-making Support on ISR Missions with Stochastic Needs and Profits
  • Nan Hu (PSU)
  • Diego Pizzocaro (Cardiff)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international
doc-2293b external conference Controlled English to facilitate human/machine analytical processing
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Simon Laws (IBM UK)
  • Geeth de Mel (ARL)
  • Tien Pham (ARL)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international with government
doc-2320 external conference Result Integrity Check for MapReduce Computation on Hybrid Clouds
  • Yongzhi Wang
  • Jinpeng Wei
  • Mudhakar Srivatsa (IBM US)
Apr-2013 Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on (pp. 847-854). IEEE collaborative
doc-2323 external conference MIPS: A Service-Based Aid for Intelligence Analysis
  • Dave Braines (IBM UK)
  • John Ibbotson (IBM UK)
  • Graham White (IBM UK)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 single institute
doc-2348 external conference Reasoning with Uncertain Information and Trust
  • Murat Sensoy (Aberdeen)
  • Geeth de Mel (ARL)
  • Achille Fokoue (IBM US)
  • Timothy Norman (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Yuqing Tang (CMU)
  • Nir Oren (Aberdeen)
  • Katia Sycara (CMU)
  • Lance Kaplan (ARL)
  • Tien Pham (ARL)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international with government
doc-x0042 external conference Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network
  • Andrew Toth (ARL)
  • Tien Pham (ARL)
  • Todd Karr (DSTL)
  • Graham Bent (IBM UK)
  • Dominic Harries (IBM UK)
  • Alan Knox (IBM UK)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international with government
doc-x0043 external conference UK MoD Land Open Systems Architecture and Coalition Interoperability with the U.S.
  • Gavin Pearson (DSTL)
  • Mike Kolodny (ARL)
  • Tien Pham (ARL)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international with government
doc-x0076 external conference Practical experience in deploying and controlling the data sharing interoperability layer at the U.K. Land Open Systems Architecture (LOSA) field trials in October 2012
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
  • Gavin Pearson (DSTL)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 collaborative with government
doc-x0077 external conference Characterization and definition of a software stack for a reference experimental framework
  • Andrew Toth (ARL)
  • Flavio Bergamaschi (IBM UK)
Apr-2013 International Society for Optics and Photonics - Defense, Security and Sensing, 2013 international with government
doc-x0723 patent Non-interactive hierarchical identity-based key-agreement
  • Rosario Gennaro (CUNY)
  • Shai Halevi (IBM US)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
Apr-2013 U.S. Patent No. 8,422,681. Washington, DC: U.S. Patent and Trademark Office. collaborative
doc-2223b external conference TAF: A Trust Assessment Framework for Inferencing with Uncertain Streaming Information
  • Anthony Etuk (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Chatschik Bisdikian (IBM US)
  • Mudhakar Srivatsa (IBM US)
Mar-2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 international
doc-2309 external conference Memory Trace Oblivious Program Execution

Winner of the 2014 NSA Best Scientific Cybersecurity Paper competition
  • Chang Liu (UMass)
  • Mike Hicks (UMD)
  • Elaine Shi (UMD)
Mar-2013 Computer Security Foundations Symposium (CSF), 2013 IEEE 26th (pp. 51-65). IEEE collaborative
doc-2310 external conference Knowledge Inference for Optimizing Secure Multi-party Computation
  • Aseem Rastogi (UMD)
  • Piotr Mardziel (UMD)
  • Mike Hicks (UMD)
  • Matthew Hammer (UMD)
Mar-2013 Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security (pp. 3-14). ACM single institute
doc-2325 journal Constructing Limited Scale-Free Topologies Over Peer-to-Peer Networks
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Mar-2013 IEEE Trans. Parallel and Distributed Systems single institute
doc-2358 journal Is Information-Centric Multi-Tree Routing Feasible?
  • Antonio Carzaniga
  • Koorosh Khazaei
  • Michele Paplini
  • Alexander Wolf (Imperial)
Mar-2013 ACM SIGCOMM Computer Communication Review (Vol. 43, No. 4, pp. 3-8). ACM collaborative
doc-x0408 external conference Autonomous configuration of spatially aware sensor services in service oriented WSNs
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
Mar-2013 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 international
doc-1900 journal Dynamic Enforcement of Knowledge-based Security Policies
Variants: doc-1668b
  • Piotr Mardziel (UMD)
  • Stephen Magill (UMD)
  • Mike Hicks (UMD)
  • Mudhakar Srivatsa (IBM US)
Feb-2013 JCS collaborative
doc-2251 external conference Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
  • Jonathan Katz (UMD)
  • Aishwarya Thiruvengadam (UMD)
  • Hong-Sheng Zhou
Feb-2013 Public-Key Cryptography-PKC 2013 (pp. 14-31). Springer Berlin Heidelberg collaborative
doc-2274 tech report User-defined extensions to CE
  • David Mott (IBM UK)
Feb-2013 single institute
doc-2279 external conference Relaxing Independence Assumptions in Probabilistic Argumentation
  • Hengfei Li (Aberdeen)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
Feb-2013 Proceedings of ArgMAS, 2013 single institute
doc-2286 book chapter Physical-Layer Secrecy in Large Multi-Hop Wireless Networks
  • Dennis Goeckel (UMass)
  • Cagatay Capar (UMass)
  • Don Towsley (UMass)
Feb-2013 Physical-Layer Security in Wireless Communications single institute
doc-2296 poster Balancing Behavioral Privacy and Information Utility in Sensor Data Flows
  • Supriyo Chakraborty (UCLA)
  • Kasturi Raghavan (UCLA)
  • Nicolas Bitouze (UCLA)
  • Mani Srivastava (UCLA)
Feb-2013 2013 Information Theory and Applications Workshop single institute
doc-2297 external conference A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems
  • Supriyo Chakraborty (UCLA)
  • Kasturi Raghavan (UCLA)
  • Matthew Johnson (CUNY)
  • Mani Srivastava (UCLA)
Feb-2013 Proceedings of the 14th Workshop on Mobile Computing Systems and Applications (p. 11). ACM collaborative
doc-1682 journal Impact of In-Network Aggregation on Target Tracking Quality Under Network Delays
Variants: doc-1749
  • Wei Wei (UMass)
  • Ting He (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Dennis Goeckel (UMass)
  • Bo Jiang (UMass)
  • Lance Kaplan (ARL)
  • Don Towsley (UMass)
Jan-2013 Selected Areas in Communications, IEEE Journal on 31.4 (2013): 808-818. collaborative with government
doc-2131 external conference A Framework for Managing the Selection of Spatiotemporally Relevant Information Providers
  • George Tychogiorgos (Imperial)
  • Chatschik Bisdikian (IBM US)
2013 Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 403-410). IEEE international
doc-2271 tech report A New CE-based Lexical Model v3.3
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
Jan-2013 international
doc-2272 tech report Lexical Model v3.3 (slides)
  • David Mott (IBM UK)
Jan-2013 single institute
doc-2281 external conference Algebraic (Trapdoor) One Way Functions and their Applications
  • Dario Catalano
  • Dario Fiore
  • Rosario Gennaro (CUNY)
  • Konstantinos Vamvourellis
Jan-2013 Theory of Cryptography (pp. 680-699). Springer Berlin Heidelberg collaborative
doc-2284 journal Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes
  • Boulat Bash (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Jan-2013 IEEE Wireless Communicatoin Letters single institute
doc-2295 journal The discrimination power of structural superindices
  • Matthias Dehmer
  • Abbe Mowshowitz (CUNY)
2013 PloS one 8.7 (2013): e70551. collaborative
doc-2322 tech report Modelling network overlay expansion
  • Paul Stone (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
2013 international
doc-2333 tech report Context-dependent Trust Decisions with Subjective Logic
  • Federico Cerutti (Cardiff)
  • Alice Toniolo (Aberdeen)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
2013 Uncertainty in Artificial Intelligence collaborative
doc-2496 journal Inference Management, Trust and Obfuscation Principles for Quality of Information in Emerging Pervasive Environments
  • Chatschik Bisdikian (IBM US)
  • Christopher Gibson (IBM UK)
  • Supriyo Chakraborty (UCLA)
  • Mani Srivastava (UCLA)
  • Murat Sensoy (Aberdeen)
  • Timothy Norman (Aberdeen)
2013 Pervasive and Mobile Computing (Vol. 11, pp. 168-187, 2014) international
doc-x0029 journal Knowledge Management for Coalition Information Sharing at the Network Edge
  • Cheryl Giammanco (ARL)
  • Ray McGowan (ARL)
  • Anne Kao
  • Dave Braines (IBM UK)
  • Stephen Poteet
  • Tien Pham (ARL)
  • Ping Xue
2013 IEEE intelligent systems, 28(1), 26-33 international with government
doc-x0332 journal A non-convex distributed optimization framework and its application to wireless ad-hoc networks
  • George Tychogiorgos (Imperial)
  • Athanasios Gkelias (Imperial)
  • Kin Leung (Imperial)
2013 Wireless Communications, IEEE Transactions on, 12(9), 4286-4296. single institute
doc-x0355 book chapter Advances in network complexity
  • Matthias Dehmer
  • Abbe Mowshowitz (CUNY)
  • Frank Emmert-Streib
2013 John WileySons international
doc-x0404 patent Automated data source assurance in distributed databases
  • David Vyvyan (IBM UK)
2013 U.S. Patent No. 8,458,208. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0406 patent Automated propagation of non-conflicting queries in distributed databases
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
2013 U.S. Patent No. 8,560,570. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0416 patent Bounded-budget monitor deployment in monitoring networks via end-to-end probes
  • Chatschik Bisdikian (IBM US)
  • Ting He (IBM US)
  • Liang Ma (Imperial)
  • Bonnie Ray (IBM US)
2013 U.S. Patent Application No. 13/952,225. international
doc-x0429 patent Characterizing and selecting providers of relevant information based on quality of information metrics
  • Chatschik Bisdikian (IBM US)
  • George Tychogiorgos (Imperial)
2013 U.S. Patent No. 8,589,389. Washington, DC: U.S. Patent and Trademark Office. international
doc-x0460 journal Cooperative sensor anomaly detection using global information
  • Rui Zhang (CUNY)
  • Ping Ji (CUNY)
  • Dinkar Mylaraswamy (Honeywell)
  • Mani Srivastava (UCLA)
  • Sadaf Zahedi (UCLA)
2013 Tsinghua Science and Technology, 18(3), 209-219. collaborative
doc-x0507 patent Dynamic context definitions in distributed databases
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
2013 U.S. Patent No. 8,458,166. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0535 journal Evaluating temporal robustness of mobile networks
  • Salvatore Scellato (Cambridge)
  • Ilias Leontiadis (Cambridge)
  • Cecilia Mascolo (Cambridge)
  • Prithwish Basu (BBN)
  • Murtaza Zafer (IBM US)
2013 Mobile Computing, IEEE Transactions on, 12(1), 105-117. international
doc-x0628 external conference Interest propagation in named data MANETs
  • Yu-Ting Yu (UCLA)
  • Raheleh Dilmaghani (IBM US)
  • Seraphin Calo (IBM US)
  • Medy Sanadidi (UCLA)
  • Mario Gerla (UCLA)
Jan-2013 Computing, Networking and Communications (ICNC), 2013 International Conference on (pp. 1118-1122). IEEE collaborative
doc-x0660 patent Management of logical statements in a distributed database environment
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
2013 U.S. Patent No. 8,478,803. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0673 patent Method and system for providing operator guidance in network and systems management
  • Dinesh Verma (IBM US)
  • Graham Bent (IBM UK)
2013 U.S. Patent No. 8,370,466. Washington, DC: U.S. Patent and Trademark Office. international
doc-x0725 external conference Oblivious Group Storage
  • Nelly Fazio (CUNY)
  • Antonio Nicolosi
  • Irippuge Perera (CUNY)
2013 Conference on Computer and Communications Security-CCS (pp. 247-258). collaborative
doc-x0781 journal Privacy-Preserving Information Brokering in Distributed Information Sharing.(2013)
  • Fengjun Li
  • Bo Luo
  • Peng Liu (PSU)
  • Dongwon Lee (PSU)
  • Chao-Hsien Chu (PSU)
2013 IEEE Transactions on Information Forensics and Security, 8(6), 888-900. collaborative
doc-x0845 journal Robust dynamic service composition in sensor networks
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
2013 Services Computing, IEEE Transactions on, 6(4), 560-572 collaborative
doc-x0855 patent Secret-key exchange for wireless and sensor networks
  • Dakshi Agrawal (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Cagatay Capar (UMass)
  • Rosario Gennaro (CUNY)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
  • Murtaza Zafer (IBM US)
2013 U.S. Patent No. 8,522,029. Washington, DC: U.S. Patent and Trademark Office. collaborative
doc-x0900 journal Stereotypical trust and bias in dynamic multiagent systems
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
2013 ACM Transactions on Intelligent Systems and Technology (TIST) international
doc-x0901 journal Stochastic optimal control for a general class of dynamic resource allocation problems
  • Xuefeng Gao
  • Mayank Sharma (IBM US)
  • Mark Squillante (IBM US)
  • Joost Bosman
2013 ACM SIGMETRICS Performance Evaluation Review collaborative
doc-x0973 journal Understanding processing overheads of network coding-based content distribution in VANETs
  • Uichin Lee (UCLA)
  • Seung-Hoon Lee (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
2013 Parallel and Distributed Systems, IEEE Transactions on, 24(11), 2304-2318 collaborative
doc-x0976 external conference Understanding the Cognitive Impact of Emerging Web Technologies: A Research Focus Area for Embodied, Extended and Distributed Approaches to Cognition
  • Paul Smart (Southampton)
2013 1st International Web for Wellbeing & Human Performance Workshop, Paris, France single institute
doc-x1051 patent Persistent querying in a federated database system
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Christopher Gibson (IBM UK)
  • David Vyvyan (IBM UK)
2013 U.S. Patent No. 8,386,515. Washington, DC: U.S. Patent and Trademark Office single institute
doc-x2004 journal Predicate encryption supporting disjunctions, polynomial equations, and inner products
Variants: doc-x0779
  • Jonathan Katz (UMD)
  • Amit Sahai (UCLA)
  • Brent Waters
2013 Journal of cryptology, 26(2), 191-224. collaborative
doc-2273 tech report Fact Extraction and Reasoning using Controlled Natural Language - BPP proposal
  • David Mott (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
  • Ann Copestake (Cambridge)
Dec-2012 international
doc-2182 journal Signal-Flow-Based Analysis of Wireless Security Protocols
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Kenny Paterson (RHUL)
  • Elizabeth Quaglia (RHUL)
  • Don Towsley (UMass)
  • Murtaza Zafer (IBM US)
Nov-2012 Information and Computation: Special Issue on Information Security as a Resource international
doc-2224 external conference Towards Argumentation with Symbolic Dempster-Shafer Evidence
  • Yuqing Tang (CMU)
  • Chung Wei Hang
  • Simon Parsons (CUNY)
  • Munindar Singh
Nov-2012 Computational Models of Argument: Proceedings of COMMA 2012, 245, 462 collaborative
doc-2227 invited talk On Social Networks as Side Channels
  • Mudhakar Srivatsa (IBM US)
Nov-2012 single institute
doc-2229 external conference RDFS Reasoning on Massively Parallel Hardware
  • Norman Heino
  • Jeff Pan (Aberdeen)
Nov-2012 International Semantic Web Conference (ISWC), 2012 collaborative
doc-2235 tech report Hypothesis Support in Information Extraction
  • David Mott (IBM UK)
Nov-2012 ITACS single institute
doc-2249 journal Limits of Reliable Communication with Low Probability of Detection on AWGN Channels
  • Boulat Bash (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Nov-2012 IEEE Journal on Selected Areas in Communications: Special Issue on Signal Processing Techniques for Wireless Physical Layer Security single institute
doc-2254 invited talk In Sensors We Trust: Balancing Risk and Value in Pervasive Sensing
  • Mani Srivastava (UCLA)
Nov-2012 single institute
doc-2255 external conference Probabilistic Computation for Information Security
  • Piotr Mardziel (UMD)
  • Kasturi Raghavan (UCLA)
Nov-2012 NIPS Workshop on Probabilistic Programming collaborative
doc-2001 journal Collective Sensemaking and Military Coalitions
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
Oct-2012 IEEE Intelligent Systems international
doc-2028c external conference Multi-Client Non-Interactive Verifiable Computation
Variants: doc-2028a
  • Seung Choi (UMD)
  • Jonathan Katz (UMD)
  • Ranjit Kumaresan (UMD)
  • Carlos Cid (RHUL)
Oct-2012 Theory of Cryptography (pp. 499-518). Springer Berlin Heidelberg international
doc-2191 external conference Distributed State Machines: A Declarative Framework for the Management of Distributed Systems
  • Jorge Lobo (IBM US)
  • David Wood (IBM US)
  • Dinesh Verma (IBM US)
  • Seraphin Calo (IBM US)
Oct-2012 IEEE International Conference on Network and Service Management (CNSM), 2012 single institute
doc-2248 journal Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Variants: doc-1941
  • Nelly Fazio (CUNY)
  • Irippuge Perera (CUNY)
Oct-2012 Public Key Cryptography-PKC 2012. Springer Berlin Heidelberg, 2012. 225-242. single institute
doc-x0760 patent Performing value and context aware communications networking
  • Dakshi Agrawal (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Kang-won Lee (IBM US)
  • Ramya Raghavendra (IBM US)
  • Starsky Wong (IBM US)
Oct-2012 U.S. Patent Application No. 13/651,951. single institute
doc-1816 internal conference On the Selection of Spatiotemporally Relevant Providers of Sensory Information
  • George Tychogiorgos (Imperial)
  • Chatschik Bisdikian (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-1849c internal conference A System Architecture for Exploiting Mission Information Requirement and Resource Allocation
Variants: doc-1849a
  • Fangfei Chen (PSU)
  • Thomas La Porta (PSU)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Mani Srivastava (UCLA)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-1855c internal conference Tasking and Sharing Sensing Assets Using Controlled Natural Language
Variants: doc-1855a
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-1903 internal conference Square Root Law for Communication with Low Probability of Detection on AWGN Channels
Variants: doc-1930
  • Boulat Bash (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-1999 internal conference A Constraint Satisfaction Model of Collective Sensemaking: Insights into the Effect of Coalition Communication Environments on the Dynamics of Collective Cognition
  • Paul Smart (Southampton)
  • Katia Sycara (CMU)
  • Tom Klapiscak (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2011 internal conference Optimal link state sampling for improved network decision making with incomplete knowledge
  • Timothy Freeman (Roke)
  • Howard Tripp (Roke)
  • Robert Hancock (Roke)
  • Saikat Guha (BBN)
  • Prithwish Basu (BBN)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2013 internal conference Evolution of the Preferential Attachment Topology of the Gaian Database
  • Mark Walters
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Abbe Mowshowitz (CUNY)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2014 internal conference Query Propagation Behaviour in Gaian Database Networks
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Andi Toce (CUNY)
  • Boleslaw Szymanski (RPI)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2015a internal conference Query Execution and Maintenance Costs in a Dynamic Distributed Federated Database
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Andi Toce (CUNY)
  • Boleslaw Szymanski (RPI)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2016 internal conference A Model of Query Performance in Dynamic Distributed Federated Databases Taking Account of Network Topology
  • Akira Kawaguchi (CUNY)
  • Abbe Mowshowitz (CUNY)
  • Andrew Nagel (CUNY)
  • Andi Toce (CUNY)
  • Graham Bent (IBM UK)
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2017 internal conference HyperD: Analysis and Performance Evaluation of a Distributed Hypercube Database
  • Andi Toce (CUNY)
  • Abbe Mowshowitz (CUNY)
  • Akira Kawaguchi (CUNY)
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2021 internal conference On the Selection of Spatiotemporally Relevant Sensory Providers
  • George Tychogiorgos (Imperial)
  • Chatschik Bisdikian (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2022 internal conference Balancing Value and Risk In Information Sharing Through Obfuscation
Variants: doc-1954
  • Supriyo Chakraborty (UCLA)
  • Kasturi Raghavan (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2023 internal conference Inference Management: Trust and Obfuscation in Coalition Settings
Variants: doc-x0617
  • Chatschik Bisdikian (IBM US)
  • Murat Sensoy (Aberdeen)
  • Nir Oren (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
  • Lance Kaplan (ARL)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2024 internal conference Trust Assessment when Observing and Orienting with Uncertain, Multi-source Streaming Information
  • Saritha Arunkumar (IBM UK)
  • Mudhakar Srivatsa (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Murat Sensoy (Aberdeen)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2025 internal conference Localization In The Presence of Spatially Obfuscated Sensor Reports
  • Supriyo Chakraborty (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Raghu Ganti (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2028a internal conference Multi-User Non-Interactive Verifiable Computation
Variants: doc-2028c
  • Seung Geol Choi (UMD)
  • Jonathan Katz (UMD)
  • Ranjit Kumaresan (UMD)
  • Carlos Cid (RHUL)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2031 internal conference Combining Subjective Logic with DL-Lite
  • Murat Sensoy (Aberdeen)
  • Achille Fokoue (IBM US)
  • Jeff Pan (Aberdeen)
  • Yuqing Tang (CMU)
  • Katia Sycara (CMU)
  • Mudhakar Srivatsa (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2035 internal conference Controlled Natural Language to facilitate information extraction
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Stephen Poteet
  • Ping Xue
  • Anne Kao
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2039 internal conference Towards Presenting Relevant Facts and Answers on Inconsistent and Uncertain Knowledge
  • Yuqing Tang (CMU)
  • Murat Sensoy (Aberdeen)
  • Achille Fokoue (IBM US)
  • Felipe Meneguzzi (CMU)
  • Jeff Pan (Aberdeen)
  • Mudhakar Srivatsa (IBM US)
  • Katia Sycara (CMU)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2041 internal conference Querying Linked Ontological Data through Distributed Summarization
Variants: doc-1895
  • Achille Fokoue (IBM US)
  • Felipe Meneguzzi (CMU)
  • Murat Sensoy (Aberdeen)
  • Jeff Pan (Aberdeen)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2046 internal conference Safe Query Processing for Pairwise Authorizations in Coalition Networks
Variants: doc-2137
  • Qiang Zeng (PSU)
  • Jorge Lobo (IBM US)
  • Peng Liu (PSU)
  • Seraphin Calo (IBM US)
  • Poonam Yadav (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2051 internal conference An Analysis Framework for Declarative Distributed Computing Applications
Variants: doc-1921
  • Jorge Lobo (IBM US)
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Franck Le (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2052 internal conference A Declarative Framework for the Analysis of Routing Protocols
Variants: doc-x0309
  • Jiefei Ma (Imperial)
  • Jorge Lobo (IBM US)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2053 internal conference Endhost-Based Shortest Path Routing in Dynamic Networks
  • Ting He (IBM US)
  • Dennis Goeckel (UMass)
  • Ramya Raghavendra (IBM US)
  • Don Towsley (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2057a internal conference Multicast under constraints in coalition and command-and-control networks
  • Prithwish Basu (BBN)
  • Sid Chau (Cambridge)
  • Saikat Guha (BBN)
  • Richard Gibbens (Cambridge)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2059 internal conference A fluid model study of multipath communication in a hybrid network for a moving convoy
Variants: doc-x0314
  • Andrei Bejan (Cambridge)
  • Richard Gibbens (Cambridge)
  • Yeon-sup Lim (UMass)
  • Don Towsley (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2060 internal conference Sampling Schedules for Minimum Latency Routing on a Dynamic Network with Imperfect Link State
  • Saikat Guha (BBN)
  • Don Towsley (UMass)
  • Prithwish Basu (BBN)
  • Howard Tripp (Roke)
  • Timothy Freeman (Roke)
  • Dmitriy Katz-Rogozhnikov (IBM US)
  • Robert Hancock (Roke)
  • Jim Kurose (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2062 internal conference Measuring cellular networks: characterizing 3G, 4G, and path diversity
  • Yung-Chih Chen (UMass)
  • Erich Nahum (IBM US)
  • Richard Gibbens (Cambridge)
  • Don Towsley (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2064 internal conference Network Coding for Facilitating Secrecy in Large Wireless Networks
Variants: doc-x0716
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Chee Leow (Imperial)
  • Kin Leung (Imperial)
  • Don Towsley (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2065 internal conference Capacity of Hybrid Networks
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Richard Gibbens (Cambridge)
  • Ananthram Swami (ARL)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2069 internal conference Topological Constraints on Identifying Additive Link metrics via end-to-end path measurements
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2094a internal conference Calculation of the Center-of-Data in a Hypercube
  • Paul Stone (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2103 internal conference Opportunistic Scheduling in Hybrid Network Environments with Time Scale Differences
  • Mark Squillante (IBM US)
  • Peter van de Ven (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2104 internal conference Resource Allocation and Scheduling in Multi-hop Hybrid Networks
  • Mark Squillante (IBM US)
  • Peter van de Ven (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2113a internal conference Extending the Kerberos Protocol for Distributed Data as a Service
  • Graham Bent (IBM UK)
  • Dominic Harries (IBM UK)
  • Andrew Toth (ARL)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2128 internal conference The Existence of Trusted Paths in Hybrid Networks
  • Tom Berman (IBM UK)
  • David Vyvyan (IBM UK)
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Jorge Lobo (IBM US)
  • Fan Ye (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2129 internal conference A Comparative Study on Trusted Path Discovery in Two Algorithms
  • Tom Berman (IBM UK)
  • David Vyvyan (IBM UK)
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Jorge Lobo (IBM US)
  • Fan Ye (IBM US)
  • Peng Liu (PSU)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2130 internal conference Knowledge-based Sensor Security
  • Piotr Mardziel (UMD)
  • Mike Hicks (UMD)
  • Michael Clarkson
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2132 internal conference High-Level Sharing Policies and their Effect on Sensor-Task Assignment
  • Christos Parizas (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2133a internal conference Towards an Expression of Policy in Controlled English
  • Dominic Harries (IBM UK)
  • Dave Braines (IBM UK)
  • Christopher Gibson (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2137 internal conference Safe query processing for pairwise authorizations in coalition networks
Variants: doc-2046
  • Qiang Zeng (PSU)
  • Jorge Lobo (IBM US)
  • Peng Liu (PSU)
  • Seraphin Calo (IBM US)
  • Poonam Yadav (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2138 internal conference Distributed Query Planning in Coalition Networks
  • Mingyi Zhao (PSU)
  • Qiang Zeng (PSU)
  • Jorge Lobo (IBM US)
  • Peng Liu (PSU)
  • Fan Ye (IBM US)
  • Seraphin Calo (IBM US)
  • Tom Berman (IBM UK)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2141a internal conference Building Efficient Limited Scale-Free Overlay Topologies for Unstructured P2P Networks
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2144a internal conference Dynamic Multipath Routing of Multi-Priority Traffic in Wireless Sensor Networks
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2146 internal conference Trust-based Dynamic Service Composition in Tactical Networks
  • Jin-Hee Cho (ARL)
  • Jemin George (ARL)
  • Boleslaw Szymanski (RPI)
  • Alun Preece (Cardiff)
  • Petros Zerfos (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2147a internal conference Utilizing PCFGs for Modeling and Learning Service Compositions in Sensor Networks
Variants: doc-2007
  • Sahin Geyik (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2153a internal conference CoPing: Cooperative Probing of Path Performance for Gateway Selection in Hybrid Wireless Networks
  • Bong Jun Ko (IBM US)
  • Sisi Liu
  • Murtaza Zafer (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2168 internal conference Trust decision-making with controls
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2171 internal conference Diagnosing Large-Scale Failures in Computer Networks
  • Srikar Tati (PSU)
  • Bong Jun Ko (IBM US)
  • Guohong Cao (PSU)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-2173 internal conference Temporal Subjective Logic
  • Nir Oren (Aberdeen)
  • Chatschik Bisdikian (IBM US)
  • Supriyo Chakraborty (UCLA)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2174 internal conference Sub-delegation and Trust
Variants: doc-1861
  • Chris Burnett (Aberdeen)
  • Nir Oren (Aberdeen)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-2175 internal conference Towards a System for Managing Inferences with Distributed, Uncertain and Obfuscated Information
  • Stephen Pipes (IBM UK)
  • Christopher Gibson (IBM UK)
  • Ben Hardill (IBM UK)
  • Chatschik Bisdikian (IBM US)
  • Mani Srivastava (UCLA)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2180 internal conference Connectivity of Coalition Networks
  • Cagatay Capar (UMass)
  • Prithwish Basu (BBN)
  • Saikat Guha (BBN)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Richard Gibbens (Cambridge)
  • Ananthram Swami (ARL)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2184 internal conference Exploring Controlled English for representing knowledge in the Linguistic Knowledge Builder
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Simon Laws (IBM UK)
  • Ping Xue
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2186 internal conference Documenting Provenance with a Controlled Natural Language
  • John Ibbotson (IBM UK)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Saritha Arunkumar (IBM UK)
  • Mudhakar Srivatsa (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2192 internal conference A brief exploratory overview of a hierarchically labelled geo-located network of nodes
  • Prithwish Basu (BBN)
  • Richard Gibbens (Cambridge)
  • Rick Allen (BBN)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2195 internal conference Optimizing Control Overhead for Power-aware Routing in Wireless Networks
Variants: doc-x0753
  • Anand Seetharam (UMass)
  • Bo Jiang (UMass)
  • Dennis Goeckel (UMass)
  • Jim Kurose (UMass)
  • Robert Hancock (Roke)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2196 internal conference Minimum Control Overhead for Power-aware Routing in Wireless Networks
  • Anand Seetharam (UMass)
  • Dennis Goeckel (UMass)
  • Jim Kurose (UMass)
  • Robert Hancock (Roke)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2232 external conference Gateway Selection in Hybrid Wireless Networks through Cooperative Probing
  • Bong Jun Ko (IBM US)
  • Sisi Liu
  • Murtaza Zafer (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
Sep-2012 Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 352-360). IEEE collaborative
doc-2238 internal conference Fault Localization in MANET-Hosted Service-Based Systems
Variants: doc-2018
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance international
doc-2262 software ISTAR Ontology - Controlled English Knowledge Base
  • Dave Braines (IBM UK)
Sep-2012 single institute
doc-x0322 internal conference A Joint Rate and FEC Adaptation Approach to Enable High Speed Broadcast in IEEE 802.11 Networks
  • Starsky Wong (IBM US)
  • Ramya Raghavendra (IBM US)
  • Yang Song (IBM US)
  • Kang-won Lee (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance single institute
doc-x0445 internal conference Content Dissemination Protocols in Hybrid Wireless Networks
  • Haksoo Choi (UCLA)
  • Raghu Ganti (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Ramya Raghavendra (IBM US)
Sep-2012 6th Annual Conference of the International Technology Alliance collaborative
doc-x0992 external conference Utility-proportional fairness in wireless networks

Best paper award
  • George Tychogiorgos (Imperial)
  • Athanasios Gkelias (Imperial)
  • Kin Leung (Imperial)
Sep-2012 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2012 single institute
doc-1901 external conference Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel
  • Mudhakar Srivatsa (IBM US)
  • Mike Hicks (UMD)
Aug-2012 Proceedings of the 2012 ACM conference on Computer and communications security (pp. 628-637). ACM collaborative
doc-2040 external conference Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications
  • Dario Fiore
  • Rosario Gennaro (CUNY)
Aug-2012 Proceedings of the 2012 ACM conference on Computer and communications security (pp. 501-512). ACM collaborative
doc-2089 tech report Characterizing 4G and 3G Networks: Supporting Mobility with Multi-Path TCP
  • Yung-Chih Chen (UMass)
  • Yeon-sup Lim (UMass)
  • Erich Nahum (IBM US)
  • Richard Gibbens (Cambridge)
  • Don Towsley (UMass)
Aug-2012 Co-Next 2012 international
doc-2109 invited talk On the Quality of Information for Sensor-Enabled Systems and Solutions
  • Chatschik Bisdikian (IBM US)
  • Murat Sensoy (Aberdeen)
  • Nir Oren (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
  • Lance Kaplan (ARL)
Aug-2012 international
doc-2118 external conference History-Free Sequential Aggregate Signatures
  • Marc Fischlin
  • Anja Lehmann
  • Dominique Schroder (UMD)
Aug-2012 Security and Cryptography for Networks (pp. 113-130). Springer Berlin Heidelberg collaborative
doc-2119 external conference Verifiable Data Streaming
  • Dominique Schroder (UMD)
  • Heike Schroeder
Aug-2012 Proceedings of the 2012 ACM conference on Computer and communications security (pp. 953-964). ACM collaborative
doc-2120 tech report Identities and Names in CE
  • David Mott (IBM UK)
Aug-2012 ITACS single institute
doc-2121 tech report Summary of Communications processing
  • David Mott (IBM UK)
Aug-2012 ITACS single institute
doc-2123 tech report Linguistic Notes for the ACITA 2012 Fact Extraction demonstration
  • David Mott (IBM UK)
Aug-2012 ITACS single institute
doc-2127 tech report The potential for Fact Extraction Improvements
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Stephen Poteet
  • Anne Kao
  • Ping Xue
Aug-2012 ITACS international
doc-2135 tech report Policy-driven Service Composition and Data Sharing in a Coalition Scenario with Trust and Obfuscation
  • Christopher Gibson (IBM UK)
  • Dominic Harries (IBM UK)
  • Andrew Feltham (IBM UK)
  • Saritha Arunkumar (IBM UK)
  • Ben Hardill (IBM UK)
  • Stephen Pipes (IBM UK)
  • Mani Srivastava (UCLA)
  • Boleslaw Szymanski (RPI)
  • Syed Shah (RPI)
  • Petros Zerfos (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Chatschik Bisdikian (IBM US)
Aug-2012 international
doc-2140 poster Distributed Sensor Service Composition with Spatial Constraints with Spatial Constraints
  • Syed Shah (RPI)
  • Petros Zerfos (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Boleslaw Szymanski (RPI)
  • Dominic Harries (IBM UK)
  • Christopher Gibson (IBM UK)
Aug-2012 6th Annual Conference of the International Technology Alliance international
doc-2143a external conference WiFi Access Point Deployment for Efficient Mobile Data Offloading
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Aug-2012 Annual International Conference on Mobile Computing and Networking, 2012 single institute
doc-2170 journal A Hybrid Reasoning Mechanism for Effective Sensor Selection for Tasks
  • Geeth de Mel (ARL)
  • Murat Sensoy (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Aug-2012 Engineering Applications of Artificial Intelligence 26.2 (2013): 873-887. single institute with government
doc-2176 journal Towards Practical ABox Abduction in Large Description Logic Ontologies
  • Jianfeng Du
  • Guilin Qi
  • Yi-Dong Shen
  • Jeff Pan (Aberdeen)
Aug-2012 International Journal of Semantic Web and Information Systems collaborative
doc-2181 journal Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks
  • Mostafa Dehghan (UMass)
  • Dennis Goeckel (UMass)
  • Majid Ghaderi
  • Zhiguo Ding (Imperial)
Aug-2012 IEEE Transactions on Wireless Communications international
doc-2183 journal Broadcast Analysis for Extended Cooperative Wireless Networks
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Aug-2012 IEEE Transactions on Information Theory single institute
doc-2187 demo Semantic Enrichment for Real-time Data-to-Decisions
  • Keith Grueneberg (IBM US)
  • Geeth de Mel (ARL)
  • Xiping Wang (IBM US)
  • Seraphin Calo (IBM US)
  • Tien Pham (ARL)
  • Dave Braines (IBM UK)
Aug-2012 international
doc-2188 demo Demo: Tasking and Sharing Sensing Assets Using Controlled Natural Language
Variants: doc-1855a
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
Aug-2012 collaborative
doc-2189 demo Using Controlled English for Fact Extraction
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Stephen Poteet
  • Simon Laws (IBM UK)
  • Ping Xue
  • Anne Kao
Aug-2012 international
doc-2190 workshop Controlled English - a practical introduction
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Stephen Poteet
Aug-2012 6th Annual Conference of the International Technology Alliance international
doc-1927 external conference Subjective Logic with Uncertain Partial Observations
  • Lance Kaplan (ARL)
  • Supriyo Chakraborty (UCLA)
  • Chatschik Bisdikian (IBM US)
Jul-2012 15th International Conference on Information FUSION collaborative with government
doc-1930 external conference Square Root Law for Communication with Low Probability of Detection on AWGN Channels
Variants: doc-1903
  • Boulat Bash (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Jul-2012 Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on (pp. 448-452). IEEE single institute
doc-1952a external conference Integrating Hard and Soft Information Sources for D2D Using Controlled Natural Language
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Geeth de Mel (ARL)
  • Tien Pham (ARL)
Jul-2012 15th International Conference on Information FUSION international with government
doc-1954 external conference Balancing Value and Risk In Information Sharing Through Obfuscation
Variants: doc-2022
  • Supriyo Chakraborty (UCLA)
  • Kasturi Raghavan (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
Jul-2012 15th International Conference on Information FUSION collaborative with government
doc-2139 journal Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
  • Fengjun Li
  • Bo Luo
  • Peng Liu (PSU)
  • Dongwon Lee (PSU)
  • Chao-Hsien Chu (PSU)
Jul-2012 Information Forensics and Security, IEEE Transactions on 8.6 (2013): 888-900. collaborative
doc-x0794 patent Quality of information assessment in dynamic sensor networks
  • Dakshi Agrawal (IBM US)
  • Chatschik Bisdikian (IBM US)
Jul-2012 U.S. Patent Application 13/552,264 single institute
doc-1857 external conference A cognitive architecture for emergency response
  • Felipe Meneguzzi (CMU)
  • Jean Oh (CMU)
  • Nilanjan Chakraborty (CMU)
  • Katia Sycara (CMU)
  • Siddharth Mehrotra
  • James Tittle
  • Michael Lewis
Jun-2012 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012 collaborative
doc-1861 external conference Sub-delegation and Trust
Variants: doc-2174
  • Chris Burnett (Aberdeen)
  • Nir Oren (Aberdeen)
Jun-2012 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012 single institute
doc-1926 external conference Information Extraction using Controlled English to support Knowledge-Sharing and Decision-Making
  • Ping Xue
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Stephen Poteet
  • Anne Kao
  • Cheryl Giammanco (ARL)
  • Tien Pham (ARL)
Jun-2012 International Command and Control Research Technology Symposium (ICCRTS), 2012 international with government
doc-1997 external conference Convergecast with Aggregatable Data Classes
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Jun-2012 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 collaborative
doc-2003 external conference Knowledge-Oriented Secure Multiparty Computation
Variants: doc-1750
  • Piotr Mardziel (UMD)
  • Mike Hicks (UMD)
  • Jonathan Katz (UMD)
  • Mudhakar Srivatsa (IBM US)
Jun-2012 Proceedings of the 7th Workshop on Programming Languages and Analysis for Security (p. 2). ACM collaborative
doc-2030 journal Market Mechanisms for Resource Allocation in Pervasive Sensor Applications
  • Sahin Geyik (RPI)
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Sanmay Das (RPI)
  • Petros Zerfos (IBM US)
Jun-2012 Pervasive and Mobile Computing collaborative
doc-2066 tech report Representing Typed feature Structures in Controlled English
  • David Mott (IBM UK)
Jun-2012 ITACS single institute
doc-2071 tech report Slidesets on Controlled English
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Stephen Poteet
  • Anne Kao
  • Ping Xue
Jun-2012 international
doc-2122 tech report ACITA Fact Extraction Demonstration Outline
  • David Mott (IBM UK)
Jun-2012 single institute
doc-2177 external conference QoI-Aware Energy Management in Internet-of-Things Sensory Environments
  • Zhanwei Sun
  • Chi Liu (Imperial)
  • Chatschik Bisdikian (IBM US)
  • Joel Branch (IBM US)
  • Bo Jiang (UMass)
Jun-2012 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 international
doc-849 external conference Fine-grained access control of personal data
  • Ting Wang (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Ling Liu
Jun-2012 In Proceedings of the 17th ACM symposium on Access Control Models and Technologies (pp. 145-156). ACM. collaborative
doc-x0044 external conference Data, Information and Knowledge Collaboration, Shared Awareness, and Decision Making
  • Ping Xue
  • Stephen Poteet
  • Anne Kao
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Cheryl Giammanco (ARL)
  • Tien Pham (ARL)
Jun-2012 International Command and Control Research Technology Symposium (ICCRTS), 2012 international with government
doc-x0484 external conference Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information
  • Haksoo Choi (UCLA)
  • Supriyo Chakraborty (UCLA)
  • Mani Srivastava (UCLA)
Jun-2012 Sharing Personal Sensory Information. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1004-1011). IEEE single institute
doc-x0892 external conference Solving non-zero sum multiagent network flow security games with attack costs
  • Steven Okamoto (CMU)
  • Noam Hazon (CMU)
  • Katia Sycara (CMU)
Jun-2012 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012 single institute
doc-1842 external conference Using Subjective Logic to Handle Uncertainty and Conflicts
  • Murat Sensoy (Aberdeen)
  • Jeff Pan (Aberdeen)
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Felipe Meneguzzi (CMU)
May-2012 Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1323-1326). IEEE international
doc-1880 journal The Web-Extended Mind
  • Paul Smart (Southampton)
May-2012 Metaphilosophy Journal single institute
doc-1892 phd thesis Incremental Activity and Plan Recognition for Human Teams
  • Daniele Masato (Aberdeen)
May-2012 single institute
doc-1895 external conference Querying Linked Ontological Data through Distributed Summarization
Variants: doc-1896
  • Achille Fokoue (IBM US)
  • Felipe Meneguzzi (CMU)
  • Murat Sensoy (Aberdeen)
  • Jeff Pan (Aberdeen)
May-2012 AAAI 2012 international
doc-1897 external conference Resource Allocation with Stochastic Demands
  • Fangfei Chen (PSU)
  • Thomas La Porta (PSU)
  • Mani Srivastava (UCLA)
May-2012 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2012 collaborative
doc-1928 external conference An Obfuscation Framework for Controlling Value of Information During Sharing
  • Supriyo Chakraborty (UCLA)
  • Kasturi Raghavan (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
May-2012 Statistical Signal Processing Workshop (SSP), 2012 IEEE (pp. 157-160). IEEE collaborative with government
doc-1941 external conference Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
Variants: doc-2248
  • Nelly Fazio (CUNY)
  • Irippuge Perera (CUNY)
May-2012 Public Key Cryptography-PKC 2012 (pp. 225-242). Springer Berlin Heidelberg single institute
doc-1959 external conference A Computational Model of Collective Sensemaking: Differential Effects of Communication Network Structure on Collective Sensemaking Abilities
  • Paul Smart (Southampton)
May-2012 1th International Conference on Cognitive Modeling (ICCM 12), Berlin, Germany, 13 - 15 Apr 2012. 2pp single institute
doc-1996 journal Energy-Efficient Location Services for Mobile Ad Hoc Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
May-2012 Ad Hoc Networks 11.1 (2013): 273-287. single institute
doc-1998 external conference Studying the Impact of Minority Views in a Computational Model of Collective Sensemaking: The Role of Network Structure
  • Paul Smart (Southampton)
May-2012 4th International Conference on Advanced Cognitive Technologies and Applications (COGNITIVE'12), Nice, France, 22 - 27 Jul 2012. 8pp. single institute
doc-2005 tech report A Data-to-Decision Information Processing Platform for Coalition Operations
  • Alun Preece (Cardiff)
  • Dave Braines (IBM UK)
  • Paul Smart (Southampton)
  • Thomas La Porta (PSU)
  • Mani Srivastava (UCLA)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
May-2012 Was originally submitted to IEEE Intelligent Systems but not accepted international
doc-2006 journal Agilely Assigning Sensing Assets to Mission Tasks in a Coalition Context
  • Alun Preece (Cardiff)
  • Timothy Norman (Aberdeen)
  • Geeth de Mel (IBM US)
  • Diego Pizzocaro (Cardiff)
  • Murat Sensoy (Aberdeen)
  • Tien Pham (ARL)
May-2012 IEEE Intelligent Systems international with government
doc-2007 external conference Utilizing PCFGs for Modeling and Learning Service Compositions in Sensor Networks
Variants: doc-2147a
  • Sahin Geyik (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
May-2012 Services Computing (SCC), 2012 IEEE Ninth International Conference on (pp. 282-289). IEEE single institute
doc-2032 external conference Policy-aware Service Composition in Sensor Networks
  • Raheleh Dilmaghani (IBM US)
  • Sahin Geyik (RPI)
  • Keith Grueneberg (IBM US)
  • Jorge Lobo (IBM US)
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
May-2012 Services Computing (SCC), 2012 IEEE Ninth International Conference on (pp. 186-193). IEEE collaborative
doc-2034 software ISTAR / CE integration details
  • Dave Braines (IBM UK)
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
May-2012 collaborative
doc-2048 tech report Exploitation of Distributed, Uncertain and Obfuscated Information
  • Stephen Pipes (IBM UK)
  • Ben Hardill (IBM UK)
  • Christopher Gibson (IBM UK)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
May-2012 international
doc-2055 external conference Connectivity in Random Hybrid Networks
  • Prithwish Basu (BBN)
  • Saikat Guha (BBN)
  • Sam Nelson (BBN)
  • Don Towsley (UMass)
May-2012 NetSci collaborative
doc-2056 tech report Routing in hybrid networks with security-aware costs
  • Sam Nelson (BBN)
  • Prithwish Basu (BBN)
  • Saikat Guha (BBN)
May-2012 single institute
doc-2058 journal Efficient Algorithms for Neighbor Discovery in Wireless Networks
  • Sudarshan Vasudevan (UMass)
  • Micah Adler
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
May-2012 to appear IEEE/ACM Transactions on Networking collaborative
doc-x0046 external conference Networking & Interoperability of Disparate Coalition Assets - A Coalition Warfare Program (CWP) Project
  • Tien Pham (ARL)
  • Rob Young (DSTL)
  • Gavin Pearson (DSTL)
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
May-2012 NATO IST-112 & SET-183 Joint Symposium on Persistent Surveillance: Networks, Sensors, Architecture, Quebec City, Canada, May 2012. international with government
doc-x0047 external conference Coalition Warfare Program (CWP) Project on Policy Controlled Information Query & Dissemination
  • Andrew Toth (ARL)
  • Tien Pham (ARL)
  • Todd Karr (DSTL)
  • Graham Bent (IBM UK)
  • Dominic Harries (IBM UK)
  • Alan Knox (IBM UK)
May-2012 NATO IST-112 & SET-183 Joint Symposium on Persistent Surveillance: Networks, Sensors, Architecture, Quebec City, Canada, May 2012. international with government
doc-1849a external conference A System Architecture for Exploiting Mission Information Requirement and Resource Allocation
Variants: doc-1849c
  • Fangfei Chen (PSU)
  • Thomas La Porta (PSU)
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Mani Srivastava (UCLA)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 international
doc-1855a external conference Tasking and Sharing Sensing Assets Using Controlled Natural Language
Variants: doc-1855c
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 collaborative
doc-1990 tech report Using Controlled English to express lambda expressions
  • David Mott (IBM UK)
Apr-2012 ITA single institute
doc-2018 external conference Fault Localization in MANET-Hosted Service-Based Systems
Variants: doc-2238
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Apr-2012 Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on (pp. 243-248). IEEE international
doc-2043 external conference Trust and Obfuscation
Variants: doc-1678
  • Murat Sensoy (Aberdeen)
  • Chatschik Bisdikian (IBM US)
  • Nir Oren (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
  • Lance Kaplan (ARL)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 international with government
doc-2047 external conference An architecture for distributed video applications based on declarative networking
  • Xiping Wang (IBM US)
  • Cesar Gonzales (IBM US)
  • Jorge Lobo (IBM US)
  • Seraphin Calo (IBM US)
  • Dinesh Verma (IBM US)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 single institute
doc-2244 external conference Context-rich Semantic Framework for Effective Data-to-Decisions in Coalition Networks
  • Keith Grueneberg (IBM US)
  • Geeth de Mel (ARL)
  • Dave Braines (IBM UK)
  • Xiping Wang (IBM US)
  • Seraphin Calo (IBM US)
  • Tien Pham (ARL)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 international with government
doc-2328 external conference Diagnosing Degradation of Services in Hybrid Wireless Tactical Networks
  • Srikar Tati (PSU)
  • Petr Novotny (Imperial)
  • Bong Jun Ko (IBM US)
  • Alexander Wolf (Imperial)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 international with government
doc-x0045 external conference Intent-based resource deployment in wireless sensor networks
  • Geeth de Mel (IBM US)
  • Tien Pham (ARL)
  • Paul Sullivan (ARL)
  • Keith Grueneberg (IBM US)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 international with government
doc-x0074 external conference ITA/CWP and ICB technology demonstrator: a practical integration of disparate ISR/ISTAR assets and technologies
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
Apr-2012 International Society for Optics and Photonics - Defense, Security and Sensing, 2012 single institute
doc-x0668 external conference MECA: Mobile Edge Capture and Analysis Middleware for Social Sensing Applications
  • Fan Ye (IBM US)
  • Raghu Ganti (IBM US)
  • Raheleh Dilmaghani (IBM US)
  • Keith Grueneberg (IBM US)
  • Seraphin Calo (IBM US)
Apr-2012 Proceedings of the 21st international conference companion on World Wide Web (pp. 699-702). ACM single institute
doc-1685 external conference Secret Communication in Large Wireless Networks without Eavesdropper Location Information
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
Mar-2012 IEEE International Conference on Computer Communications (InfoCom), 2012 single institute
doc-1773 external conference Impact of Directional Transmission in Large-scale Multi-hop Wireless Ad hoc Networks
  • Sid Chau (Cambridge)
  • Richard Gibbens (Cambridge)
  • Don Towsley (UMass)
Mar-2012 IEEE International Conference on Computer Communications (InfoCom), 2012 international
doc-1778 external conference On the Relationship Between Functional Encryption and Fully Homomorphic Encryption
  • Joel Alwen
  • Rosario Gennaro (CUNY)
  • Dov Gordon
Mar-2012 Cryptography and Coding, pp.65-84, 2013/1/1 collaborative
doc-1835 external conference Trust and Obfuscation Principles for Quality of Information in Emerging Pervasive Environments
  • Chatschik Bisdikian (IBM US)
  • Murat Sensoy (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
Mar-2012 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 international
doc-1858 external conference Fusion of Classifiers: A Subjective Logic Perspective
  • Lance Kaplan (ARL)
  • Supriyo Chakraborty (UCLA)
  • Chatschik Bisdikian (IBM US)
Mar-2012 Aerospace Conference, 2012 IEEE (pp. 1-13). IEEE collaborative with government
doc-1862 external conference Predictive Indoor Navigation using Commercial Smart-phones
  • Felipe Meneguzzi (CMU)
  • Balajee Kannan (CMU)
  • Katia Sycara (CMU)
  • Bernardine Dias (CMU)
  • Chet Gnegy
  • Evan Glasgow
  • Piotr Yordanov
Mar-2012 Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 519-525). ACM collaborative
doc-1872 external conference Physical Layer Security from Inter-Session Interference in Large Wireless Networks
  • Azadeh Sheikholeslami (UMass)
  • Dennis Goeckel (UMass)
  • Hossein Pishro-Nik (UMass)
  • Don Towsley (UMass)
Mar-2012 IEEE International Conference on Computer Communications (InfoCom), 2012 single institute
doc-1910 journal Entropy and the Complexity of graphs revisited
  • Abbe Mowshowitz (CUNY)
  • Matthias Dehmer
Mar-2012 Entropy 2012, 14(3), 559-570 collaborative
doc-1924 external conference A Markov Chain Model for Coarse Timescale Channel Variation in an 802.16e Wireless Network
  • Anand Seetharam (UMass)
  • Jim Kurose (UMass)
  • Dennis Goeckel (UMass)
  • Gautam Bhanage
Mar-2012 IEEE International Conference on Computer Communications (InfoCom), 2012 collaborative
doc-1925 external conference A Mixed Queueing Network Model of Mobility in a Campus Wireless Network
  • Yung-Chih Chen (UMass)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Mar-2012 IEEE International Conference on Computer Communications (InfoCom), 2012 single institute
doc-1934 external conference Transient Traffic Congestion Control with Traveling Auctions
  • Syed Shah (RPI)
  • Boleslaw Szymanski (RPI)
Mar-2012 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 single institute
doc-1936 external conference On Growth of Limited Scale-Free Overlay Network Topologies
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Mar-2012 IEEE International Conference on Computer Communications (InfoCom), 2012 single institute
doc-2029 journal Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Mar-2012 IEEE Trans. Parallel and Distributed Systemes single institute
doc-x0075 journal Utility-based Bandwidth Adaptation in Mission-Oriented Wireless Sensor Networks
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Flavio Bergamaschi (IBM UK)
  • Thomas La Porta (PSU)
Mar-2012 ACM Transactions on Sensor Networks, vol. 8, no. 2, New York, NY, USA, 03-Mar-2012. international
doc-x0716 external conference Network coding for facilitating secrecy in large wireless networks
Variants: doc-2064
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
Mar-2012 Information Sciences and Systems (CISS), 2012 46th Annual Conference on (pp. 1-6). IEEE. single institute
doc-1836 journal Learning Strategies for Task Delegation in Norm-Governed Environments
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Simon Parsons (CUNY)
Feb-2012 JAAMAS international
doc-1873 journal On the Application of Cooperative Transmission to Secrecy Communications
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Feb-2012 IEEE Journal on Selected Areas in Communications: Special Issue on Cooperative Networking: Challenges and Applications international
doc-1881 external conference Modelling the Dynamics of Team Sensemaking: A Constraint Satisfaction Approach
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
Feb-2012 Knowledge Systems for Coalition Operations (KSCO), 2012 single institute
doc-1890 journal On the Quality and Value of Information in Sensor Networks
Variants: doc-1542
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Mani Srivastava (UCLA)
Feb-2012 ACM Transactions on Sensor Networks (TOSN) 9.4 (2013): 48. collaborative with government
doc-1896 tech report Querying Linked Ontological Data through Distributed Summarization
Variants: doc-1896,doc-2041
  • Achille Fokoue (IBM US)
  • Felipe Meneguzzi (CMU)
  • Murat Sensoy (Aberdeen)
  • Jeff Pan (Aberdeen)
Feb-2012 international
doc-1902 external conference Adaptive algorithms for diagnosing large-scale failures in computer networks
Variants: doc-2639
  • Srikar Tati (PSU)
  • Bong Jun Ko (IBM US)
  • Guohong Cao (PSU)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
Feb-2012 Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on (pp. 1-12). IEEE collaborative with government
doc-1907 tech report Ambiguous words
  • David Mott (IBM UK)
Feb-2012 ITA single institute
doc-1908 journal Enforcing Secure and Privacy-Preserving Information Brokering
  • Fengjun Li
  • Bo Luo
  • Peng Liu (PSU)
  • Dongwon Lee (PSU)
  • Chao-Hsien Chu (PSU)
Feb-2012 Information Forensics and Security, IEEE Transactions on 8.6 (2013): 888-900. collaborative
doc-1909 tech report The Prolog Analyst's Helper
  • David Mott (IBM UK)
Feb-2012 ITA single institute
doc-1913 tech report Fact Extraction using CNL: summary of reasoning
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Stephen Poteet
Feb-2012 ITA international
doc-1921 book chapter Declarative Distributed Computing
Variants: doc-2051
  • Jorge Lobo (IBM US)
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Franck Le (IBM US)
Feb-2012 correct reasoning international
doc-1923 journal On Managing Quality of Experience of Multiple Video Streams in Wireless Networks
  • Partha Dutta
  • Anand Seetharam (UMass)
  • Vijay Arya
  • Malolan Chetlur
  • Shivkumar Kalyanraman
  • Jim Kurose (UMass)
Feb-2012 Mobile Computing, IEEE Transactions on, 14(3), 619-631 collaborative
doc-1929 external conference Foundations of Logic-Based Trust Management
  • Moritz Becker
  • Alessandra Russo (Imperial)
  • Nik Sultana (Cambridge)
Feb-2012 Security and Privacy (SP), 2012 IEEE Symposium on (pp. 161-175). IEEE collaborative
doc-1931 tech report Flexible configuration of information extraction to support richer propositional constructs
  • Stephen Poteet
  • Dave Braines (IBM UK)
Feb-2012 ITA international
doc-1933 tech report Survey on clustering methods for ontological knowledge
  • Yuqing Tang (CMU)
  • Katia Sycara (CMU)
  • Murat Sensoy (Aberdeen)
  • Jeff Pan (Aberdeen)
Feb-2012 international
doc-1939 external conference Optimal Sampling Strategies for Minimum Latency Routing with Imperfect Link State
  • Saikat Guha (BBN)
  • Don Towsley (UMass)
  • Prithwish Basu (BBN)
  • Howard Tripp (Roke)
  • Timothy Freeman (Roke)
  • Dmitriy Katz-Rogozhnikov (IBM US)
  • Robert Hancock (Roke)
  • Jim Kurose (UMass)
Feb-2012 Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2012 10th International Symposium on (pp. 81-88). IEEE international
doc-x0028 external conference Lessons Learned from an Evaluation of a Shared Representation to Support Collaborative Planning
  • Michael Dorneich
  • David Mott (IBM UK)
  • Ali Bahrami
  • John Allen (Honeywell)
  • Jitu Patel (DSTL)
  • Cheryl Giammanco (ARL)
Feb-2012 Knowledge Systems for Coalition Operations (KSCO), 2012 international with government
doc-x0048 external conference Data and Information Sharing for Coalition Operations
  • Tien Pham (ARL)
  • Greg Cirincione (ARL)
Feb-2012 Knowledge Systems for Coalition Operations (KSCO), 2012 single institute with government
doc-x0372 external conference An Interoperable Framework for Distributed Coalition Planning: The Collaborative Planning Model
  • Tom Klapiscak (IBM UK)
  • John Ibbotson (IBM UK)
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Jitu Patel (DSTL)
Feb-2012 Knowledge Systems for Coalition Operations (KSCO), 2012 collaborative with government
doc-x0817 external conference Recognizing team context during simulated missions
  • Stephen Poltrock
  • Mark Handel
  • Stephen Poteet
  • Paul Murray
Feb-2012 Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (pp. 197-206). ACM single institute
doc-x0914 patent System and method for utility sampling for trust metrics in PKI
  • Dakshi Agrawal (IBM US)
  • Charanjit Jutla (IBM US)
Feb-2012 U.S. Patent No. 8,116,450 single institute
doc-1238 journal Aggregate Message Authentication Codes
  • Jonathan Katz (UMD)
  • Yehuda Lindell
Jan-2012 Topics in Cryptology-CT-RSA 2008. Springer Berlin Heidelberg, 2008. 155-169. collaborative
doc-1809 external conference Percolation Phenomena in Networks under Random Dynamics
  • Prithwish Basu (BBN)
  • Saikat Guha (BBN)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Jan-2012 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2012 collaborative with government
doc-2242 journal Prognostic Normative Reasoning
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
2012 Engineering Applications of Artificial Intelligence international
doc-2304 external conference Opportunism vs. Cooperation: Comparing Forwarding Strategies in Multihop Wireless Networks with Random Fading
Variants: doc-1748a
  • Sid Chau (Cambridge)
  • Anand Seetharam (UMass)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Jan-2012 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2012 international
doc-x0215 journal More is more: The benefits of dense sensor deployment.
Variants: doc-x1031
  • Matthew Johnson (CUNY)
  • Deniz Sarioz (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Dinesh Verma (IBM US)
  • Chai Wah Wu (IBM US)
2012 ACM Transactions on Sensor Networks (TOSN) 8, no. 3 (2012): 22 collaborative
doc-x0221 journal Secure incentives for commercial ad dissemination in vehicular networks
Variants: doc-x0174
  • Suk-Bok Lee (UCLA)
  • Gabriel Pan (UCLA)
  • Joon-Sang Park
  • Mario Gerla (UCLA)
  • Songwu Lu (UCLA)
2012 Vehicular Technology, IEEE Transactions on, 61(6), 2715-2728 collaborative
doc-x0309 external conference A Declarative Framework for the Analysis of Routing Protocols
Variants: doc-2052
  • Jiefei Ma (Imperial)
  • Jorge Lobo (IBM US)
  • Franck Le (IBM US)
  • Alessandra Russo (Imperial)
2012 ICNP2012 international
doc-x0347 journal Adaptive in-network processing for bandwidth and energy constrained mission-oriented multihop wireless networks
  • Sharanya Eswaran (PSU)
  • James Edwards (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
2012 Mobile Computing, IEEE Transactions on, 11(9), 1484-1498. collaborative
doc-x0365 phd thesis Allocating Virtual and Physical Flows for Multiagent Teams in Mutable, Networked Environments
  • Steven Okamoto (CMU)
2012 (No. CMU-CS-12-129). CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE. single institute
doc-x0385 external conference Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
  • Benoit Libert
  • Kenny Paterson (RHUL)
  • Elizabeth Quaglia (RHUL)
2012 Public Key Cryptography-PKC 2012 (pp. 206-224). Springer Berlin Heidelberg. collaborative
doc-x0403 patent Automated data conversion and route tracking in distributed databases
  • Adrian Lee (IBM UK)
2012 U.S. Patent No. 8,301,583. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0448 journal Control-theoretic utility maximization in multihop wireless networks under mission dynamics
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
2012 IEEE/ACM Transactions on Networking (TON), 20(4), 1082-1095 collaborative
doc-x0480 external conference Delegatable homomorphic encryption with applications to secure outsourcing of computation
  • Marco Barbosa
  • Pooya Farshim (RHUL)
2012 Topics in Cryptology-CT-RSA 2012 (pp. 296-312). Springer Berlin Heidelberg collaborative
doc-x0492 patent Discovering network topology from routing information
  • Dakshi Agrawal (IBM US)
  • Bong Jun Ko (IBM US)
  • Mudhakar Srivatsa (IBM US)
2012 U.S. Patent No. 8,310,931. Washington, DC: U.S. Patent and Trademark Office single institute
doc-x0523 patent Enabling connections for use with a network
  • Graham Bent (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Christopher Gibson (IBM UK)
2012 U.S. Patent No. 8,250,140. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0525 tech report Endhost-Based Shortest Path Routing in Dynamic Networks: Supporting Materials
  • Ting He (IBM US)
  • Dennis Goeckel (UMass)
  • Ramya Raghavendra (IBM US)
  • Don Towsley (UMass)
2012 IBM, Tech. Rep., 2012,�http://researcher.�ibm. com/files/usthe/rc071201. collaborative
doc-x0572 external conference Functional encryption for threshold functions (or fuzzy ibe) from lattices
  • Dakshi Agrawal (IBM US)
  • Xavier Boyen
  • Vinod Vaikuntanathan
  • Panagiotis Voulgaris
  • Hoeteck Wee (CUNY)
2012 Public Key Cryptography-PKC 2012 (pp. 280-297). Springer Berlin Heidelberg. international
doc-x0609 journal Improving acoustic vehicle classification by information fusion
  • Baofeng Guo (Southampton)
  • Mark Nixon (Southampton)
  • Thyagaraju Damarla (ARL)
2012 Pattern Analysis and Applications, 15(1), 29-43 international with government
doc-x0617 tech report Inference Management: Trust and Obfuscation in Coalition Settings
Variants: doc-2023
  • Chatschik Bisdikian (IBM US)
  • Murat Sensoy (Aberdeen)
  • Nir Oren (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
  • Lance Kaplan (ARL)
2012 IBM THOMAS J WATSON RESEARCH CENTER HAWTHORNE NY international
doc-x0647 journal Limitations of generating a secret key using wireless fading under active adversary
  • Murtaza Zafer (IBM US)
  • Dakshi Agrawal (IBM US)
  • Mudhakar Srivatsa (IBM US)
2012 IEEE/ACM Transactions on Networking (TON), 20(5), 1440-1451 single institute
doc-x0653 tech report Localization in cognitive radio systems in the presence of spatially obfuscated data
  • Supriyo Chakraborty (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Raghu Ganti (IBM US)
2012 Technical Report TR-UCLA-NESL-201205-01, NESL collaborative
doc-x0669 patent Mechanism for content management in wireless mobile networks
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
  • Suk-Bok Lee (UCLA)
2012 U.S. Patent No. 8,340,690. Washington, DC: U.S. Patent and Trademark Office. collaborative
doc-x0670 patent Method and apparatus for detection of malicious behavior in mobile ad-hoc networks
  • Dinesh Verma (IBM US)
2012 U.S. Patent No. 8,122,505. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0674 patent Method and system for self-organizing computer systems
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
  • Brian Rivera (ARL)
  • Ananthram Swami (ARL)
2012 U.S. Patent No. 8,140,651. Washington, DC: U.S. Patent and Trademark Office. collaborative with government
doc-x0711 external conference NaaS: Network-as-a-Service in the Cloud
  • Paolo Costa
  • Matteo Migliavacca
  • Peter Pietzuch (Imperial)
  • Alexander Wolf (Imperial)
2012 Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise collaborative
doc-x0814 journal Reasoning support for flexible task resourcing
  • Murat Sensoy (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
2012 Expert Systems With Applications, 39(2), 1998-2010 international
doc-x0852 patent Saving bandwidth in transmission of compressed data
  • Dakshi Agrawal (IBM US)
  • Vasilieos Pappas (IBM US)
  • Ramya Raghavendra (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Dinesh Verma (IBM US)
  • Starsky Wong (IBM US)
2012 U.S. Patent Application No. 13/679,487 single institute
doc-x1050 patent Optimising data transmission in a hypercube network
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Paul Stone (IBM UK)
2012 U.S. Patent Application No. 14/237,403 single institute
doc-x0331 external conference A new distributed optimization framework for hybrid ad-hoc networks
  • George Tychogiorgos (Imperial)
  • Athanasios Gkelias (Imperial)
  • Kin Leung (Imperial)
Dec-2011 IEEE Global Communications Conference (GlobeCom), 2011 single institute
doc-1669 external conference On Quantitative Information Flow Metrics
  • Ji Zhu
  • Mudhakar Srivatsa (IBM US)
Nov-2011 ACM CCS 2011 (short paper) collaborative
doc-1670a software CE Store - Alpha Version 2 (software)
  • Dave Braines (IBM UK)
Nov-2011 single institute
doc-1838 external conference On the benefit of ontological reasoning in collaborative problem-solving
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Simon Parsons (CUNY)
Nov-2011 European Workshop on Multi-Agent Systems (EUMAS), 2011 international
doc-1840 journal OWL-POLAR: A Framework for Semantic Policy Representation and Reasoning
  • Murat Sensoy (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
Nov-2011 JWS international
doc-1863 external conference BDI Reasoning with Normative Considerations
  • Felipe Meneguzzi (CMU)
  • Nir Oren (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Michael Luck
Nov-2011 Engineering Applications of Artificial Intelligence, 43, 127-146 international
doc-1864 tech report Logics and Methods to Deal with Conflicting Information
  • Felipe Meneguzzi (CMU)
  • Murat Sensoy (Aberdeen)
Nov-2011 international
doc-1874 external conference Learning Stochastic Models of Information Flow
  • Luke Dickens (Imperial)
  • Ian Molly (IBM US)
  • Jorge Lobo (IBM US)
  • Pau-Chen Cheng (IBM US)
  • Alessandra Russo (Imperial)
Nov-2011 Data Engineering (ICDE), 2012 IEEE 28th International Conference on (pp. 570-581). IEEE international
doc-1875 external conference Risk-Based Security Decisions Under Uncertainty
  • Ian Molly (IBM US)
  • Luke Dickens (Imperial)
  • Charles Morisset (RHUL)
  • Pau-Chen Cheng (IBM US)
  • Jorge Lobo (IBM US)
  • Alessandra Russo (Imperial)
Nov-2011 Proceedings of the second ACM conference on Data and Application Security and Privacy (pp. 157-168). ACM international
doc-1877 external conference Balancing Behavioral Privacy and Information Utility in Sensory Data Flows
Variants: doc-2643
  • Supriyo Chakraborty (UCLA)
  • Zainul Charbiwala (UCLA)
  • Haksoo Choi (UCLA)
  • Kasturi Raghavan (UCLA)
  • Mani Srivastava (UCLA)
Nov-2011 Pervasive and Mobile Computing, 8(3), 331-345 single institute
doc-x0016 external conference Switch-and-Navigate: Controlling Data Ferry Mobility for Delay-Bounded Messages
  • Liang Ma (Imperial)
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Nov-2011 IEEE Military Communications Conference, 2011 international with government
doc-x0612 external conference Improving WSN application QoS and network lifetime management using SOA strategies
  • Carolyn Ortega (CUNY)
  • Ted Brown (CUNY)
  • John Ibbotson (IBM UK)
  • Robert Hancock (Roke)
Nov-2011 IEEE Military Communications Conference, 2011 international
doc-1668b external conference Dynamic Enforcement of Knowledge-based Security Policies
Variants: doc-1900
  • Piotr Mardziel (UMD)
  • Stephen Magill (UMD)
  • Mike Hicks (UMD)
  • Mudhakar Srivatsa (IBM US)
Oct-2011 Maryland CyberSecurity collaborative
doc-1742 external conference Self-Adaptive Routing in Multi-Hop Sensor Networks
  • Themistoklis Bourdenas (Imperial)
  • David Wood (IBM US)
  • Petros Zerfos (IBM US)
  • Flavio Bergamaschi (IBM UK)
  • Morris Sloman (Imperial)
Oct-2011 IEEE International Conference on Network and Service Management (CNSM), 2011 international
doc-1802 external conference Policy Refinement: Decomposition and Operationalization for Dynamic Domains
Variants: doc-1801
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Emil Lupu (Imperial)
  • Alessandra Russo (Imperial)
  • Morris Sloman (Imperial)
Oct-2011 IEEE International Conference on Network and Service Management (CNSM), 2011 international
doc-1839 external conference Probabilistic Abox Abduction in Description Logics
Variants: doc-1677
  • Murat Sensoy (Aberdeen)
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Jeff Pan (Aberdeen)
Oct-2011 7th International Workshop on Scalable Semantic Web Knowledge Base Systems (SSWS'11) international
doc-1847 external conference Exploiting Local Knowledge for Multi Sensor-Task Allocation
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
Oct-2011 NATO SET-176 RSM Autonomous Sensing & Multi-Sensor Integration for ISR Applications single institute
doc-1870 tech report Provenance and Secure Information Flows: A Discussion Paper
  • John Ibbotson (IBM UK)
  • Mudhakar Srivatsa (IBM US)
  • Mike Hicks (UMD)
Oct-2011 international
doc-x0049 external conference Autonomous UAV Persistent Surveillance using Bio-Inspired Strategies with Distributed Sensor Networks, the Sensor Network Fabric, Phenomenology Based Sensing and Optimal Sensor Placement
  • Jerry Burman
  • Joao Hesphana
  • Upamanyu Madhow
  • Tien Pham (ARL)
  • Keith Wilson
  • Flavio Bergamaschi (IBM UK)
Oct-2011 NATO SET-176 RSM Symposium on Autonomous Sensing and Multi-Sensor Integration for ISR Applications, Cardiff, UK, Oct 2011 international with government
doc-x0509 external conference Dynamic graph properties of mobile networks under levy walk mobility
  • Berk Birand
  • Murtaza Zafer (IBM US)
  • Gill Zussman
  • Kang-won Lee (IBM US)
Oct-2011 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2011 collaborative
doc-1672 internal conference Broadcast Scheduling with Data Bundles
Variants: doc-x0419
  • Fangfei Chen (PSU)
  • Diego Pizzocaro (Cardiff)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Alun Preece (Cardiff)
  • Thomas La Porta (PSU)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1677 internal conference Probabilistic Abox Abduction in Description Logics
Variants: doc-1839
  • Murat Sensoy (Aberdeen)
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1678 internal conference Trust and Obfuscation
Variants: doc-2043
  • Murat Sensoy (Aberdeen)
  • Chatschik Bisdikian (IBM US)
  • Chris Burnett (Aberdeen)
  • Nir Oren (Aberdeen)
  • Mani Srivastava (UCLA)
  • Timothy Norman (Aberdeen)
  • Achille Fokoue (IBM US)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Lance Kaplan (ARL)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1681 internal conference A generic agent architecture for norm-compliant planning assistance
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1683 internal conference Anytime Cognition: An information agent for emergency response
  • Felipe Meneguzzi (CMU)
  • Jean Oh (CMU)
  • Nilanjan Chakraborty (CMU)
  • Katia Sycara (CMU)
  • Siddharth Mehrotra
  • Michael Lewis
Sep-2011 5th Annual Conference of the International Technology Alliance collaborative
doc-1684 internal conference An experimental domain for data-to-decision
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Jeff Pan (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Mani Srivastava (UCLA)
  • Achille Fokoue (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1686 internal conference Cut Results for the Capacity of Hybrid Networks
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Richard Gibbens (Cambridge)
  • Ananthram Swami (ARL)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1722 internal conference Everlasting Secrecy in Two-Hop Wireless Networks Using Artificial Noise Generation from Relays
  • Dennis Goeckel (UMass)
  • Sudarshan Vasudevan (UMass)
  • Don Towsley (UMass)
  • Stephan Adams (UMass)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1723 internal conference Two-Way Secrecy Schemes for the Broadcast Channel with Internal Eavesdroppers
Variants: doc-1726
  • Chee Leow (Imperial)
  • Dennis Goeckel (UMass)
  • Kin Leung (Imperial)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1728 internal conference OWL-POLAR: Semantic Policies for Agent Reasoning
Variants: doc-814a
  • Murat Sensoy (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1732 internal conference Towards Securing Query Processing in Distributed Databases
  • Qiang Zeng (PSU)
  • Jorge Lobo (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance collaborative
doc-1735 internal conference Controlled language in support of automated information extraction (Demonstration)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Anne Kao
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1737 internal conference Semantically Enriched Data for Effective Sensor Data Fusion
Variants: doc-x0052
  • Geeth de Mel (Aberdeen)
  • Tien Pham (ARL)
  • Thyagaraju Damarla (ARL)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1739 internal conference Integrative Use of Information Extraction, Semantic Matchmaking and Adaptive Coupling Techniques in Support of Distributed Information Processing and Decision-Making
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Alun Preece (Cardiff)
  • Anne Kao
  • Stephen Poteet
  • Ping Xue
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1743 internal conference Sensor Service Selection through Switch Options
Variants: doc-x0879
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Abbe Mowshowitz (CUNY)
Sep-2011 5th Annual Conference of the International Technology Alliance collaborative
doc-1746 internal conference Directional Forwarding in Multi-hop Wireless Ad hoc Networks: A Connectivity Study
  • Sid Chau (Cambridge)
  • Richard Gibbens (Cambridge)
  • Don Towsley (UMass)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1747 internal conference A simple queueing network model of mobility in a campus wireless network
  • Yung-Chih Chen (UMass)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Sep-2011 5th Annual Conference of the International Technology Alliance single institute
doc-1748a internal conference Opportunism vs. Cooperation: Comparing Forwarding Strategies in Multihop Wireless Networks with Random Fading
Variants: doc-2304
  • Sid Chau (Cambridge)
  • Anand Seetharam (UMass)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1749 internal conference Impact of In-network Aggregation on Target Tracking Quality
Variants: doc-1682
  • Wei Wei (UMass)
  • Ting He (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Dennis Goeckel (UMass)
  • Bo Jiang (UMass)
  • Lance Kaplan (ARL)
  • Don Towsley (UMass)
Sep-2011 5th Annual Conference of the International Technology Alliance collaborative
doc-1750 internal conference Knowledge-oriented Secure Multiparty Computation
Variants: doc-2003
  • Piotr Mardziel (UMD)
  • Stephen Magill (UMD)
  • Mike Hicks (UMD)
  • Jonathan Katz (UMD)
Sep-2011 5th Annual Conference of the International Technology Alliance single institute
doc-1754 internal conference Performance Diagnosis of Services in Scalable and Dynamic Networks
  • Srikar Tati (PSU)
  • Scott Rager (PSU)
  • Bong Jun Ko (IBM US)
  • Guohong Cao (PSU)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
Sep-2011 5th Annual Conference of the International Technology Alliance collaborative
doc-1755 internal conference netSCI: A generic fault diagnosis algorithm for large scale failures
  • Srikar Tati (PSU)
  • Petr Novotny (Imperial)
  • Bong Jun Ko (IBM US)
  • Alexander Wolf (Imperial)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1757 internal conference Exploiting Domain Knowledge in Collaborative Missions
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1759 internal conference Simulating MANET-Hosted Service-Based Systems
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1760 internal conference Discovering Service Dependencies in Mobile Ad Hoc Networks
Variants: doc-1860
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
  • Sihyung Lee (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1769 internal conference Computing joins on encrypted data
  • William Skeith (CUNY)
  • Abbe Mowshowitz (CUNY)
  • Graham Bent (IBM UK)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1772 internal conference Cooperative Monitoring of Service Performance in Mobile Networks
  • Sisi Liu
  • Bong Jun Ko (IBM US)
  • Hyoil Kim (IBM US)
  • Murtaza Zafer (IBM US)
  • Kang-won Lee (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance collaborative
doc-1779 internal conference Tracing Insider Attacks in the Context of Predicate Encryption Schemes
  • Jonathan Katz (UMD)
  • Dominique Schroder (UMD)
Sep-2011 5th Annual Conference of the International Technology Alliance single institute
doc-1799 internal conference Using Declarative Networking Rules to Secure Overlay Networks
  • Maroun Touma (IBM US)
  • Jorge Lobo (IBM US)
  • Seraphin Calo (IBM US)
  • Alessandra Russo (Imperial)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1800 internal conference Distributed Policy Analysis With Confidentiality
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
  • Krysia Broda (Imperial)
  • Jorge Lobo (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1801 internal conference Policy Refinement:Decomposition and Operationalization for Dynamic Domains
Variants: doc-1802
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Emil Lupu (Imperial)
  • Alessandra Russo (Imperial)
  • Morris Sloman (Imperial)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1803 internal conference Risk-based Access Control Decisions Under Uncertainty
  • Ian Molloy (IBM US)
  • Pau-Chen Cheng (IBM US)
  • Jorge Lobo (IBM US)
  • Luke Dickens (Imperial)
  • Alessandra Russo (Imperial)
  • Charles Morisset (RHUL)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1806 internal conference Making use of mobility modelling in the experimental framework
  • Howard Tripp (Roke)
  • Sam Empson (Roke)
  • Robert Hancock (Roke)
  • Alberto Medina (BBN)
  • Prithwish Basu (BBN)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-1860 external conference Discovering Service Dependencies in Mobile Ad Hoc Networks
Variants: doc-1760
  • Petr Novotny (Imperial)
  • Alexander Wolf (Imperial)
  • Bong Jun Ko (IBM US)
Sep-2011 Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 527-533). IEEE international
doc-899b internal conference Trust Decision Making in Delegation Relationships
Variants: doc-899a
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-x0317 internal conference A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks
  • Yang Song (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
Sep-2011 5th Annual Conference of the International Technology Alliance single institute
doc-x0600 internal conference HyperD: a hypercube topology for dynamic distributed federated databases
  • Andi Toce (CUNY)
  • Abbe Mowshowitz (CUNY)
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-x0718 internal conference Network topology as a cost factor in query optimization
  • Abbe Mowshowitz (CUNY)
  • Akira Kawaguchi (CUNY)
  • Andi Toce (CUNY)
  • Andrew Nagel (CUNY)
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
Sep-2011 5th Annual Conference of the International Technology Alliance international
doc-x0745 external conference Optimal gateway selection in multi-domain wireless networks: a potential game perspective
  • Yang Song (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
Sep-2011 Proceedings of the 17th annual international conference on Mobile computing and networking (pp. 325-336). ACM. single institute
doc-x0944 external conference Towards a fair non-convex resource allocation in wireless networks
  • George Tychogiorgos (Imperial)
  • Athanasios Gkelias (Imperial)
  • Kin Leung (Imperial)
Sep-2011 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2011 single institute
doc-x0974 external conference Understanding stateful vs stateless communication strategies for ad hoc networks
  • Victor Manfredi (UMass)
  • Mark Crovella
  • Jim Kurose (UMass)
Sep-2011 Proceedings of the 17th annual international conference on Mobile computing and networking (pp. 313-324). ACM collaborative
doc-1659 workshop Coalition Information Exchange (Workshop)
  • Achille Fokoue (IBM US)
  • John Ibbotson (IBM UK)
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
Aug-2011 5th Annual Conference of the International Technology Alliance international
doc-1676 tech report Worked example from the CE workshop
  • Dave Braines (IBM UK)
  • David Mott (IBM UK)
  • Anne Kao
  • Stephen Poteet
  • Ping Xue
Aug-2011 Boeing, Seattle (internal workshop) international
doc-1680 external conference Trust-based Probabilistic Query Answering
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Rob Young (DSTL)
Aug-2011 Web Information System Engineering-WISE 2011 (pp. 57-71). Springer Berlin Heidelberg international with government
doc-1726 external conference Two-way secrecy schemes for the broadcast channel with internal eavesdroppers
Variants: doc-1723
  • Chee Leow (Imperial)
  • Dennis Goeckel (UMass)
  • Kin Leung (Imperial)
Aug-2011 Asilomar 2011 international
doc-1758a phd thesis Informing Dialogue Strategy through Argumentation-Derived Evidence
  • Chukwuemeka Emele (Aberdeen)
Aug-2011 single institute
doc-1774 tech report Collective Cognition in Military Coalition Environments - Q1 Research Update
  • Paul Smart (Southampton)
Aug-2011 ECS, Southampton single institute
doc-1776 external conference Verifiable Delegation of Computation over Large Datasets
  • Siavosh Benabbas
  • Rosario Gennaro (CUNY)
  • Yevgeniy Vahlis
Aug-2011 IACR Annual International Cryptology Conference (CRYPTO), 2011 collaborative
doc-x0707 external conference Multiagent communication security in adversarial settings
  • Steven Okamoto (CMU)
  • Praveen Paruchuri (CMU)
  • Yongzhi Wang
  • Katia Sycara (CMU)
  • Janusz Marecki (IBM US)
  • Mudhakar Srivatsa (IBM US)
Aug-2011 Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on (Vol. 2, pp. 296-303). IEEE. collaborative
doc-1668a tech report Dynamic Enforcement of Knowledge-based Security Policies
Variants: doc-1900,doc-1668b
  • Piotr Mardziel (UMD)
  • Stephen Magill (UMD)
  • Mike Hicks (UMD)
  • Mudhakar Srivatsa (IBM US)
Jul-2011 UMD TechReport collaborative
doc-1679 external conference An Agent Architecture for Prognostic Reasoning Assistance
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
Jul-2011 22nd International Joint Conference on Artificial Intelligence, 2011 international
doc-x0050 external conference QoI-based resource allocation for multi-target tracking in energy constrained sensor networks
  • Srikanth Hariharan
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Tien Pham (ARL)
Jul-2011 14th International Conference on Information FUSION collaborative with government
doc-x0362 external conference Agent-oriented incremental team and activity recognition
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
Jul-2011 22nd International Joint Conference on Artificial Intelligence, 2011 international
doc-x0759 external conference Performance evaluation of secure network coding using homomorphic signature
  • Seung-Hoon Lee (UCLA)
  • Mario Gerla (UCLA)
  • Hugo Krawczyk (IBM US)
  • Kang-won Lee (IBM US)
  • Elizabeth Quaglia (RHUL)
Jul-2011 Network Coding (NetCod), 2011 International Symposium on (pp. 1-6). IEEE. international
doc-x0879 external conference Sensor service selection through switch options
Variants: doc-1743
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Abbe Mowshowitz (CUNY)
Jul-2011 Services Computing (SCC), 2011 IEEE International Conference on (pp. 717-724). IEEE collaborative
doc-x0961 external conference Trust decision-making in multi-agent systems
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
Jul-2011 22nd International Joint Conference on Artificial Intelligence, 2011 international
doc-1674 external conference A Distributed Architecture For Heterogeneous Multi Sensor-Task Allocation
  • Diego Pizzocaro (Cardiff)
  • Alun Preece (Cardiff)
  • Fangfei Chen (PSU)
  • Thomas La Porta (PSU)
  • Amotz Bar-Noy (CUNY)
Jun-2011 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2011 international
doc-x0353 external conference Adaptively secure broadcast, revisited
  • Juan Garay
  • Jonathan Katz (UMD)
  • Ranjit Kumaresan (UMD)
  • Hong-Sheng Zhou
Jun-2011 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing (pp. 179-186). ACM. collaborative
doc-x0497 external conference Distributed Overlay Construction to Support Policy-Based Access Control
  • Bong Jun Ko (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
  • Sid Chau (Cambridge)
Jun-2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011 international
doc-x0677 external conference Minimum congestion mapping in a cloud
Variants: doc-x0678
  • Nikhil Bansal (IBM US)
  • Kang-won Lee (IBM US)
  • Viswanath Nagarajan (IBM US)
  • Murtaza Zafer (IBM US)
Jun-2011 Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing (pp. 267-276). ACM single institute
doc-x0691 external conference Modeling data flow in socio-information networks: a risk estimation approach
  • Ting Wang (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Dakshi Agrawal (IBM US)
  • Ling Liu
Jun-2011 Proceedings of the 16th ACM symposium on Access control models and technologies (pp. 113-122). ACM collaborative
doc-x0867 external conference Selecting relevant sensor providers for meeting your quality information needs
  • George Tychogiorgos (Imperial)
  • Chatschik Bisdikian (IBM US)
Jun-2011 Mobile Data Management (MDM), 2011 12th IEEE International Conference on (Vol. 1, pp. 200-205). IEEE international
doc-x1046 external conference Policy Supersession in a Coalition ISR Network
  • Keith Grueneberg (IBM US)
  • David Wood (IBM US)
  • Xiping Wang (IBM US)
  • Seraphin Calo (IBM US)
  • Maroun Touma (IBM US)
Jun-2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011 single institute
doc-1753 external conference netCSI: A generic fault diagnosis algorithm for large-scale failures in computer networks
Variants: doc-x1044
  • Srikar Tati (PSU)
  • Scott Rager (PSU)
  • Bong Jun Ko (IBM US)
  • Guohong Cao (PSU)
  • Ananthram Swami (ARL)
  • Thomas La Porta (PSU)
May-2011 Reliable Distributed Systems (SRDS), 2011 30th IEEE Symposium on (pp. 167-176). IEEE collaborative with government
doc-x0017 external conference Dispatch-and-Search: Dynamic Multi-Ferry Control in Partitioned Mobile Networks
  • Ting He (IBM US)
  • Ananthram Swami (ARL)
  • Kang-won Lee (IBM US)
May-2011 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2011 collaborative with government
doc-x0051 external conference The ITA Sensor Fabric & Policy Management Toolkit
  • Tien Pham (ARL)
  • Gavin Pearson (DSTL)
  • Seraphin Calo (IBM US)
  • Flavio Bergamaschi (IBM UK)
May-2011 8th NATO Military Sensing Symposium, Friedrichshafen, GER, May 2011. international with government
doc-x0389 external conference Approximation methods for infinite Bayesian Stackelberg games: Modeling distributional payoff uncertainty
  • Christopher Kiekenveld (IBM US)
  • Janusz Marecki (IBM US)
  • Milind Tambe (IBM US)
May-2011 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 single institute
doc-x0391 external conference Argumentation strategies for plan resourcing
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
May-2011 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 international
doc-x0461 journal Cooperative wireless networks: from radio to network protocol designs
  • Zhengguo Sheng (Imperial)
  • Kin Leung (Imperial)
  • Zhiguo Ding (Imperial)
May-2011 Communications Magazine, IEEE, 49(5), 64-69 single institute
doc-x0474 external conference Decorrelating WSN traffic patterns with maximally uninformative constrained routing
  • Juan Tapiador
  • Mudhakar Srivatsa (IBM US)
  • John Clark
  • John McDermid
May-2011 NETWORKING 2011 Workshops (pp. 207-218). Springer Berlin Heidelberg international
doc-x0773 external conference Policy refinement of network services for MANETs
  • Hang Zhao
  • Jorge Lobo (IBM US)
  • Arnab Roy (IBM US)
  • Steve Bellovin
May-2011 Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on (pp. 113-120). IEEE. collaborative
doc-x0896 external conference Sources of stereotypical trust in multi-agent systems
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
May-2011 Proceedings of the 14th International Workshop on Trust in Agent Societies (p. 25). international
doc-x1040 external conference Prognostic agent assistance for norm-compliant coalition planning
Variants: doc-x1041
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
May-2011 INFRASTRUCTURES AND TOOLS FOR MULTIAGENT SYSTEMS, 120 international
doc-x1041 external conference Prognostic agent assistance for norm-compliant coalition planning
Variants: doc-x1040
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
May-2011 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 international
doc-x1042 external conference Probabilistic Hierarchical Planning over Markov Decision Processes
  • Yuqing Tang (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Simon Parsons (CUNY)
May-2011 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 collaborative
doc-1738 external conference Service-oriented Reasoning Architecture for Resource-Task Assignment in Sensor Networks
  • Geeth de Mel (Aberdeen)
  • Flavio Bergamaschi (IBM UK)
  • Tien Pham (ARL)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Apr-2011 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international with government
doc-1744 external conference Model-Driven SOA for Sensor Networks
  • John Ibbotson (IBM UK)
  • Christopher Gibson (IBM UK)
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Tom Klapiscak (IBM UK)
  • Flavio Bergamaschi (IBM UK)
Apr-2011 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international
doc-805 external conference Understanding Robustness of Mobile Networks through Temporal Network Measures
  • Salvatore Scellato (Cambridge)
  • Ilias Leontiadis (Cambridge)
  • Cecilia Mascolo (Cambridge)
  • Prithwish Basu (BBN)
  • Murtaza Zafer (IBM US)
Apr-2011 IEEE International Conference on Computer Communications (InfoCom), 2011 international
doc-x0052 external conference Semantically enriched data for effective sensor data fusion
Variants: doc-1737
  • Geeth de Mel (Aberdeen)
  • Tien Pham (ARL)
  • Thyagaraju Damarla (ARL)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Apr-2011 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international with government
doc-x0073 external conference Forecasting routes and self-adaptation in multi-hop wireless sensor networks
  • Themistoklis Bourdenas (Imperial)
  • Flavio Bergamaschi (IBM UK)
  • David Wood (IBM US)
  • Petros Zerfos (IBM US)
  • Morris Sloman (Imperial)
Apr-2011 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international
doc-x0356 external conference Adversaries' Holy Grail: access control analytics
  • Ian Molloy (IBM US)
  • Jorge Lobo (IBM US)
  • Suresh Chari (IBM US)
Apr-2011 First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (pp. 54-61). ACM. single institute
doc-x0419 external conference Broadcast scheduling with data bundles
Variants: doc-1672
  • Fangfei Chen (PSU)
  • Diego Pizzocaro (Cardiff)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Alun Preece (Cardiff)
  • Thomas La Porta (PSU)
Apr-2011 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international
doc-x0430 external conference Clustering in cooperative networks
  • Boulat Bash (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Apr-2011 IEEE International Conference on Computer Communications (InfoCom), 2011 single institute
doc-x0755 external conference Pan and scan: Configuring cameras for coverage
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
Apr-2011 IEEE International Conference on Computer Communications (InfoCom), 2011 single institute
doc-x0847 external conference Robust multipath routing in large wireless networks
  • Sid Chau (Cambridge)
  • Richard Gibbens (Cambridge)
  • Robert Hancock (Roke)
  • Don Towsley (UMass)
Apr-2011 IEEE International Conference on Computer Communications (InfoCom), 2011 international
doc-x0086 external conference A cultural belief network simulator.
  • Winston Sieck
  • Ben Simpkins
  • Louise Rasmussen
Mar-2011 Social Computing, Behavioral-Cultural Modeling and Prediction (pp. 284-291). Springer Berlin Heidelberg single institute
doc-x0458 external conference Cooperative jamming to improve the connectivity of the 1-D secrecy graph
  • Dennis Goeckel (UMass)
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
Mar-2011 Information Sciences and Systems (CISS), 2011 45th Annual Conference on (pp. 1-6). IEEE single institute
doc-x0482 external conference Demystifying privacy in sensory data: A qoi based approach
  • Supriyo Chakraborty (UCLA)
  • Haksoo Choi (UCLA)
  • Mani Srivastava (UCLA)
Mar-2011 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011 single institute
doc-806b external conference Ontological Logic Programming
  • Murat Sensoy (Aberdeen)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
2011 Proceedings of the International Conference on Web Intelligence, Mining and Semantics. ACM, 2011. single institute with government
doc-x0060 tech report Understanding and Shared Understanding in Military Coalitions
  • Paul Smart (Southampton)
2011 single institute
doc-x0321 journal A history of graph entropy measures
  • Matthias Dehmer
  • Abbe Mowshowitz (CUNY)
2011 Information Sciences, 181(1), 57-78. collaborative
doc-x0348 journal Adaptive packet prioritisation for large wireless sensor networks
  • Laurence Hey (Imperial)
  • Erol Gelenbe (Imperial)
2011 Telecommunication Systems, 48(1-2), 125-150. single institute
doc-x0354 phd thesis Addressing the reactiveness problem in sensor networks using rich task representation
  • Konrad Borowiecki (Cardiff)
2011 Doctoral dissertation, Cardiff University single institute
doc-x0382 journal Anomaly detection in information streams without prior domain knowledge
  • Mandis Beigi (IBM US)
  • Shih-Fu Chang
  • Shahram Ebadollahi (IBM US)
  • Dinesh Verma (IBM US)
2011 IBM Journal of Research and Development, 55(5), 11-1. collaborative
doc-x0390 book chapter Argumentation strategies for collaborative plan resourcing
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
2011 Argumentation in Multi-Agent Systems(pp. 154-173). Springer Berlin Heidelberg international
doc-x0395 journal Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks
  • Dennis Goeckel (UMass)
  • Sudarshan Vasudevan (UMass)
  • Don Towsley (UMass)
  • Stephan Adams (UMass)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
2011 Selected Areas in Communications, IEEE Journal on, 29(10), 2067-2076. international
doc-x0417 journal Bounds on the moduli of polynomial zeros
  • Matthias Dehmer
  • Abbe Mowshowitz (CUNY)
2011 Applied Mathematics and Computation, 218(8), 4128-4137 collaborative
doc-x0418 tech report Broadcast analysis for large cooperative wireless networks
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
2011 arXiv preprint arXiv:1104.3209. single institute
doc-x0420 journal Broadcasting Info-Pages to Sensors: Efficiency vs. Energy Conservation
Variants: doc-1220a
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
2011 Wireless Networks, 17(6), 1529-1542 collaborative
doc-x0431 journal Cognitive and self-selective routing for sensor networks
  • Erol Gelenbe (Imperial)
  • Peng Liu (PSU)
  • Boleslaw Szymanski (RPI)
  • Christopher Morrell (RPI)
2011 Computational Management Science, 8(3), 237-258 international
doc-x0434 external conference Combining semantic web and logic programming for agent reasoning
  • Murat Sensoy (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
2011 Advanced Agent Technology (pp. 428-441). Springer Berlin Heidelberg single institute
doc-x0436 journal ComboCoding: Combined Intra/Inter-Flow Network Coding for TCP over Multihop Lossy Wireless Networks
  • Chien Chia Chen (UCLA)
  • Clifford Chen (UCLA)
  • Soon Young Oh (UCLA)
  • Joon-Sang Park
  • Mario Gerla (UCLA)
  • Medy Sanadidi (UCLA)
2011 Journal of Advanced Research, 2(3), 241-252 collaborative
doc-x0528 tech report Energy-Efficient Location Service Protocols for Mobile Ad Hoc Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
2011 Technical Report 11-1, Department of Computer Science, RPI. single institute
doc-x0534 tech report Evaluating Implementations of Service Oriented Architecture for Sensor Network via Simulation
  • Caleb Vincent (RPI)
2011 RENSSELAER POLYTECHNIC INST TROY NY. single institute
doc-x0551 external conference Exploiting domain knowledge in making delegation decisions
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Simon Parsons (CUNY)
2011 Agents and Data Mining Interaction (pp. 117-131). Springer Berlin Heidelberg. international
doc-x0568 journal Frequency quorum rendezvous for fast and resilient key establishment under jamming attack
Variants: doc-917
  • Eun-Kyu Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
2011 ACM SIGMOBILE Mobile Computing and Communications Review, 14(4), 1-3 single institute
doc-x0574 journal Generalized graph entropies
  • Matthias Dehmer
  • Abbe Mowshowitz (CUNY)
2011 Complexity, 17(2), 45-50. collaborative
doc-x0575 journal Generalized Sequential Slotted Amplify and Forward Strategy in Cooperative Communications
  • Haishi Ning (Imperial)
  • Cong Ling (Imperial)
  • Kin Leung (Imperial)
2011 Information Theory, IEEE Transactions on, 57(4), 1968-1974. single institute
doc-x0594 external conference How to aggregate the cl signature scheme
  • Dominique Schroder (UMD)
2011 Computer Security-ESORICS 2011 (pp. 298-314). Springer Berlin Heidelberg. single institute
doc-x0606 journal Impact of imperfect channel state information on bi-directional communications with relay selection
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
2011 Signal Processing, IEEE Transactions on, 59(11), 5657-5662 single institute
doc-x0635 journal Joint beamforming and power management for nonregenerative MIMO two-way relaying channels
  • Chee Leow (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
2011 Vehicular Technology, IEEE Transactions on, 60(9), 4374-4383 single institute
doc-x0648 journal Linear precoded cooperative transmission protocol for wireless broadcast channels
  • Chee Leow (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
2011 Vehicular Technology, IEEE Transactions on, 60(7), 3509-3515 single institute
doc-x0664 journal Masquerade mimicry attack detection: A randomised approach
  • Juan Tapiador
  • John Clark
2011 computers & security, 30(5), 297-310 single institute
doc-x0671 patent Method and system for deducing network routes by querying routers
  • Dakshi Agrawal (IBM US)
  • Alina Beygelzimer (IBM US)
  • Bong Jun Ko (IBM US)
  • Mudhakar Srivatsa (IBM US)
2011 U.S. Patent No. 7,869,349. Washington, DC: U.S. Patent and Trademark Office. single institute
doc-x0731 tech report On Growing Perfect Power-Law Graphs
  • Boleslaw Szymanski (RPI)
2011 Technical Report 11-02, Department of Computer Science, RPI,�http://www.�cs. rpi. edu/research/pdf/11-02. pdf. single institute
doc-x0736 journal On the design of network coding for multiple two-way relaying channels
  • Zhiguo Ding (Imperial)
  • Ting Wang (IBM US)
  • Mugen Peng
  • Wenbo Wang
  • Kin Leung (Imperial)
2011 Wireless Communications, IEEE Transactions on, 10(6), 1820-1832. international
doc-x0744 journal Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
2011 IEEE Transactions on Wireless Communications, 10(6), 1725-1729. international
doc-x0765 external conference Planning over MDPs through HTNs
  • Yuqing Tang (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Simon Parsons (CUNY)
2011 AAAI 2011 Workshop on Generalized Planning collaborative
doc-x0798 external conference Quantitative evaluation of secure network coding using homomorphic signature/hashing
  • Seung-Hoon Lee (UCLA)
  • Mario Gerla (UCLA)
  • Hugo Krawczyk (IBM US)
  • Kang-won Lee (IBM US)
  • Elizabeth Quaglia (RHUL)
2011 IEEE International Symposium on Network Coding. international
doc-x0912 patent System and method for obtaining network link state information from sequential distance vector routing tables
  • Dakshi Agrawal (IBM US)
2011 U.S. Patent No. 7,961,642 single institute
doc-x0920 patent TCP-aware resource allocation in wireless networks
  • Majid Ghaderi
  • Ashwin Sridharan (PSU)
  • Hui Zang
Jan-2011 U.S. Patent No. 7,864,802 collaborative
doc-x1029 journal Self-organizing systems based on morphogenesis principles
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
2011 IBM Journal of Research and Development, 55(5), 12-1 single institute
doc-x1037 journal Activity recognition for dynamic multi-agent teams
  • Gita Sukthankar
  • Katia Sycara (CMU)
2011 ACM Transactions on Intelligent Systems and Technology (TIST), 3(1), 18 collaborative
doc-808 external conference Trust Decision Making in Delegation Relationships
Variants: doc-899b
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
Dec-2010 European Workshop on Multi-Agent Systems (EUMAS), 2010 international
doc-809 external conference Incremental, Team-Oriented Activity and Plan Recognition for Software Agents
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
Dec-2010 European Workshop on Multi-Agent Systems (EUMAS), 2010 international
doc-942 external conference Service Discovery for Delay Tolerant Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Dec-2010 IEEE Global Communications Conference (GlobeCom), 2010 single institute
doc-x0135 external conference Friendship based routing in delay tolerant mobile social networks
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Dec-2010 IEEE Global Communications Conference (GlobeCom), 2010 single institute
doc-x0163 external conference PCFG based synthetic mobility trace generation
  • Sahin Geyik (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Dec-2010 IEEE Global Communications Conference (GlobeCom), 2010 single institute
doc-1341 journal On the study of analogue network coding for multi-pair, bidirectional relay channels
  • Chee Leow (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
Nov-2010 IEEE Trans. Wireless communication international
doc-1342 journal Physical Layer Network Coding and Precoding for the Two-Way Relay Channel in Cellular Systems
  • Zhiguo Ding (Imperial)
  • Ioannis Krikidis
  • John Thompson
  • Kin Leung (Imperial)
Nov-2010 IEEE Trans. Signal processing collaborative
doc-1343 journal Cross-layer Routing Using Cooperative Transmission in Vehicular Ad-hoc Networks
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Nov-2010 IEEE JSAC Special Issue single institute
doc-1344 journal Cooperative Transmission Protocols for Wireless Broadcast Channels
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Nov-2010 IEEE Trans. Wireless communication international
doc-1346 journal Entropy of Digraphs and Infinite Networks
  • Abbe Mowshowitz (CUNY)
Nov-2010 Towards an Information Theory of Complex Networks: Statistical Methods and Applications (M. Dehmer, F. Emmert-Streib, and A. Mehler, eds. Springer/Birkhouser) single institute
doc-1347 journal A symmetry index for graphs
  • Abbe Mowshowitz (CUNY)
  • Matthias Dehmer
Nov-2010 Journl of Mathematical Biophysics collaborative
doc-1348 journal Connections between Classical and Parametric Network Entropies
  • Matthias Dehmer
  • Abbe Mowshowitz (CUNY)
  • Frank Emmert-Streib
Nov-2010 PLoS ONE international
doc-1406 tech report Logic proposal Rationale Example in OWL
  • David Mott (IBM UK)
Nov-2010 single institute
doc-1407 tech report only if an example of human graspability of logic
  • David Mott (IBM UK)
Nov-2010 single institute
doc-1409 invited talk Quality of Information and Its Characterization in Sensor-enabled Smart Environments
  • Chatschik Bisdikian (IBM US)
Nov-2010 single institute
doc-1410 tech report Security Concerns of NUM-based Networks
  • James Edwards (PSU)
  • Scott Rager (PSU)
  • Thomas La Porta (PSU)
Nov-2010 NSRC Technical Report single institute
doc-806a external conference Position Paper: Ontological Logic Programming
  • Murat Sensoy (Aberdeen)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Nov-2010 Proceedings of the 3rd International Conference on Semantic Sensor Networks-Volume 668. CEUR-WS. org, 2010. single institute with government
doc-806c tech report ISTAR OWL Ontology
  • Murat Sensoy (Aberdeen)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Nov-2010 single institute
doc-814a external conference OWL-POLAR: Semantic Policies for Agent Reasoning
Variants: doc-1728
  • Murat Sensoy (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
Nov-2010 International Semantic Web Conference (ISWC), 2010 international
doc-815 external conference Path Heuristics using ACO for Inter-Domain Routing in Mobile Ad Hoc and Sensor Networks
  • Falko Dressler
  • Roman Koch
  • Mario Gerla (UCLA)
Nov-2010 Bio-inspired models of network, information, and computing systems. Springer Berlin Heidelberg, 2010. 128-142. collaborative
doc-816 external conference Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks
  • Wooseong Kim (UCLA)
  • Andreas Kassler
  • Marco di Felice
  • Mario Gerla (UCLA)
Nov-2010 Wireless Days (WD), 2010 IFIP. IEEE, 2010. collaborative
doc-817 external conference Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture
  • Wooseong Kim (UCLA)
  • Andreas Kassler
  • Marco di Felice
  • Mario Gerla (UCLA)
Nov-2010 Performance Computing and Communications Conference (IPCCC), 2010 IEEE 29th International. IEEE, 2010. collaborative
doc-819 external conference Content Centric Networking in Tactical and Emergency MANETs
  • Soon Young Oh (UCLA)
  • Davide Lau (UCLA)
  • Mario Gerla (UCLA)
Nov-2010 Wireless Days (WD), 2010 IFIP. IEEE, 2010. single institute
doc-820b external conference Distributed Abductive Reasoning with Constraints
Variants: doc-985
  • Jiefei Ma (Imperial)
  • Krysia Broda (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
Nov-2010 Springer LCNS 2010 single institute
doc-821 external conference Adaptive Negotiation In Managing Wireless Sensor Networks
  • Thao Le (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
Nov-2010 In Principles and Practice of Multi-Agent Systems (pp. 121-136). Springer Berlin Heidelberg single institute
doc-822 external conference Intelligent Resource Selection for Sensor-Task Assignment: A Knowledge Based Approach
Variants: doc-x0625
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
Nov-2010 Annual International Conference on Advanced Topics in Artificial Intelligence (ATAI 2010,http://www.aiconf.org/) single institute with government
doc-916 external conference Secrecy in Wireless Networks Through Cooperative Chatter
  • Sudarshan Vasudevan (UMass)
  • Stephan Adams (UMass)
  • Dennis Goeckel (UMass)
  • Zhiguo Ding (Imperial)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
Nov-2010 Army Science Conference (ASC), 2010 international
doc-918 external conference Multiple Metric Gateway Election in Heterogeneous MANETs
  • Seung-Hoon Lee (UCLA)
  • Nishanth Alapati (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
Nov-2010 Army Science Conference (ASC), 2010 collaborative
doc-920 external conference InterMR: Inter-MANET Routing in Heterogeneous MANETs
  • Seung-Hoon Lee (UCLA)
  • Starsky Wong (IBM US)
  • Sid Chau (Cambridge)
  • Kang-won Lee (IBM US)
  • Jon Crowcroft (Cambridge)
  • Mario Gerla (UCLA)
Nov-2010 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2010 international
doc-930 external conference Assessing Trust in Uncertain Information
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Rob Young (DSTL)
Nov-2010 International Semantic Web Conference (ISWC), 2010 international with government
doc-935 external conference Quality Tradeoffs in Object Tracking with Duty-Cycled Sensor Networks

Best paper award
  • Sadaf Zahedi (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
Nov-2010 Real-Time Systems Symposium (RTSS), 2010 IEEE 31st. IEEE, 2010 collaborative with government
doc-937 external conference You Can't Get There From Here: Sensor Scheduling with Refocusing Delays
Variants: doc-x0024
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Matthew Johnson (CUNY)
  • Lance Kaplan (ARL)
  • Thomas La Porta (PSU)
Nov-2010 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2010 collaborative with government
doc-938 external conference Utility-Driven, Energy-Aware In-Network Processing for Mission-oriented Wireless Sensor Networks
  • Sharanya Eswaran (PSU)
  • James Edwards (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Nov-2010 Army Science Conference (ASC), 2010 collaborative
doc-943 external conference Efficient Routing in Delay Tolerant Networks with Correlated Node Mobility
  • Eyuphan Bulut (RPI)
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2010 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2010 single institute
doc-x0087 external conference A case against routing-integrated time synchronization
  • Thomas Schmid (UCLA)
  • Zainul Charbiwala (UCLA)
  • Zafeiria Anagnostopoulou (UCLA)
  • Mani Srivastava (UCLA)
  • Prabal Dutta
Nov-2010 Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (pp. 267-280). ACM international
doc-x0104 external conference Agent Support for Policy-Driven Mission Planning Under Constraints
  • Murat Sensoy (Aberdeen)
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Martin Kollingbaum (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Katia Sycara (CMU)
  • Jean Oh (CMU)
Nov-2010 AAAI Fall Symposium: Proactive Assistant Agents international
doc-919 external conference Connectivity Improvement for Inter-Domain Routing in MANETs
  • You Lu (UCLA)
  • Biao Zhou (UCLA)
  • Ian Ku (UCLA)
  • Mario Gerla (UCLA)
Oct-2010 IEEE Military Communications Conference, 2010 single institute
doc-921 external conference Adaptive Forwarding Rate Control for Network Coding in Tactical MANETs
  • Soon Young Oh (UCLA)
  • Eun-Kyu Lee (UCLA)
  • Mario Gerla (UCLA)
Oct-2010 IEEE Military Communications Conference, 2010 single institute
doc-926 external conference Decomposition Techniques for Policy Refinement
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Emil Lupu (Imperial)
  • Alessandra Russo (Imperial)
  • Morris Sloman (Imperial)
Oct-2010 IEEE International Conference on Network and Service Management (CNSM), 2010 international
doc-934 external conference Multi-Target Tracking Using Proximity Sensors
  • Ting He (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Wei Wei (UMass)
  • Don Towsley (UMass)
Oct-2010 IEEE Military Communications Conference, 2010 collaborative with government
doc-946 external conference Dynamic Composition of Services in Sensor Networks
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Dinesh Verma (IBM US)
Oct-2010 Services Computing (SCC), 2010 IEEE International Conference on. IEEE, 2010 collaborative
doc-x0018 external conference Power efficiency of decode-and-forward cooperative relaying
  • Zhengguo Sheng (Imperial)
  • Bong Jun Ko (IBM US)
  • Ananthram Swami (ARL)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Oct-2010 IEEE Military Communications Conference, 2010 international with government
doc-1049a internal conference Network-Enabled Collaborative Problem-Solving
  • Stephen Poltrock
  • Paul Smart (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-1408 internal conference Demonstration of integration of semantic web technologies (updated with presentation)
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-826 internal conference Quantitative Evaluation of Secure Network Coding
  • Seung-Hoon Lee (UCLA)
  • Mario Gerla (UCLA)
  • Hugo Krawczyk (IBM US)
  • Kang-won Lee (IBM US)
  • Elizabeth Quaglia (RHUL)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-828 internal conference Constructing Minimal Overlay to Support Policy-Based Access Control Groups
Variants: doc-x0444
  • Bong Jun Ko (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
  • Sid Chau (Cambridge)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-830 internal conference Listen First, Broadcast Later: Topology-Agnostic Forwarding under High Dynamics
  • Michael Meisel (UCLA)
  • Vasilieos Pappas (IBM US)
  • Lixia Zhang (UCLA)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-831 internal conference Dynamic Gateway Assignment to Support Inter-domain Networking in MANETs
  • Starsky Wong (IBM US)
  • Sid Chau (Cambridge)
  • Kang-won Lee (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-833 internal conference Self-tuning routing algorithms
  • Robert Hancock (Roke)
  • Howard Tripp (Roke)
  • Jim Kurose (UMass)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-836 internal conference Obtaining Generic Mobility Models from Network Properties and Trace Data
  • Howard Tripp (Roke)
  • Robert Hancock (Roke)
  • Alberto Medina (BBN)
  • Prithwish Basu (BBN)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-848 internal conference Inferring Trust in Uncertain Information
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Rob Young (DSTL)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-851 internal conference Risk Sensitive Planning in Partially Observable Environments
Variants: doc-987
  • Janusz Marecki (IBM US)
  • Pradeep Varakantham (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-858 internal conference Robust Bayesian Methods for Stackelberg Security Games
Variants: doc-988
  • Christopher Kiekenveld (IBM US)
  • Milind Tambe (IBM US)
  • Janusz Marecki (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-863 internal conference Information Sharing Decisions under Uncertainty
  • Janusz Marecki (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Pradeep Varakantham (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-864 internal conference Acting in Partially Observable Domains with Delayed Observations
  • Janusz Marecki (IBM US)
  • Pradeep Varakantham (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-867 internal conference Sensors as a Service Oriented Architecture: Middleware for Sensor Networks
Variants: doc-947b
  • John Ibbotson (IBM UK)
  • Christopher Gibson (IBM UK)
  • Joel Wright (IBM UK)
  • Peter Waggett (IBM UK)
  • Petros Zerfos (IBM US)
  • Boleslaw Szymanski (RPI)
  • Dave Thornley (Imperial)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-876 internal conference Cooperative Data Dissemination to Mission Sites
Variants: doc-961
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-877 internal conference A model-driven approach to the construction, composition and analysis of services on sensor networks
  • Joel Wright (IBM UK)
  • John Ibbotson (IBM UK)
  • Christopher Gibson (IBM UK)
  • Dave Braines (IBM UK)
  • Tom Klapiscak (IBM UK)
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • Dave Thornley (Imperial)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-878 internal conference Configuration of Actuated Camera Networks for Multi-target Coverage
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Mani Srivastava (UCLA)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-881 internal conference Single Sensor Scheduling with Refocusing Delays
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Matthew Johnson (CUNY)
  • Lance Kaplan (ARL)
  • Thomas La Porta (PSU)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-882 internal conference Sensor Allocation in Diverse Environments
Variants: doc-970
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Simon Shamoun (CUNY)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-883 internal conference Who, When, Where: Timeslot Assignment to Mobile Clients
Variants: doc-1034
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-886 internal conference Joint Assignment of Timeslot and Transmission Rate for Data-Item Scheduling in Mobile WSNs
  • Yun Hou (Imperial)
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
  • Kin Leung (Imperial)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-899a internal conference Trust Decision Making in Delegation Relationships
Variants: doc-899b
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-917 external conference Frequency Quorum Rendezvous for Fast and Resilient Key Establishment under Jamming Attack
Variants: doc-x0568
  • Eun-Kyu Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Sep-2010 Annual International Conference on Mobile Computing and Networking, 2010 single institute
doc-924 external conference Ad Hoc Networking via Named Data
  • Michael Meisel (UCLA)
  • Vasilieos Pappas (IBM US)
  • Lixia Zhang (UCLA)
Sep-2010 Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture (pp. 3-8). ACM collaborative
doc-927a internal conference Time-Specific Encryption
Variants: doc-927b
  • Kenny Paterson (RHUL)
  • Elizabeth Quaglia (RHUL)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-932a internal conference Information-Theoretic Detection of Masquerade Mimicry Attacks
Variants: doc-932b
  • Juan Tapiador
  • John Clark
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-939 external conference Intelligent information assistance for coalition operations
  • Felipe Meneguzzi (CMU)
  • Jean Oh (CMU)
  • Katia Sycara (CMU)
Sep-2010 Knowledge Systems for Coalition Operations (KSCO), 2010 single institute
doc-940 external conference Dynamic Networks and Distributed Problem-Solving
  • Paul Smart (Southampton)
  • Trung Dong Huynh (Southampton)
  • Dave Braines (IBM UK)
  • Nigel Shadbolt (Southampton)
Sep-2010 Knowledge Systems for Coalition Operations (KSCO), 2010 collaborative
doc-941 external conference Making Plans Alive
  • Jitu Patel (DSTL)
  • Michael Dorneich
  • David Mott (IBM UK)
  • Ali Bahrami
  • Cheryl Giammanco (ARL)
Sep-2010 Knowledge Systems for Coalition Operations (KSCO), 2010 international with government
doc-954b internal conference Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Variants: doc-954a
  • Rosario Gennaro (CUNY)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-955a internal conference Learning Autonomic Security Reconfiguration Policies
Variants: doc-955b
  • Juan Tapiador
  • John Clark
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-975b internal conference Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Variants: doc-975a
  • Rosario Gennaro (CUNY)
  • Craig Gentry (IBM US)
  • Bryan Parno
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-986b internal conference Secure Network Coding Over The Integers
Variants: doc-986a
  • Rosario Gennaro (CUNY)
  • Jonathan Katz (UMD)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance collaborative
doc-x0027 external conference Hybrid Rationale and Controlled Natural Language for Shared Understanding
  • David Mott (IBM UK)
  • Cheryl Giammanco (ARL)
  • Michael Dorneich
  • Jitu Patel (DSTL)
  • Dave Braines (IBM UK)
Sep-2010 Knowledge Systems for Coalition Operations (KSCO), 2010 international with government
doc-x0061 internal conference A Formal Context Representation Framework for Network-Enabled Recognition
  • Jie Bao (RPI)
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
  • Paul Smart (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0063 internal conference The Cognitive Virtues of Dynamic Networks
  • Trung Dong Huynh (Southampton)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Nigel Shadbolt (Southampton)
  • Katia Sycara (CMU)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0065 internal conference Idea Propagation in Social Networks: The Role of 'Cognitive Advantage'
  • Ben Simpkins
  • Winston Sieck
  • Paul Smart (Southampton)
  • Shane Mueller
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0066 internal conference Cognition and the Web
  • Paul Smart (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-x0067 internal conference Extended Memory, the Extended Mind, and the Nature of Technology-Mediated Memory Enhancement
  • Paul Smart (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-x0068 internal conference Supporting Distributed Coalition Planning with Semantic Wiki Technology
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Jie Bao (RPI)
  • David Mott (IBM UK)
  • Trung Dong Huynh (Southampton)
  • Nigel Shadbolt (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0069 internal conference Collective Cognition: Exploring the Dynamics of Belief Propagation and Collective Problem Solving in Multi-Agent Systems
  • Paul Smart (Southampton)
  • Trung Dong Huynh (Southampton)
  • Dave Braines (IBM UK)
  • Katia Sycara (CMU)
  • Nigel Shadbolt (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0070 internal conference Modelling the Dynamics of Collective Cognition: A Network-Based Approach to Socially-Mediated Cognitive Change
  • Paul Smart (Southampton)
  • Winston Sieck
  • Dave Braines (IBM UK)
  • Trung Dong Huynh (Southampton)
  • Katia Sycara (CMU)
  • Nigel Shadbolt (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0071 internal conference Semantic Networks and Shared Understanding: A Network-Based Approach to Representing and Visualizing Shared Understanding
  • Paul Smart (Southampton)
  • Winston Sieck
  • Katia Sycara (CMU)
  • Nigel Shadbolt (Southampton)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0302 internal conference A Conceptual Framework to Support a Multi-level Planning Capability
  • Jitu Patel (DSTL)
  • Michael Dorneich
  • David Mott (IBM UK)
  • Ali Bahrami
  • Cheryl Giammanco (ARL)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0315 internal conference A formal context representation framework for network-enabled cognition
  • Jie Bao (RPI)
  • Paul Smart (Southampton)
  • David Mott (IBM UK)
  • Dave Braines (IBM UK)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0366 internal conference An agent architecture for intelligent information assistance
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0369 internal conference An Energy Efficient Dynamic Location Server Hierarchy for Mobile Ad Hoc Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
  • Graham Bent (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Paul Stone (IBM UK)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0376 internal conference Analysis and Algorithms for Power Allocation in Decode-And-Forward Cooperative Relaying
  • Zhengguo Sheng (Imperial)
  • Bong Jun Ko (IBM US)
  • Ananthram Swami (ARL)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0506 internal conference Dynamic Composition of Services in Sensor Networks and Its Implementation under Sensor Fabric
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
  • Petros Zerfos (IBM US)
  • Dinesh Verma (IBM US)
  • Joel Wright (IBM UK)
  • Christopher Gibson (IBM UK)
  • Caleb Vincent (RPI)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-x0613 internal conference Inconsistency Tolerant Reasoning over Uncertain Data
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
Sep-2010 4th Annual Conference of the International Technology Alliance single institute
doc-x0803 internal conference Query optimization in a distributed hypercube database
  • Abbe Mowshowitz (CUNY)
  • Akira Kawaguchi (CUNY)
  • Andi Toce (CUNY)
  • Andrew Nagel (CUNY)
  • Graham Bent (IBM UK)
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
Sep-2010 4th Annual Conference of the International Technology Alliance international
doc-807a external conference Probabilistic plan recognition for intelligent information agents: Towards proactive software assistant agents
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
Aug-2010 Proc. ICAART (2011): 281-287. single institute
doc-811 external conference Keyless Channel Hopping against Jamming Attack in Wireless Networks
  • Eun-Kyu Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Aug-2010 UKC single institute
doc-812 external conference On the Universal Generation of Mobility Models
  • Alberto Medina (BBN)
  • Gonca Gursun
  • Prithwish Basu (BBN)
  • Ibrahim Matta
Aug-2010 Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2010 IEEE International Symposium on. IEEE, 2010. collaborative
doc-813 invited talk Towards quantification of utility in the OODA loop
  • Dave Thornley (Imperial)
Aug-2010 single institute
doc-820c external conference Distributed Abductive Reasoning with Constraints
Variants: doc-985
  • Jiefei Ma (Imperial)
  • Krysia Broda (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
Aug-2010 11th International Workshop on Computational Logic in Multi-Agent Systems single institute
doc-925 external conference Speculative Abduction Reasoning for Hierarchical Agent Systems
  • Jiefei Ma (Imperial)
  • Krysia Broda (Imperial)
  • Randy Goebel
  • Hiroshi Hosobe
  • Alessandra Russo (Imperial)
  • Ken Satoh
Aug-2010 Computational Logic in Multi-Agent Systems. Springer Berlin Heidelberg, 2010. 49-64. collaborative
doc-927b external conference Time-Specific Encryption

Best paper award
Variants: doc-927a
  • Kenny Paterson (RHUL)
  • Elizabeth Quaglia (RHUL)
Aug-2010 Security and Cryptography for Networks. Springer Berlin Heidelberg, 2010. 1-16 single institute
doc-928 external conference Assessing Trust in Uncertain Information using Bayesian Description Logics
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Rob Young (DSTL)
Aug-2010 Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010 international with government
doc-929 invited talk Trust-based Decision-Making with Uncertain Information
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Rob Young (DSTL)
Aug-2010 international
doc-931 external conference A Decision Theoretic Approach to Data Leakage Prevention
  • Janusz Marecki (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Pradeep Varakantham (IBM US)
Aug-2010 Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE, 2010 single institute
doc-932b external conference Information-Theoretic Detection of Masquerade Mimicry Attacks
Variants: doc-932a
  • Juan Tapiador
  • John Clark
Aug-2010 Network and System Security (NSS), 2010 4th International Conference on. IEEE, 2010 single institute
doc-936 external conference An Ontological Approach to Integrating Task Representations in Sensor Networks
  • Konrad Borowiecki (Cardiff)
  • Alun Preece (Cardiff)
Aug-2010 Proc 17th International Conference on Knowledge Engineering and Knowledge Management (EKAW 2010). Springer. 2010 single institute
doc-975a external conference Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
Variants: doc-975b
  • Rosario Gennaro (CUNY)
  • Craig Gentry (IBM US)
  • Bryan Parno
Aug-2010 IACR Annual International Cryptology Conference (CRYPTO), 2010 international
doc-x0133 external conference Error performance bounds for routing algorithms in wireless cooperative networks
Variants: doc-1489b
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Aug-2010 Communications and Networking in China (CHINACOM), 2010 5th International ICST Conference on (pp. 1-7). IEEE single institute
doc-x0179 external conference Shipping to Streaming: Is this shift green?
  • Anand Seetharam (UMass)
  • Manikandan Somasundaram (UMass)
  • Don Towsley (UMass)
  • Jim Kurose (UMass)
  • Prashant Shenoy (UMass)
Aug-2010 Proceedings of the first ACM SIGCOMM workshop on Green networking (pp. 61-68). ACM single institute
doc-x0182 external conference StochKit-FF: Efficient systems biology on multicore architectures
  • Marco Aldinucci
  • andrea_bracciali
  • Pietro Lio (Cambridge)
  • Anil Sorathiya
  • Massimo Torquati
Aug-2010 Euro-Par 2010 Parallel Processing Workshops (pp. 167-175). Springer Berlin Heidelberg collaborative
doc-x1043 external conference ANTIPA: an agent architecture for intelligent information assistance
  • Jean Oh (CMU)
  • Felipe Meneguzzi (CMU)
  • Katia Sycara (CMU)
Aug-2010 ECAI (pp. 1055-1056) single institute
doc-1349 external conference Boolean Coherence: Does it make sense?
  • Will Harwood
  • John Clark
  • Jeremy Jacob
Jul-2010 Logics for Systems Analysis single institute
doc-933 external conference Networks of Trust and Distrust: Towards Logical Reputation Systems
  • Will Harwood
  • John Clark
  • Jeremy Jacob
Jul-2010 Logics in Security, Copenhagen, Denmark (2010) single institute
doc-944 external conference A Negotiation Framework for Negotiation of Coalition Policies
  • Mandis Beigi (IBM US)
  • Jorge Lobo (IBM US)
  • Keith Grueneberg (IBM US)
  • Seraphin Calo (IBM US)
  • John Karat (IBM US)
Jul-2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010 single institute
doc-945 external conference Behavior Modeling with Probabilistic Context Free Grammars
  • Sahin Geyik (RPI)
  • Jierui Xie (RPI)
  • Boleslaw Szymanski (RPI)
Jul-2010 13th International Conference on Information FUSION single institute
doc-947b external conference Sensors as a Service Oriented Architecture: Middleware for Sensor Networks
Variants: doc-867
  • John Ibbotson (IBM UK)
  • Christopher Gibson (IBM UK)
  • Joel Wright (IBM UK)
  • Petros Zerfos (IBM US)
  • Boleslaw Szymanski (RPI)
  • Dave Thornley (Imperial)
  • Peter Waggett (IBM UK)
Jul-2010 Intelligent Environments (IE), 2010 Sixth International Conference on (pp. 209-214). IEEE international
doc-948 external conference Risk Based Access Control with Uncertain and Time-dependent Sensitivity
  • John Clark
  • Juan Tapiador
  • John McDermid
  • Pau-Chen Cheng (IBM US)
  • Dakshi Agrawal (IBM US)
  • Natalie Ivanic (ARL)
  • Dave Sloggett
Jul-2010 Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on. IEEE, 2010 international with government
doc-x0144 external conference Markov process modeling and simulation for wireless sensor network life estimation with QoS constraints
  • Zhanyang Zhang (CUNY)
  • Miriam Tausner (CUNY)
Jul-2010 Proceedings of the 2010 Summer Computer Simulation Conference (pp. 168-173). Society for Computer Simulation International single institute
doc-x0752 external conference Optimizing a policy authoring framework for security and privacy policies
  • Matthew Johnson (CUNY)
  • John Karat (IBM US)
  • Clare-Marie Karat (IBM US)
  • Keith Grueneberg (IBM US)
Jul-2010 Proceedings of the Sixth Symposium on Usable Privacy and Security (p. 8). ACM. collaborative
doc-x0983 external conference Usable policy template authoring for iterative policy refinement
  • Matthew Johnson (CUNY)
  • John Karat (IBM US)
  • Clare-Marie Karat (IBM US)
  • Keith Grueneberg (IBM US)
Jul-2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010 collaborative
doc-950 external conference Utility-based Gateway Deployment for Supporting Multi-domain DTNs
  • Ting He (IBM US)
  • Nikoletta Sofra (Imperial)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Jun-2010 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2010 international
doc-954a external conference Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Variants: doc-954b
  • Rosario Gennaro (CUNY)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
Jun-2010 Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2010 collaborative
doc-968 external conference Design and Implementation of a Robust Sensor Data Fusion System for Unknown Signals
  • Younghun Kim (UCLA)
  • Thomas Schmid (UCLA)
  • Mani Srivastava (UCLA)
Jun-2010 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2010 single institute
doc-970 external conference Sensor Allocation in Diverse Environments
Variants: doc-882
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Simon Shamoun (CUNY)
Jun-2010 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2010 single institute
doc-x0123 external conference Dependable connection setup for network capabilities
  • Soo-Bum Lee (CMU)
  • Virgil Gligor (CMU)
  • Adrian Perrig (CMU)
Jun-2010 Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on (pp. 301-310). IEEE single institute
doc-x0124 external conference Disentangling wireless sensing from mesh networking
  • Thomas Schmid (UCLA)
  • Roy Shea (UCLA)
  • Mani Srivastava (UCLA)
  • Prabal Dutta
Jun-2010 Proceedings of the 6th Workshop on Hot Topics in Embedded Networked Sensors (p. 3). ACM international
doc-x0134 external conference FLoc: Dependable link access for legitimate traffic in flooding attacks
  • Soo-Bum Lee (CMU)
  • Virgil Gligor (CMU)
Jun-2010 Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on (pp. 327-338). IEEE single institute
doc-x0169 external conference QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations.
  • Chi Harold Liu
  • Chatschik Bisdikian (IBM US)
  • Joel Branch (IBM US)
  • Kin Leung (Imperial)
Jun-2010 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2010 international
doc-x0350 patent Adaptive rate allocation for multiple TCP sources in wireless networks
  • Ashwin Sridharan (PSU)
  • Majid Ghaderi
  • Hui Zang
Jun-2010 U.S. Patent No. 7,733,777 collaborative
doc-1029b external conference Broadcast Encryption with Multiple Trust Centers and Dynamic Coalitions
Variants: doc-1029a
  • Kent Boklan (CUNY)
  • Alex Dent (RHUL)
  • Christopher Seaman (CUNY)
May-2010 LatinCrypt 2010 international
doc-820a external conference Distributed Abductive Reasoning with Constraints
Variants: doc-985
  • Jiefei Ma (Imperial)
  • Krysia Broda (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
May-2010 Declarative Agent Languages and Technologies VIII. Springer Berlin Heidelberg, 2010. 148-166. single institute
doc-915 external conference Security-capacity trade-off in large wireless networks using keyless secrecy
  • Sudarshan Vasudevan (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
May-2010 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2010 single institute
doc-949 external conference Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption
  • Nanxi Chen (UCLA)
  • Mario Gerla (UCLA)
  • Dijiang Huang
  • Xiaoyan Hong
May-2010 Ad Hoc Networking Workshop (Med-Hoc-Net), 2010 The 9th IFIP Annual Mediterranean. IEEE, 2010 collaborative
doc-952 external conference Group Detection in Mobility Traces
  • Yung-Chih Chen (UMass)
  • Elisha Rosensweig (UMass)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
May-2010 Proceedings of the 6th international wireless communications and mobile computing conference. ACM, 2010 single institute
doc-953 external conference Effect of Limited Topology Knowledge on Opportunistic Forwarding in Ad Hoc Wireless Networks
  • Prithwish Basu (BBN)
  • Saikat Guha (BBN)
May-2010 Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2010 Proceedings of the 8th International Symposium on (pp. 237-246). IEEE single institute
doc-955b external conference Learning Autonomic Security Reconfiguration Policies
Variants: doc-955a
  • Juan Tapiador
  • John Clark
May-2010 Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010 single institute
doc-958 external conference An Ontology-based Framework for Designing a Sensor Quality of Information Software Library
  • Jerrid Matthews (UCLA)
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Tien Pham (ARL)
May-2010 Mobile Data Management (MDM), 2010 Eleventh International Conference on (pp. 264-269). IEEE collaborative with government
doc-960d external conference Flexible Task Resourcing for Intelligent Agents
  • Murat Sensoy (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
May-2010 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 single institute
doc-963 external conference The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
May-2010 IEEE International Conference on Communications (ICC), 2010 single institute
doc-964 external conference Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
May-2010 IEEE International Conference on Communications (ICC), 2010 single institute
doc-965 external conference Bootstrapping trust evaluations through stereotypes
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Katia Sycara (CMU)
May-2010 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 international
doc-966 external conference Learning policies through argumentation-derived evidence
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Frank Guerin (Aberdeen)
  • Simon Parsons (CUNY)
May-2010 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 international
doc-967 external conference Encryption schemes secure against chosen-ciphertext selective opening attacks
  • Serge Fehr
  • Dennis Hofheinz
  • Eike Kiltz
  • Hoeteck Wee (CUNY)
May-2010 IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010 collaborative
doc-980 external conference On the Application of Cooperative Transmission to Wireless Broadcast Channels
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
May-2010 IEEE International Conference on Communications (ICC), 2010 international
doc-985 external conference Distributed Abductive Reasoning with Constraints
Variants: doc-820b
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Krysia Broda (Imperial)
  • Emil Lupu (Imperial)
May-2010 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 single institute
doc-986a external conference Secure Network Coding over the Integers
Variants: doc-986b
  • Rosario Gennaro (CUNY)
  • Jonathan Katz (UMD)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
May-2010 Public Key Cryptography-PKC 2010 (pp. 142-160). Springer Berlin Heidelberg collaborative
doc-987 external conference Risk sensitive Planning in Partially Observable Environments
Variants: doc-851
  • Janusz Marecki (IBM US)
  • Pradeep Varakantham (IBM US)
May-2010 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 single institute
doc-988 external conference Robust Bayesian Methods for Stackelberg Security Games
Variants: doc-858
  • Christopher Kiekenveld (IBM US)
  • Milind Tambe (IBM US)
  • Janusz Marecki (IBM US)
May-2010 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 single institute
doc-997 external conference Transmission Capacity of Decode-and-Forward Cooperation in Overlaid Wireless Networks
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
May-2010 IEEE International Conference on Communications (ICC), 2010 single institute
doc-x0019 external conference Flying in the dark: controlling autonomous data ferries with partial observations
  • Ting He (IBM US)
  • Kang-won Lee (IBM US)
  • Ananthram Swami (ARL)
May-2010 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2010 collaborative with government
doc-x0118 external conference Computing argumentation in polynomial number of bdd operations: A preliminary report
  • Yuqing Tang (CMU)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
May-2010 Argumentation in Multi-Agent Systems (ArgMAS), 2010 international
doc-x0156 external conference On control of networks of dynamical systems
  • Chai Wah Wu (IBM US)
May-2010 Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on (pp. 3785-3788). IEEE single institute
doc-x0161 external conference On the benefits of argumentation-derived evidence in learning policies
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Frank Guerin (Aberdeen)
  • Simon Parsons (CUNY)
May-2010 Argumentation in Multi-Agent Systems (ArgMAS), 2010 international
doc-x0308 external conference A decision-theoretic approach to resourcing plans in joint missions
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
May-2010 Argumentation in Multi-Agent Systems (ArgMAS), 2010 international
doc-x0634 external conference Joint beamforming and power allocation for MIMO two-way relaying channels
  • Chee Leow (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
May-2010 IEEE International Conference on Communications (ICC), 2010 single institute
doc-x1028 external conference Measuring behavioral trust in social networks
  • Sibel Adali (RPI)
  • Robert Escriva (RPI)
  • Mark Goldbreg (RPI)
  • Mykola Hayvanovych (RPI)
  • Malik Magdon-Ismail (RPI)
  • Boleslaw Szymanski (RPI)
  • William Wallace (RPI)
  • Gregory Williams (RPI)
May-2010 Intelligence and Security Informatics (ISI), 2010 IEEE International Conference on (pp. 150-152). IEEE single institute
doc-956 external conference High-Resolution, Low-Power Time Synchronization an Oxymoron No More

Best paper award
  • Thomas Schmid (UCLA)
  • Partha Dutta
  • Mani Srivastava (UCLA)
Apr-2010 Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, 2010 collaborative
doc-961 external conference Cooperative Data Dissemination to Mission Sites
Variants: doc-876
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 collaborative
doc-962 external conference Implementation of utility-based resource optimization protocols on ITA sensor fabric
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Flavio Bergamaschi (IBM UK)
  • Thomas La Porta (PSU)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international
doc-969 external conference Warfighter decision making performance analysis as an investment priority driver
  • Dave Thornley (Imperial)
  • David Dean (DSTL)
  • James Kirk (Honeywell)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international with government
doc-971 external conference Conditional Shortest Path Routing in Delay Tolerant Networks
  • Eyuphan Bulut (RPI)
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
Apr-2010 World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a (pp. 1-6). IEEE single institute
doc-972 external conference An Energy Efficient Location Service for Mobile Ad Hoc Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Apr-2010 ISCIS 2010 single institute
doc-974 external conference Reflections on Provenance Ontology Encodings
  • Li Ding (RPI)
  • Jie Bao (RPI)
  • James Michaelis (RPI)
  • Jun Zhao
  • Deborah McGuinness (RPI)
Apr-2010 Provenance and Annotation of Data and Processes (pp. 198-205). Springer Berlin Heidelberg international
doc-977 external conference Towards Learning Risk Estimation Functions for Access Control
  • Luke Dickens (Imperial)
  • Pau-Chen Cheng (IBM US)
  • Jorge Lobo (IBM US)
  • Alessandra Russo (Imperial)
Apr-2010 Snowbird Learning Workshop international
doc-983 external conference Dynamic Control of Data Ferries under Partial Observations
  • Chi Harold Liu
  • Ting He (IBM US)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
  • Ananthram Swami (ARL)
Apr-2010 IEEE Wireless Communications and Networking Conference (WCNC), 2010 international with government
doc-984 external conference Morphogenesis in Computer Networks
Variants: doc-1021
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
  • Pietro Lio (Cambridge)
Apr-2010 Sarnoff Symposium, 2010 IEEE (pp. 1-6). IEEE international
doc-x0072 external conference Generic Vehicle Architecture for the integration and sharing of in-vehicle and extra-vehicle sensors
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
  • Nick Peach (IBM UK)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 single institute
doc-x0142 external conference Management of coalition sensor networks
  • Dinesh Verma (IBM US)
  • Ted Brown (CUNY)
  • Carolyn Ortega (CUNY)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 collaborative
doc-x0453 tech report Controlling Autonomous Data Ferries: Proof of Selected Theorems
  • Ting He (IBM US)
  • Kang-won Lee (IBM US)
  • Ananthram Swami (ARL)
Apr-2010 Technical Report RC24980, IBM, April 2010.https://researcher.�ibm. com/researcher/files/usthe/rc24980.pdf collaborative
doc-x0499 external conference Distributed policy based access to networked heterogeneous ISR data sources
  • Graham Bent (IBM UK)
  • David Vyvyan (IBM UK)
  • David Wood (IBM US)
  • Petros Zerfos (IBM US)
  • Seraphin Calo (IBM US)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 international
doc-x0750 external conference Optimising the deployment of airborne heterogeneous sensors for persistent ISR missions
  • Alex Barnett (DSTL)
  • Gavin Pearson (DSTL)
  • Rob Young (DSTL)
Apr-2010 International Society for Optics and Photonics - Defense, Security and Sensing, 2010 single institute with government
doc-957 external conference Target Tracking with Packet Delays and Losses - QoI amid Latencies and Missing Data
  • Wei Wei (UMass)
  • Ting He (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Mar-2010 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2010 collaborative
doc-959 external conference Compressive Oversampling for Robust Data Transmission in Sensor Network
  • Zainul Charbiwala (UCLA)
  • Supriyo Chakraborty (UCLA)
  • Sadaf Zahedi (UCLA)
  • Younghun Kim (UCLA)
  • Mani Srivastava (UCLA)
  • Ting He (IBM US)
  • Chatschik Bisdikian (IBM US)
Mar-2010 IEEE International Conference on Computer Communications (InfoCom), 2010 collaborative
doc-976 external conference On MySpace Account Spans and Double Pareto-Like Distribution of Friends
  • Bruno Ribeiro (UMass)
  • William Gauvin (UMass)
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
Mar-2010 IEEE International Conference on Computer Communications (InfoCom), 2010 single institute
doc-978 external conference Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks
  • Saikat Guha (BBN)
  • Sid Chau (Cambridge)
  • Prithwish Basu (BBN)
Mar-2010 IEEE International Conference on Computer Communications (InfoCom), 2010 international
doc-979 external conference Neighbor Discovery with Reception Status Feedback to Transmitters
  • Ramin Khalili (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Ananthram Swami (ARL)
Mar-2010 IEEE International Conference on Computer Communications (InfoCom), 2010 collaborative with government
doc-981 external conference Wireless Interrupt: Inter-Device Signaling in Next Generation Wireless Networks
  • Brian Choi (UCLA)
  • Mario Gerla (UCLA)
Mar-2010 IEEE International Conference on Computer Communications (InfoCom), 2010 single institute
doc-1350 journal Cost Effective Multi-Period Spraying for Routing in Delay Tolerant Networks
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
Feb-2010 IEEE/ACM Transactions on Networking (TON), 18(5), 1530-1543 single institute
doc-1411a tech report Summary of Controlled English
  • David Mott (IBM UK)
Feb-2010 ITA single institute
doc-1412 tech report On Structuring Controlled English Documents
  • David Mott (IBM UK)
Feb-2010 ITA single institute
doc-1414 tech report CPM Visualisations of Warning Orders and OPORDs in a military scenario
  • David Mott (IBM UK)
Feb-2010 ITA single institute
doc-x0120 external conference CORNER: a realistic urban propagation model for VANET
  • Eugenio Giordano
  • Raphael Frank
  • Giovanni Pau (UCLA)
  • Mario Gerla (UCLA)
Feb-2010 Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on (pp. 57-60). IEEE collaborative
doc-1354 journal A Taxonomy of Biologically Inspired Research in Computer Networking
  • Michael Meisel (UCLA)
  • Vasilieos Pappas (IBM US)
  • Lixia Zhang (UCLA)
2010 Computer Networks collaborative
doc-1416 external conference Multi-User Diversity for Secrecy in Wireless Networks
  • Sudarshan Vasudevan (UMass)
  • Stephan Adams (UMass)
  • Dennis Goeckel (UMass)
  • Zhiguo Ding (Imperial)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
2010 Information Theory and Applications Workshop (ITA), 2010 (pp. 1-9). IEEE international
doc-1418 tech report Collaboratively Developed Extensions to Commercial Game Environments for Research and Analysis of Coordinated Team Activities
  • Helen Bowyer (IBM UK)
  • Stephen Poltrock
  • Peter Waggett (IBM UK)
Jan-2010 Hawaii International Conference on System Sciences (HICSS-43) international
doc-x0032 journal Sensor-mission assignment in constrained environments
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Stuart Chalmers (Aberdeen)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
2010 Parallel and Distributed Systems, IEEE Transactions on, 21(11), 1692-1705 international
doc-x0062 external conference Context Representation for the Semantic Web
  • Jie Bao (RPI)
  • Jiao Tao (RPI)
  • Deborah McGuiness (RPI)
  • Paul Smart (Southampton)
2010 Web Science Conference, Raleigh, North Carolina, USA. international
doc-x0064 book chapter Cultural Network Analysis: A Cognitive Approach to Cultural Modeling
  • Winston Sieck
  • Louise Rasmussen
  • Paul Smart (Southampton)
2010 D. Verma (Ed.), Network Science for Military Coalition Operations: Information Extraction and Interaction. IGI Global, Hershey, Pennsylvania, USA. international
doc-x0097 external conference A perspective on trust, security and autonomous systems
  • Will Harwood
  • John Clark
  • Jeremy Jacob
2010 Proceedings of the New Security Paradigms Workshop, Concord, MA single institute
doc-x0106 external conference An auto-delegation mechanism for access control systems
  • Jason Crampton (RHUL)
  • Charles Morisset (RHUL)
2010 Security and Trust Management (pp. 1-16). Springer Berlin Heidelberg single institute
doc-x0107 external conference Analyzing the AIR language: a semantic web (production) rule language
  • Ankesh Khandelwal (RPI)
  • Jie Bao (RPI)
  • Lalana Kagal
  • Ian Jacobi
  • Li Ding (RPI)
  • Jim Hendler (RPI)
2010 Web Reasoning and Rule Systems (pp. 58-72). Springer Berlin Heidelberg collaborative
doc-x0112 external conference Authenticated broadcast with a partially compromised public-key infrastructure
Variants: doc-x0202
  • Dov Gordon
  • Jonathan Katz (UMD)
  • Ranjit Kumaresan (UMD)
  • Arkady Yerukhimovich (UMD)
2010 Stabilization, Safety, and Security of Distributed Systems (pp. 144-158). Springer Berlin Heidelberg collaborative
doc-x0115 external conference Brief announcement: configuration of actuated camera networks for multi-target coverage
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Mani Srivastava (UCLA)
2010 Stabilization, Safety, and Security of Distributed Systems (pp. 282-284). Springer Berlin Heidelberg collaborative
doc-x0116 external conference Broadcast encryption with multiple trust authorities
  • Kent Boklan (CUNY)
  • Alex Dent (RHUL)
  • Christopher Seaman (CUNY)
2010 Progress in Cryptology-LATINCRYPT 2010 (pp. 1-19). Springer Berlin Heidelberg international
doc-x0152 external conference Modelling Uncertain and Time-Dependent Security Labels in MLS Systems
  • John Clark
  • Juan Tapiador
  • John McDermid
  • Pau-Chen Cheng (IBM US)
  • Dakshi Agrawal (IBM US)
  • Natalie Ivanic (ARL)
  • Dave Sloggett
2010 e-Business and Telecommunications (pp. 158-171). Springer Berlin Heidelberg international with government
doc-x0199 journal A guide to trust in mobile ad hoc networks
  • Shane Balfe (RHUL)
  • Po-Wah Yau (RHUL)
  • Kenny Paterson (RHUL)
2010 Security and Communication Networks, 3(6), 503-516 single institute
doc-x0204 journal Constrained-path labellings on graphs of bounded clique-width
  • Bruno Courcelle
  • Andrew Twigg (Cambridge)
2010 Theory of Computing Systems, 47(2), 531-567 collaborative
doc-x0207 journal Distributed energy-efficient target tracking with binary sensor networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
2010 ACM Transactions on Sensor Networks (TOSN), 6(4), 32 single institute
doc-x0210 journal FleaNet: A virtual market place on vehicular networks
  • Uichin Lee (UCLA)
  • Jiyeon Lee
  • Joon-Sang Park
  • Mario Gerla (UCLA)
2010 Vehicular Technology, IEEE Transactions on, 59(1), 344-355. collaborative
doc-x0211 journal GeoDTN+ Nav: geographic DTN routing with navigator prediction for urban vehicular environments
  • Pei-Chun Cheng (UCLA)
  • Kevin Lee (UCLA)
  • Mario Gerla (UCLA)
  • Jerome Haerri
2010 Mobile Networks and Applications, 15(1), 61-82 collaborative
doc-x0212 journal Identity crisis: on the problem of namespace design for ID-PKC and MANETs
Variants: doc-1584
  • Shane Balfe (RHUL)
  • Andrew McDonald (Roke)
  • Kenny Paterson (RHUL)
  • Helen Phillips (DSTL)
2010 Security and Communication Networks, 3(6), 535-545 collaborative with government
doc-x0213 journal Impact of network coding on system delay for multisource-multidestination scenarios
  • Zhiguo Ding (Imperial)
  • Zheng Ma
  • Kin Leung (Imperial)
2010 Vehicular Technology, IEEE Transactions on, 59(2), 831-841 collaborative
doc-x0214 journal Introduction to the Special Issue on Advances in Sensing, Information Processing and Decision Making for Coalition Operations within the US/UK
  • Thomas La Porta (PSU)
  • Timothy Norman (Aberdeen)
2010 The Computer Journal, 53(5) international
doc-x0217 journal On the interaction of clocks, power, and synchronization in duty-cycled embedded sensor nodes
  • Thomas Schmid (UCLA)
  • Roy Shea (UCLA)
  • Zainul Charbiwala (UCLA)
  • Jonathan Friedman (UCLA)
  • Mani Srivastava (UCLA)
  • Young Cho
2010 ACM Transactions on Sensor Networks (TOSN), 7(3), 24 collaborative
doc-x0220 journal P2P content distribution to mobile bluetooth users
  • Uichin Lee (UCLA)
  • Sewook Jung (UCLA)
  • Dae-Ki Cho (UCLA)
  • Alexander Chang (UCLA)
  • Junho Choi
  • Mario Gerla (UCLA)
2010 Vehicular Technology, IEEE Transactions on, 59(1), 356-367 collaborative
doc-x0224 journal Sensor-mission assignment in wireless sensor networks
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Ou Liu (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Thomas La Porta (PSU)
2010 ACM Transactions on Sensor Networks (TOSN), 6(4), 36 collaborative
doc-x0228 journal Transmit power estimation using spatially diverse measurements under wireless fading
  • Murtaza Zafer (IBM US)
  • Bong Jun Ko (IBM US)
  • Ivan Ho (Imperial)
2010 Networking, IEEE/ACM Transactions on, 18(4), 1171-1180 international
doc-x0233 phd thesis Evolving security policies
  • Yow Tzu Lim
2010 single institute
doc-x0333 external conference A novel relay assisted cooperative transmission protocol for wireless multiple access system
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
2010 IEEE Trans. on Communications international
doc-x0444 tech report Constructing minimal overlay to support policy-based access control groups
Variants: doc-828
  • Bong Jun Ko (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
  • Sid Chau (Cambridge)
2010 IBM Research Report, RC24935 international
doc-x0456 book chapter Conversation Analysis of Coalition Communication in Network Centric Operations
  • Ping Xue
  • Stephen Poteet
  • Anne Kao
2010 Network Science for Military Coalition Operations: Information Exchange and Interaction: Information Exchange and Interaction, 256 single institute
doc-x0717 book chapter Network Science for Military Coalition Operations: Information Exchange and Interaction: Information Exchange and Interaction
  • Dinesh Verma (IBM US)
2010 IGI Global. single institute
doc-x0719 tech report Network-Centric Access Control
  • Ting Wang (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Dakshi Agrawal (IBM US)
2010 Gatech CC Technical Report, 2010.�http://www.cc. gatech. edu/~ twang/neat. pdf. single institute
doc-x0730 tech report On Estimating Degree Distributions of Directed Graphs through Sampling
  • Bruno Ribeiro (UMass)
  • Pinghui Wang
  • Don Towsley (UMass)
2010 University of Massachusetts CMPSCI Technical Report UM-CS-2010-046. collaborative
doc-x0762 tech report Physical-layer-enhanced wireless secret key exchange
  • Cagatay Capar (UMass)
  • Murtaza Zafer (IBM US)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Dakshi Agrawal (IBM US)
2010 Univ. Massachusetts Amherst, Amherst, MA, Tech. Rep. UM-CS-2010-032. collaborative
doc-x0842 patent Risk-sensitive investment strategies under partially observable market conditions
  • Janusz Marecki (IBM US)
2010 U.S. Patent Application No. 12/780,650 single institute
doc-x0943 external conference Toward quantification of utility in the OODA loop
  • Dave Thornley (Imperial)
2010 PASTA 2010 single institute
doc-1415 tech report Presentation to Prof H Boley on representation of logic and rationale
  • David Mott (IBM UK)
Dec-2009 ITA single institute
doc-x0155 external conference On black-box constructions of predicate encryption from trapdoor permutations
  • Jonathan Katz (UMD)
  • Arkady Yerukhimovich (UMD)
Dec-2009 IACR Annual International Conference on the Theory and Application of Cryptology and Information (ASIACRYPT), 2009 single institute
doc-x0160 external conference On the application of network coding with diversity to opportunistic scheduling

Best paper award
Variants: doc-1014
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Mugen Peng
Dec-2009 Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference on (pp. 534-538). IET collaborative
doc-1008 external conference Transmission Delay Analysis with Finite Coding Length in Wireless Cooperative Networks
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Nov-2009 IEEE Global Communications Conference (GlobeCom), 2009 single institute
doc-1037 external conference Impact of Social Networks on Delay Tolerant Routing
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2009 IEEE Global Communications Conference (GlobeCom), 2009 single institute
doc-1038 external conference Distributed Target Tracking with Directional Binary Sensor Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2009 IEEE Global Communications Conference (GlobeCom), 2009 single institute
doc-1039a external conference A Participation Incentive Market Mechanism for Allocating Heterogeneous Network Services
  • Juong-Sik Lee
  • Boleslaw Szymanski (RPI)
Nov-2009 IEEE Global Communications Conference (GlobeCom), 2009 collaborative
doc-1355 journal Resource Determination and Allocation in Sensor Networks: A Hybrid Approach
  • Murat Sensoy (Aberdeen)
  • Thao Le (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Alun Preece (Cardiff)
Nov-2009 The Computer Journal collaborative
doc-1357 journal What Is a Good Plan? Cultural Variations in Expert Planners' Concepts of Plan Quality
  • Louise Rasmussen
  • Winston Sieck
  • Paul Smart (Southampton)
Nov-2009 Journal of Cognitive Engineering and Decision Making international
doc-1419 external conference Defining Quality of Information and Metadata for Sensor-originated Information
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Mani Srivastava (UCLA)
  • Dave Thornley (Imperial)
  • Dinesh Verma (IBM US)
  • Rob Young (DSTL)
Nov-2009 USMA Network Science Workshop international with government
doc-1420 tech report Implemented Extensions to CPM 3
  • David Mott (IBM UK)
Nov-2009 ITA single institute
doc-1424 invited talk Collaborative Jazz Improvisation as an example of Cognitive and Network Extension
  • David Mott (IBM UK)
  • John Ibbotson (IBM UK)
Nov-2009 single institute
doc-1425 tech report The Representation of Special Logics in Semantic Web languages
  • David Mott (IBM UK)
  • Will Harwood
Nov-2009 ITA collaborative
doc-1426 tech report Outline of Scenario for CPM Evaluation, Q4 BPP09
  • David Mott (IBM UK)
  • Jitu Patel (DSTL)
  • Ed Gentle (DSTL)
Nov-2009 ITA collaborative
doc-1428 tech report Conceptual Mapping between GPAL-OWL and CPM
  • David Mott (IBM UK)
  • Ali Bahrami
  • Jun Yuan
Nov-2009 ITA international
doc-989 external conference Bounds on Network Coding and Multi-Rate Diversity Gain in Multicast Wireless Applications
  • Luiz Filipe Vieira (UCLA)
  • Mario Gerla (UCLA)
  • Archan Misra (IBM US)
Nov-2009 Wireless Communication Systems, 2009. ISWCS 2009. 6th International Symposium on (pp. 221-224). IEEE collaborative
doc-990 external conference Protecting Network Coded Packets in Coalition Networks
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Nov-2009 Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on (pp. 168-175). IEEE single institute
doc-991 external conference Learning Policy Constraints through Dialogue
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Frank Guerin (Aberdeen)
  • Simon Parsons (CUNY)
Nov-2009 AAAI Fall Symposium: The Uses of Computational Argumentation international
doc-x0092 external conference A metadata calculus for secure information sharing
  • Mudhakar Srivatsa (IBM US)
  • Dakshi Agrawal (IBM US)
  • Steffen Reidt (RHUL)
Nov-2009 Proceedings of the 16th ACM conference on Computer and communications security (pp. 488-499). ACM international
doc-x0100 external conference A Study on Transmission Delay with Finite Coding Length in Wireless Cooperative Networks
Variants: doc-1013
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Nov-2009 IEEE Global Communications Conference (GlobeCom), 2009 single institute
doc-x0125 external conference Dynamic security policy learning
  • Yow Tzu Lim
  • Pau-Chen Cheng (IBM US)
  • Pankaj Rohatgi (IBM US)
  • John Clark
Nov-2009 Proceedings of the first ACM workshop on Information security governance (pp. 39-48). ACM international
doc-x0158 external conference On optimising personal network size to manage information flow
  • Yu-En Lu (Cambridge)
  • Sam Roberts
  • Tammy Cheng (Cambridge)
  • Robin Dunbar
  • Pietro Lio (Cambridge)
  • Jon Crowcroft (Cambridge)
Nov-2009 Proceedings of the 1st ACM international workshop on Complex networks meet information & knowledge management (pp. 19-26). ACM collaborative
doc-x0173 external conference Route capacity estimation based admission control and QoS routing for mesh networks
  • Chi Harold Liu
  • Athanasios Gkelias (Imperial)
  • Kin Leung (Imperial)
Nov-2009 IEEE Global Communications Conference (GlobeCom), 2009 collaborative
doc-x0184 external conference The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
  • Steffen Reidt (RHUL)
  • Mudhakar Srivatsa (IBM US)
  • Shane Balfe (RHUL)
Nov-2009 Proceedings of the 16th ACM conference on Computer and communications security (pp. 291-302). ACM international
doc-1025 external conference Energy-efficient key distribution and revocation in tactical networks with asymmetric links
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Oct-2009 IEEE Military Communications Conference, 2009 single institute
doc-1427 tech report Emergent capabilities for collaborative teams in the evolving web environment
  • Dave Braines (IBM UK)
  • Gareth Jones (IBM UK)
  • James Thomas (IBM UK)
  • Paul Smart (Southampton)
  • Jie Bao (RPI)
Oct-2009 ITA international
doc-992 external conference Interpreting Team Collaboration
  • Helen Bowyer (IBM UK)
  • Peter Waggett (IBM UK)
  • Stephen Poltrock
  • Mark Handel
  • Paul Murray
Oct-2009 2009 Network Science Workshop international
doc-995 external conference Semantic History: Towards Modeling and Publishing Changes of Online Semantic Data
  • Jie Bao (RPI)
  • Li Ding (RPI)
  • Deborah McGuinness (RPI)
Oct-2009 International Semantic Web Conference (ISWC), 2009 single institute
doc-996 external conference A Semantic Wiki Based Light-Weight Web Application Model
  • Jie Bao (RPI)
  • Li Ding (RPI)
  • Rui Huang (RPI)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Gareth Jones (IBM UK)
Oct-2009 International Semantic Web Conference (ISWC), 2009 international
doc-999a external conference CoCast: Multicast Mobile Ad Hoc Networks using Cognitive Radio
  • Wooseong Kim (UCLA)
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
  • Joon-Sang Park
Oct-2009 IEEE Military Communications Conference, 2009 collaborative
doc-x0162 external conference On the maximum throughput of clandestine sensor networking
  • Ting He (IBM US)
  • Lang Tong
  • Ananthram Swami (ARL)
Oct-2009 IEEE Military Communications Conference, 2009 collaborative with government
doc-x1031 external conference More is more: The benefits of dense sensor deployment
Variants: doc-x0215
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Matthew Johnson (CUNY)
  • Deniz Sarioz (CUNY)
  • Dinesh Verma (IBM US)
  • Chai Wah Wu (IBM US)
Oct-2009 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2009 collaborative
doc-1002 internal conference Expressive Policy Analysis with Laws of System Change
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
  • Arosha Bandara
  • Seraphin Calo (IBM US)
  • Morris Sloman (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1005 external conference A Stochastic Geometry Approach to Transmission Capacity in Wireless Cooperative Networks
  • Zhengguo Sheng (Imperial)
  • Dennis Goeckel (UMass)
  • Kin Leung (Imperial)
  • Zhiguo Ding (Imperial)
Sep-2009 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2009 international
doc-1006a external conference Enhancing Congestion Control with Adaptive Per-Node Airtime Allocation for Wireless Sensor Networks
  • Yun Hou (Imperial)
  • Kin Leung (Imperial)
  • Archan Misra (IBM US)
Sep-2009 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2009 international
doc-1009 internal conference Interference Subtraction with Supplementary Cooperation in Wireless Cooperative Networks
Variants: doc-1070
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1010 internal conference Neighbor Discovery in Wireless Networks and the Coupon Collector's Problem
Variants: doc-1011
  • Sudarshan Vasudevan (UMass)
  • Don Towsley (UMass)
  • Dennis Goeckel (UMass)
  • Ramin Khalili (UMass)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1011 external conference Neighbor Discovery in Wireless Networks and the Coupon Collector's Problem
Variants: doc-1010
  • Sudarshan Vasudevan (UMass)
  • Don Towsley (UMass)
  • Dennis Goeckel (UMass)
  • Ramin Khalili (UMass)
Sep-2009 Annual International Conference on Mobile Computing and Networking, 2009 single institute
doc-1012a internal conference Mission-based Joint Optimal Resource Allocation in Wireless Multicast Sensor Networks
  • Yun Hou (Imperial)
  • Kin Leung (Imperial)
  • Archan Misra (IBM US)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1013 internal conference A Study on Transmission Delay with Finite Coding Length in Wireless Cooperative Networks
Variants: doc-x0100
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1014 internal conference On the Application of Network Coding with Diversity to Opportunistic Scheduling
Variants: doc-x0160
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1015a internal conference RelayCast: Scalable Multicast Routing in Delay Tolerant Coalition Networks
  • Uichin Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
Sep-2009 3rd Annual Conference of the International Technology Alliance collaborative
doc-1016 internal conference Enabling Inter-domain DTN Communications by Networked Static Gateways
  • Ting He (IBM US)
  • Nikoletta Sofra (Imperial)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1017 internal conference Topology-aware Inter-domain Routing for Heterogeneous MANETs
  • Sihyung Lee (IBM US)
  • Starsky Wong (IBM US)
  • Sid Chau (Cambridge)
  • Srivatsan Varadarajan (Honeywell)
  • Kang-won Lee (IBM US)
  • Jon Crowcroft (Cambridge)
  • Mario Gerla (UCLA)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1018a internal conference Dynamic Attributes Design in Attribute Based Encryption
  • Nanxi Chen (UCLA)
  • Mario Gerla (UCLA)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1019a internal conference Adaptive Forwarding Rate Control for Network Coding in the Tactical MANET
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1020 internal conference Self-Organizing Processes of Collective Behavior in Computer Networks
  • Sid Chau (Cambridge)
  • Vasilieos Pappas (IBM US)
  • Kang-won Lee (IBM US)
  • Asser Tantawi (IBM US)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1021 internal conference Morphogenesis in Computer Networks
Variants: doc-984
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1023 internal conference Efficient Evaluation of History-based Policies
  • Jiefei Ma (Imperial)
  • Jorge Lobo (IBM US)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
  • Seraphin Calo (IBM US)
  • Morris Sloman (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1024 internal conference Realising Management and Composition of Self-Managed Cells in Body Area Networks
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1028 internal conference A Metadata Algebra for Sharing Tactical Information
  • Mudhakar Srivatsa (IBM US)
  • Dakshi Agrawal (IBM US)
  • Steffen Reidt (RHUL)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1029a internal conference Broadcast Encryption with Multiple Trust Centers and Dynamic Coalitions
Variants: doc-1029b
  • Christopher Seaman (CUNY)
  • Kent Boklan (CUNY)
  • Alex Dent (RHUL)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1030 internal conference Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1031 internal conference Bootstrapping Coalition MANETs: Physical-Layer Security under Active Adversary
  • Murtaza Zafer (IBM US)
  • Dakshi Agrawal (IBM US)
  • Mudhakar Srivatsa (IBM US)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1032 internal conference A Judgement Mechanism for Key Revocation
  • Steffen Reidt (RHUL)
  • Mudhakar Srivatsa (IBM US)
  • Shane Balfe (RHUL)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1033 internal conference A Judgment Mechanism for Key Revocation
  • Steffen Reidt (RHUL)
  • Mudhakar Srivatsa (IBM US)
  • Shane Balfe (RHUL)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1035 internal conference Knowledge-Driven Agile Sensor-Mission Assignment
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Konrad Borowiecki (Cardiff)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Amotz Bar-Noy (CUNY)
  • Matthew Johnson (CUNY)
  • Thomas La Porta (PSU)
  • Hosam Rowaihy (PSU)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1040 internal conference Experimental Evaluation of the Performance and Scalability of a Dynamic Distributed Federated Database
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
  • Abbe Mowshowitz (CUNY)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1041 poster Technologies for Federation and Interoperation of Coalition Networks
Variants: doc-1064
  • Seraphin Calo (IBM US)
  • David Wood (IBM US)
  • Petros Zerfos (IBM US)
  • David Vyvyan (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1042a internal conference Agent Assistance in Forming Swift Trust in Ad-Hoc Decision-Making Teams
  • Chris Burnett (Aberdeen)
  • Timothy Norman (Aberdeen)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1043a internal conference Argumentation-based agent support for learning policies in a coalition mission
  • Chukwuemeka Emele (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Frank Guerin (Aberdeen)
  • Simon Parsons (CUNY)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1044a internal conference Towards the Implementation of Multi-Agent Planning Dialogues
  • Yuqing Tang (CMU)
  • Timothy Norman (Aberdeen)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1045a internal conference Agent Support for Policy-driven Collaborative Planning in Ad-hoc Teams
  • Martin Kollingbaum (Aberdeen)
  • Joseph Giampapa (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1046a internal conference Evidence-Based Plan Monitoring for Human Teams in Uncertain Environments
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1047a internal conference Discovering Context Changes in Team Behaviour
  • Stephen Poltrock
  • Mark Handel
  • Helen Bowyer (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1048a internal conference Modeling simulated military mission context
  • Stephen Poltrock
  • Mark Handel
  • Helen Bowyer (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1050a poster Miscommunication and Context Awareness
  • Stephen Poteet
  • Cheryl Giammanco (ARL)
  • Jitu Patel (DSTL)
  • Anne Kao
  • Ping Xue
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1051 poster Improving Shared Understanding in Multilevel Planning
  • Michael Dorneich
  • David Mott (IBM UK)
  • Ali Bahrami
  • Jitu Patel (DSTL)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1052 internal conference Visualising Rationale in the CPM
  • David Mott (IBM UK)
  • Michael Dorneich
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1053 internal conference Layered Controlled Natural Languages
  • David Mott (IBM UK)
  • Jim Hendler (RPI)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1054 internal conference Towards an Understanding of Shared Understanding in Military Coalition Contexts
  • Paul Smart (Southampton)
  • Trung Dong Huynh (Southampton)
  • David Mott (IBM UK)
  • Katia Sycara (CMU)
  • Dave Braines (IBM UK)
  • Mike Strub (ARL)
  • Winston Sieck
  • Nigel Shadbolt (Southampton)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1055 poster A Controlled Natural Language Interface for Semantic MediaWiki
  • Jie Bao (RPI)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Gareth Jones (IBM UK)
  • Nigel Shadbolt (Southampton)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1056 internal conference Rule Modeling Using Semantic MediaWiki
  • Jie Bao (RPI)
  • Li Ding (RPI)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Gareth Jones (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1068 internal conference Enhanced Situation Awareness in Collaborative Planning Through Context-Aware Mashup
  • Ali Bahrami
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-1417b internal conference Review of relational algebra for dynamic distributed federated databases
Variants: doc-1417a
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Graham Bent (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1431b internal conference GIDS: Global Interlinked Data Store
  • Gareth Jones (IBM UK)
  • Dave Braines (IBM UK)
  • Paul Smart (Southampton)
  • Jie Bao (RPI)
  • Trung Dong Huynh (Southampton)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-998 internal conference Full Connectivity and Percolation in Large Cooperative Wireless Networks
  • Cagatay Capar (UMass)
  • Dennis Goeckel (UMass)
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
  • Liaoruo Wang (UMass)
Sep-2009 3rd Annual Conference of the International Technology Alliance single institute
doc-x0033 journal On the Study of Network Coded AF Transmission Protocol for Wireless Multiple Access Channels
Variants: doc-1378
  • Zhiguo Ding (Imperial)
  • Tharmalingam Ratnarajah
  • Kin Leung (Imperial)
Sep-2009 Wireless Communications, IEEE Transactions on 8.1 (2009): 118-123 collaborative
doc-x0096 external conference A note on information-theoretic secret key exchange over wireless channels
  • Murtaza Zafer (IBM US)
  • Dakshi Agrawal (IBM US)
  • Mudhakar Srivatsa (IBM US)
Sep-2009 Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on (pp. 754-761). IEEE single institute
doc-x0098 external conference A scalable micro wireless interconnect structure for CMPs
  • Suk-Bok Lee (UCLA)
  • Sai-Wang Tam (UCLA)
  • Ioannis Pefkianakis (UCLA)
  • Songwu Lu (UCLA)
  • Frank Chang (UCLA)
  • Chuanxiong Guo
  • Jason Cong (UCLA)
Sep-2009 Proceedings of the 15th annual international conference on Mobile computing and networking (pp. 217-228). ACM international
doc-x0146 external conference Maximum throughput of clandestine relay
  • Ting He (IBM US)
  • Lang Tong
  • Ananthram Swami (ARL)
Sep-2009 47th Annual Allerton Conference on (pp. 1082-1089). IEEE collaborative with government
doc-x0195 internal conference Understanding the quality of management in computer networks
  • Dinesh Verma (IBM US)
  • Bong Jun Ko (IBM US)
  • Petros Zerfos (IBM US)
  • Kang-won Lee (IBM US)
  • Matthew Duggan (IBM UK)
  • Kristian Stewart (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-x0196 internal conference A QoI-Aware Middleware for Task-Oriented Applications in Wireless Sensor Networks
  • Chi Liu (Imperial)
  • Kin Leung (Imperial)
  • Joel Branch (IBM US)
  • Chatschik Bisdikian (IBM US)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-x0241 internal conference Exact and Fuzzy Sensor-Task Assignment
Variants: doc-x0542
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Lance Kaplan (ARL)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-x0304 internal conference A controlled natural language interface for semantic media wiki
  • Jie Bao (RPI)
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
  • Dave Braines (IBM UK)
  • Gareth Jones (IBM UK)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-x0536 internal conference Evaluating the Control Overhead of Routing Protocols in Dynamic Ad Hoc Networks
  • Victor Manfredi (UMass)
  • Robert Hancock (Roke)
  • Jim Kurose (UMass)
Sep-2009 3rd Annual Conference of the International Technology Alliance international
doc-1000 external conference Scaling Properties of Delay Tolerant Networks in Correlated Motion Patterns
  • Uichin Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
Aug-2009 Proceedings of the 4th ACM Workshop on Challenged Networks (pp. 19-26). ACM collaborative
doc-1001 external conference Temporal Distance Metrics for Social Network Analysis
  • John Tang (Cambridge)
  • Mirco Musolesi (Cambridge)
  • Cecilia Mascolo (Cambridge)
  • Vito Latora
Aug-2009 Proceedings of the 2nd ACM workshop on Online social networks (pp. 31-36). ACM collaborative
doc-1022a external conference Security Policy Refinement using Data Integration: A Position Paper
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Emil Lupu (Imperial)
  • Alessandra Russo (Imperial)
  • Morris Sloman (Imperial)
Aug-2009 Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (pp. 25-28). ACM international
doc-1026 external conference Attacking Cryptographic Schemes Based on `Perturbation Polynomials`
  • Martin Albrecht (RHUL)
  • Craig Gentry (IBM US)
  • Shai Halevi (IBM US)
  • Jonathan Katz (UMD)
Aug-2009 Proceedings of the 16th ACM conference on Computer and communications security (pp. 1-10). ACM. international
doc-1034 journal Who, When, Where; Timeslot Assignment to Mobile Clients
Variants: doc-883
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Aug-2009 Mobile Computing, IEEE Transactions on, 11(1), 73-85 collaborative
doc-1060 external conference Building key-private, public-key encryption schemes
  • Kenny Paterson (RHUL)
  • Sriramkrishnan Srinivasan (RHUL)
Aug-2009 Information Security and Privacy (pp. 276-292). Springer Berlin Heidelberg single institute
doc-1077 journal Proactive Data Dissemination to Mission Sites
  • Fangfei Chen (PSU)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Iris Fermin (SEA)
  • Thomas La Porta (PSU)
Aug-2009 Wireless Networks, 18(7), 749-762 international
doc-1078 external conference Flexible Resource Assignment in Sensor Networks: A Hybrid Reasoning Approach
  • Geeth de Mel (Aberdeen)
  • Murat Sensoy (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Alun Preece (Cardiff)
Aug-2009 1st International Workshop on the Semantic Sensor Web (SemSenWeb 2009), Heraklion, Crete, Greece, 1st June, 2009. Collocated with 6th Annual European Semantic Web Conference" (ESWC 2009) collaborative with government
doc-1092 external conference Selection of Sensors For Missions Using Semantic-Aware Cooperative Agents
  • Murat Sensoy (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Geeth de Mel (Aberdeen)
  • Timothy Norman (Aberdeen)
Aug-2009 Proceedings of the International Workshop on Agent-based Technologies and applications for enterprise interoperability (ATOP'09) (pp. 73-84) single institute with government
doc-1362 journal MANET QoS Support without Reservations
  • Soon Young Oh (UCLA)
  • Gustavo Marfia (UCLA)
  • Mario Gerla (UCLA)
Aug-2009 Wiley Journal on Security and Communication Networks single institute
doc-1363 journal Temperature Driven Time Synchronization
  • Thomas Schmid (UCLA)
  • Zainul Charbiwala (UCLA)
  • Roy Shea (UCLA)
  • Mani Srivastava (UCLA)
Aug-2009 IEEE Embedded Systems Letters, July 2009 single institute
doc-1364a journal On the Development of an Internetwork-centric Defense for Scanning Worms
Variants: doc-1325
  • Scott Coull
  • Boleslaw Szymanski (RPI)
Aug-2009 Computers & Security (2009) doi:10.1016/j.cose.2009.07.003 collaborative
doc-1367 journal Agent Support for Policy-driven Collaborative Mission Planning
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
  • Joseph Giampapa (CMU)
  • Martin Kollingbaum (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Daniele Masato (Aberdeen)
  • Mairi McCallum (Aberdeen)
  • Mike Strub (ARL)
Aug-2009 The Computer Journal, June 24 2009, doi: 10.1093/comjnl/bxp061 international with government
doc-1396 external conference On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups
  • Kenny Paterson (RHUL)
  • Sriramkrishnan Srinivasan (RHUL)
Aug-2009 Designs, Codes and Cryptography, 52(2), 219-241 single institute
doc-1431a tech report GIDS: Global Interlinked Data Store (Full Technical Report)
  • Gareth Jones (IBM UK)
  • Dave Braines (IBM UK)
  • Paul Smart (Southampton)
  • Jie Bao (RPI)
  • Trung Dong Huynh (Southampton)
Aug-2009 Technical report international
doc-1432 tech report The representation of logic in semantic web languages
  • David Mott (IBM UK)
Aug-2009 single institute
doc-1433 tech report Representation of Logic in the CPM
  • David Mott (IBM UK)
Aug-2009 single institute
doc-994 external conference On the recognition of compromise in sensing systems: rewired acoustic arrays and distorted route estimation and classification
  • Dave Thornley (Imperial)
  • Thyagaraju Damarla (ARL)
  • Mani Srivastava (UCLA)
  • Dinkar Mylaraswamy (Honeywell)
Aug-2009 International Society for Optics and Photonics - Europe Security and Defense, 2009 international with government
doc-x0129 external conference Energy efficient sampling for event detection in wireless sensor networks
  • Zainul Charbiwala (UCLA)
  • Younghun Kim (UCLA)
  • Sadaf Zahedi (UCLA)
  • Jonathan Friedman (UCLA)
  • Mani Srivastava (UCLA)
Aug-2009 Proceedings of the 2009 ACM/IEEE international symposium on Low power electronics and design (pp. 419-424). ACM single institute
doc-x0168 external conference Privacy-preserving integrity-assured data aggregation in sensor networks
  • Gelareh Taban (UMD)
  • Virgil Gligor (CMU)
Aug-2009 2009 International Conference on Computational Science and Engineering (pp. 168-175). IEEE collaborative
doc-x0181 external conference Size matters: variation in personal network size, personality and effect on information transmission
  • Yu-En Lu (Cambridge)
  • Sam Roberts
  • Pietro Lio (Cambridge)
  • Robin Dunbar
  • Jon Crowcroft (Cambridge)
Aug-2009 Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 4, pp. 188-193). IEEE collaborative
doc-x0188 external conference Trading in risk: Using markets to improve access control
  • Ian Molloy (IBM US)
  • Pau-Chen Cheng (IBM US)
  • Pankaj Rohatgi (IBM US)
Aug-2009 Proceedings of the 2008 workshop on New security paradigms (pp. 107-125). ACM single institute
doc-1004 external conference Toward efficient quality of information estimation in simultaneous acoustic tracking and classification of multiple targets
  • Thyagaraju Damarla (ARL)
  • Dave Thornley (Imperial)
  • Duncan Gillies (Imperial)
  • Ed Gentle (DSTL)
Jul-2009 12th International Conference on Information FUSION international with government
doc-1061 external conference A Dynamic Infrastructure for Interconnecting Disparate ISR/ISTAR Assets (the ITA Sensor Fabric)
  • Joel Wright (IBM UK)
  • Christopher Gibson (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • Kelvin Marcus (ARL)
  • Ryan Pressley (ARL)
  • Gunjan Verma (ARL)
  • Gene Whipps (ARL)
Jul-2009 12th International Conference on Information FUSION international with government
doc-1062 external conference Verification of Policy-Based Self-Managed Cell Interactions Using Alloy
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
  • Susan Eisenbach (Imperial)
Jul-2009 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2009 single institute
doc-1063 external conference Acoustic Vehicle Classification by Fusing with Semantic Annotation
  • Baofeng Guo (Southampton)
  • Mark Nixon (Southampton)
  • Thyagaraju Damarla (ARL)
Jul-2009 12th International Conference on Information FUSION international with government
doc-1064 external conference Technologies for Federation and Interoperation of Coalition Networks
Variants: doc-1041
  • Seraphin Calo (IBM US)
  • David Wood (IBM US)
  • Petros Zerfos (IBM US)
  • David Vyvyan (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Graham Bent (IBM UK)
Jul-2009 12th International Conference on Information FUSION international
doc-1440 external conference Building Principles for a Quality of Information Specification for Sensor Information
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Mani Srivastava (UCLA)
  • Dave Thornley (Imperial)
  • Dinesh Verma (IBM US)
  • Rob Young (DSTL)
Jul-2009 12th International Conference on Information FUSION international with government
doc-x0002 external conference An end to end life cycle for ISR in coalition networks
  • Dinesh Verma (IBM US)
  • Tien Pham (ARL)
  • Greg Cirincione (ARL)
  • Gavin Pearson (DSTL)
Jul-2009 12th International Conference on Information FUSION international with government
doc-x0103 external conference Adaptive packet prioritisation for wireless sensor networks
  • Laurence Hey (Imperial)
  • Erol Gelenbe (Imperial)
Jul-2009 Next Generation Internet Networks, 2009. NGI'09 (pp. 1-7). IEEE single institute
doc-1079 external conference Cheap or Flexible Sensor Coverage
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Matthew Johnson (CUNY)
  • Ou Liu (CUNY)
Jun-2009 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2009 single institute
doc-1080 external conference Detection and Localization Sensor Assignment With Exact and Fuzzy Locations
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Lance Kaplan (ARL)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
Jun-2009 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2009 international with government
doc-1083 external conference Control-theoretic Optimization of Utility over Mission Lifetimes in Multi-hop Wireless Networks
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Jun-2009 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009 collaborative
doc-x0543 external conference Examining the Perception of Miscommunication in a Coalition Environment ID# 072
  • Marie Cahillane (Cranfield)
  • Caroline Morin (Cranfield)
  • Ian Whitworth (Cranfield)
  • Andy Farmilo (Cranfield)
  • Geoff Hone (Cranfield)
Jun-2009 International Command and Control Research Technology Symposium (ICCRTS), 2009 single institute
doc-1058 journal Self-Selecting Reliable Path Routing for Diverse Wireless Sensor Network Environments
  • Thomas Babbitt (RPI)
  • Christopher Morrell (RPI)
  • Boleslaw Szymanski (RPI)
May-2009 Proc. IEEE International Symposium on Computers and Communication, July 2009 single institute
doc-1065 external conference Multi-Scale Temporal Segmentation and Outlier Detection in Sensor Networks
  • Mandis Beigi (IBM US)
  • Shih-Fu Chang
  • Shahram Ebadollahi (IBM US)
  • Dinesh Verma (IBM US)
May-2009 Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on (pp. 306-309). IEEE collaborative
doc-1066 external conference A Scale-Invariant Local Descriptor for Event Recognition in 1D Sensor Signals
  • Jierui Xie (RPI)
  • Mandis Beigi (IBM US)
May-2009 Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on (pp. 1226-1229). IEEE collaborative
doc-1075 external conference A Decision Support System for Secure Information Sharing
  • Achille Fokoue (IBM US)
  • Mudhakar Srivatsa (IBM US)
  • Pankaj Rohatgi (IBM US)
  • Peter Wrobel (DSTL)
  • John Yesberg (DSTL)
May-2009 Proceedings of the 14th ACM symposium on Access control models and technologies (pp. 105-114). ACM international with government
doc-1085 external conference Automated Aiding Strategies for Decentralized Planning with Interdependent Policies
  • Martin Kollingbaum (Aberdeen)
  • Joseph Giampapa (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
  • Chris Burnett (Aberdeen)
  • Daniele Masato (Aberdeen)
May-2009 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 international
doc-1086 external conference Agent Support for Human Team Collaboration in Uncertain Environments
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
May-2009 Proc. of the First Int. Workshop on Mixed-Initiative Multiagent Systems, Budapest, Hungary single institute
doc-1091 external conference Policy-driven Planning in Coalitions - a Case Study
  • Martin Kollingbaum (Aberdeen)
  • Joseph Giampapa (CMU)
  • Katia Sycara (CMU)
  • Timothy Norman (Aberdeen)
May-2009 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 international
doc-1093 external conference Multi-agent Planning with Confidentiality
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Krysia Broda (Imperial)
  • Emil Lupu (Imperial)
May-2009 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 single institute
doc-1094 external conference Agent-based Sensor-Mission Assignment for Tasks Sharing Assets
  • Thao Le (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
May-2009 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 single institute
doc-1103 external conference On Efficient Query Processing of Stream Counts on the Cell Processor
  • Dina Thomas (Stanford)
  • Rajesh Bordawekar (IBM US)
  • Charu Aggarwal (IBM US)
  • Philip Yu (IBM US)
May-2009 Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 748-759). IEEE collaborative
doc-1104 external conference A Framework for Clustering Massive-Domain Data Streams
  • Charu Aggarwal (IBM US)
May-2009 Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 102-113). IEEE single institute
doc-1110a tech report Expressive Policy Analysis with Enhanced System Dynamicity
Variants: doc-1110b,doc-1110d
  • Jorge Lobo (IBM US)
May-2009 seminar presentation at NYU-Poly, April 1 single institute
doc-1116a tech report Applying quality formalisms and QoS experience in building a framework for studying QoI
  • Chatschik Bisdikian (IBM US)
May-2009 panel presentation at the 'Information Quality and QoS in Sensor Networks: Challenges and Opportunities' panel session, IQ2S-09, Galveston, TX, USA, March 9 2009; single institute
doc-1119 external conference Contract Formation Through Preemptive Normative Conflict Resolution
  • Wamberto Vasconcelos (Aberdeen)
  • Timothy Norman (Aberdeen)
May-2009 Proceedings of the Fourth International Workshop on Normative Multi-Agent Systems (NorMAS09), Schloss Dagstuhl, Germany, March, 2009. single institute
doc-1358 journal Bounds on the Throughput Gain of Network Coding in Unicast and Multicast Wireless Networks
  • Junning Liu (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
May-2009 IEEE JSAC single institute
doc-1359 journal Asymptotic Connectivity Properties of Cooperative Wireless Ad Hoc Networks
  • Dennis Goeckel (UMass)
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
  • Liaoruo Wang (UMass)
  • Cedric Westphal
May-2009 IEEE JSAC collaborative
doc-1368 journal Dynamic Service Execution in Sensor Networks
  • Lei Chen (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
  • Joel Branch (IBM US)
  • Dinesh Verma (IBM US)
  • Thyagaraju Damarla (ARL)
  • John Ibbotson (IBM UK)
May-2009 Computer Journal, 2009. The Computer Journal Advance Access published online on May 28, 2009 international with government
doc-1369 journal Analyzing Team Decision-Making in Tactical Scenarios
  • Gita Sukthankar
  • Katia Sycara (CMU)
May-2009 The Computer Journal- 2009 collaborative
doc-1370 journal Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks
  • Duncan Gillies (Imperial)
  • Dave Thornley (Imperial)
  • Chatschik Bisdikian (IBM US)
May-2009 British Computer Society: The Computer Journal (in press) international
doc-1371 tech report Engineering Policy-Based Ubiquitous Systems
  • Morris Sloman (Imperial)
May-2009 lecture for the British Computer Society Computer Journal Lecture Series. single institute
doc-1374 journal CONTOUR: An Efficient Algorithm for Discovering Discriminating Subsequences
  • Jianyong Wang
  • Yuzhou Zhang
  • Lizhu Zhou
  • George Karypis
  • Charu Aggarwal (IBM US)
May-2009 Data Mining and Knowledge Discovery Journal, Vol 18(1), February 2009. collaborative
doc-1430 poster Adaptive in-network processing for bandwidth and energy constrained mission-oriented wireless sensor networks
  • Sharanya Eswaran (PSU)
  • Matthew Johnson (CUNY)
  • Archan Misra (IBM US)
May-2009 DCOSS 2009, June 2009 collaborative
doc-1434 tech report Efficient SME Knowledge capture through CNLs and ontologies
  • Dave Braines (IBM UK)
May-2009 single institute
doc-1435 tech report Extension to the Evaluation using visual rationale
  • David Mott (IBM UK)
May-2009 single institute
doc-1436 tech report Exploring high level CNLs for logistics
  • David Mott (IBM UK)
May-2009 single institute
doc-1437 tech report Example of Multilevel representation of ammunition
  • David Mott (IBM UK)
May-2009 single institute
doc-1438 tech report A Hybrid Search Engine for the Semantic Web
  • Christos Koumenides (Southampton)
May-2009 single institute
doc-x0089 external conference A dialogue mechanism for public argumentation using conversation policies
  • Yuqing Tang (CMU)
  • Simon Parsons (CUNY)
May-2009 Argumentation in Multi-Agent Systems (ArgMAS), 2009 collaborative
doc-x0108 external conference Application of halftoning algorithms to location dependent sensor placement
  • Dinesh Verma (IBM US)
  • Chai Wah Wu (IBM US)
  • Ted Brown (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Simon Shamoun (CUNY)
  • Mark Nixon (Southampton)
May-2009 Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on (pp. 161-164). IEEE international
doc-x0139 external conference Inconsistency tolerance in weighted argument systems
  • Paul Dunne
  • Anthony Hunter (UCL)
  • Peter McBurney
  • Simon Parsons (CUNY)
  • Michael Wooldridge
May-2009 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 international
doc-x0157 external conference On high dimensional projected clustering of uncertain data streams
  • Charu Aggarwal (IBM US)
May-2009 Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 1152-1154). IEEE single institute
doc-1097 external conference Event Recognition in Sensor Networks by Means of Grammatical Inference
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
Apr-2009 IEEE International Conference on Computer Communications (InfoCom), 2009 single institute
doc-1099 external conference Exact Analysis of Latency of Stateless Opportunistic Forwarding
  • Sid Chau (Cambridge)
  • Prithwish Basu (BBN)
Apr-2009 IEEE International Conference on Computer Communications (InfoCom), 2009 international
doc-1101 external conference Generating Reliable Quality of Information (QoI) Metrics for Target Tracking
  • Chung-Huat Tan (Imperial)
  • Duncan Gillies (Imperial)
Apr-2009 International Society for Optics and Photonics - Defense, Security and Sensing, 2009 single institute
doc-1105a external conference A stochastic process algebraic abstraction of detection evidence fusion in tactical sensor networks
  • Dave Thornley (Imperial)
  • Duncan Gillies (Imperial)
  • Chatschik Bisdikian (IBM US)
Apr-2009 International Society for Optics and Photonics - Defense, Security and Sensing, 2009 international
doc-1106 external conference Sensor Assignment to Missions in a Coalition Context: The SAM Tool
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Konrad Borowiecki (Cardiff)
  • Geeth de Mel (Aberdeen)
  • Mario Gomez (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Amotz Bar-Noy (CUNY)
  • Matthew Johnson (CUNY)
  • Thomas La Porta (PSU)
  • Hosam Rowaihy (PSU)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
Apr-2009 IEEE International Conference on Computer Communications (InfoCom), 2009 international with government
doc-1107 external conference The ITA Sensor Fabric
  • Joel Wright (IBM UK)
  • Christopher Gibson (IBM UK)
  • Flavio Bergamaschi (IBM UK)
  • Kelvin Marcus (ARL)
  • Tien Pham (ARL)
  • Ryan Pressley (ARL)
  • Gunjan Verma (ARL)
Apr-2009 International Society for Optics and Photonics - Defense, Security and Sensing, 2009 international with government
doc-x0094 external conference A new approach to architecture of sensor networks for mission-oriented applications
  • Chi Liu (Imperial)
  • Kin Leung (Imperial)
  • Chatschik Bisdikian (IBM US)
  • Joel Branch (IBM US)
Apr-2009 International Society for Optics and Photonics - Defense, Security and Sensing, 2009 international
doc-x0186 external conference TO-GO: TOpology-assist geo-opportunistic routing in urban vehicular grids
  • Kevin Lee (UCLA)
  • Uichin Lee (UCLA)
  • Mario Gerla (UCLA)
Apr-2009 Wireless On-Demand Network Systems and Services, 2009. WONS 2009. Sixth International Conference on (pp. 11-18). IEEE single institute
doc-x0942 external conference Toward mission-specific service utility estimation using analytic stochastic process models
  • Dave Thornley (Imperial)
  • Rob Young (DSTL)
  • James Richardson (Honeywell)
Apr-2009 International Society for Optics and Photonics - Defense, Security and Sensing, 2009 international with government
doc-1108a external conference Auction-Based Congestion Management for Target Tracking in Wireless Sensor Networks
  • Lei Chen (RPI)
  • Boleslaw Szymanski (RPI)
  • Joel Branch (IBM US)
Mar-2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009 collaborative
doc-1114 external conference Shared Understanding within Military Coalitions: A Definition and Review of Research Challenges

Best paper award
  • Paul Smart (Southampton)
  • David Mott (IBM UK)
  • Katia Sycara (CMU)
  • Dave Braines (IBM UK)
  • Mike Strub (ARL)
  • Nigel Shadbolt (Southampton)
Mar-2009 Knowledge Systems for Coalition Operations (KSCO), 2009 international with government
doc-1115 external conference Using a Structured Plan Representation to Support Multi-level Planning
  • Michael Dorneich
  • David Mott (IBM UK)
  • Jitu Patel (DSTL)
  • Ed Gentle (DSTL)
Mar-2009 Knowledge Systems for Coalition Operations (KSCO), 2009 international with government
doc-x0091 external conference A letter soup for the quality of information in sensor networks
  • Chatschik Bisdikian (IBM US)
  • Joel Branch (IBM US)
  • Kin Leung (Imperial)
  • Rob Young (DSTL)
Mar-2009 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009 international with government
doc-x0095 external conference A new schema for security in dynamic uncertain environments
  • Dakshi Agrawal (IBM US)
Mar-2009 Sarnoff Symposium, 2009. SARNOFF'09. IEEE (pp. 1-5). IEEE single institute
doc-x0235 tech report A Methodology for Value of Information Determination in Coalition Sensor Networks
  • Ted Brown (CUNY)
  • Dinesh Verma (IBM US)
Mar-2009 Published in: RC24764 in 2009 collaborative
doc-x0236 tech report A State Transition Model for Policy Specification
  • Dinesh Verma (IBM US)
  • Seraphin Calo (IBM US)
  • Greg Cirincione (ARL)
Mar-2009 IBM Research Report RC24766 (March 2009) collaborative
doc-1007 journal SAT: Building New Trust Architecture for Vehicular Networks
  • Xiaoyan Hong
  • Dijiang Huang
  • Mario Gerla (UCLA)
  • Zhen Cao (UCLA)
Feb-2009 MobiArch 2008, Seattle WA, Aug. 2008 collaborative
doc-1069 journal Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Feb-2009 IEEE ICC 2009, Dresden, Germany, June 2009 single institute
doc-1070 journal Interference Subtraction with Supplementary Cooperation in Wireless Cooperative Networks
Variants: doc-1009
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Feb-2009 ICC 2009, June 2009 single institute
doc-1071 journal Distributed and Power Efficient Routing in Wireless Cooperative Networks
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Feb-2009 IEEE ICC 2009, June 2009 single institute
doc-1073 journal Adaptive Response System for Distributed Denial-of-Service Attacks
  • Vrizlynn Thing
  • Morris Sloman (Imperial)
  • Naranker Dulay (Imperial)
Feb-2009 IM 2009 Dissertation Digests, June 2009. collaborative
doc-1074 external conference A Controlled Natural Language Interface for Semantic Media Wiki Using the Rabbit Language
  • Jie Bao (RPI)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Nigel Shadbolt (Southampton)
Feb-2009 Workshop on Controlled Natural Language (CNL'09), Marettimo Island, Italy, June 2009 international
doc-1084 journal Learning Operational Requirements from Goal Models
  • Dalal Alrajeh (Imperial)
  • Jeff Kramer (Imperial)
  • Alessandra Russo (Imperial)
  • Sebastin Uchitel (Imperial)
Feb-2009 ICSE 2009, May 2009. single institute
doc-1095 journal Realising Management and Composition of Self-Managed Cells in Pervasive Healthcare
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
Feb-2009 3rd International Conference on Pervasive Computing Technologies for Healthcare 2009. single institute
doc-1100 journal Quality of Information Aware Rate Control for Sensor Networks
  • Zainul Charbiwala (UCLA)
  • Sadaf Zahedi (UCLA)
  • Younghun Kim (UCLA)
  • Mani Srivastava (UCLA)
  • Young Cho
Feb-2009 Workshop on Feedback Control Implementation and Design in Computing Systems & Networks (FeBID 2009) at ACM/IEEE IPSN / CPS Week, April 2009 collaborative
doc-1102 journal Routing of high-priority packets in wireless sensor networks
  • Erol Gelenbe (Imperial)
  • Edith Ngai
  • Poonam Yadav (IBM US)
Feb-2009 In IEEE Second International Conference on Computer and Network Technology international
doc-1109 external conference Robust and Efficient Communication Overlays for Trust Authority Computations
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
  • Shane Balfe (RHUL)
Feb-2009 Sarnoff Symposium, 2009. SARNOFF'09. IEEE. IEEE, 2009. single institute
doc-1111 tech report Compact Signatures for Network Coding
  • Jonathan Katz (UMD)
  • Brent Waters
Feb-2009 Public Key Cryptography, March 2009 collaborative
doc-1112 journal Hierarchical Identity Based Encryption with Polynomially Many Levels
  • Craig Gentry (IBM US)
  • Shai Halevi (IBM US)
Feb-2009 TCC 2009 - The 6th Theory of Cryptography Conference, Springer, LNCS, March 2009 single institute
doc-1113 external conference Cognitive Extension and the Web
  • Paul Smart (Southampton)
  • Paula Engelbrecht (Southampton)
  • Dave Braines (IBM UK)
  • Mike Strub (ARL)
  • Jim Hendler (RPI)
Feb-2009 Web Science Conference: Society On-Line, Athens, Greece. March 2009 international with government
doc-1121 journal Identifying Social Communities in Complex Communications for Network Efficiency
  • Pan Hui
  • Eiko Yoneki (Cambridge)
  • Jon Crowcroft (Cambridge)
Feb-2009 Proceeding of The First International Conference on Complex Sciences: Theory and Applications (Complex 2009), Shanghai, February, 2009. collaborative
doc-1122 external conference CodeCast: Network Coding Based Multicast in MANETs
  • Chien Chia Chen (UCLA)
  • Chieh Ning Lien (UCLA)
  • Uichin Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Feb-2009 Demos of the 10th international workshop on mobile computing systems and applications (HotMobile 2009) single institute
doc-1123 external conference Sharing airtime with Shair avoids wasting time and money
  • Pan Hui
  • Richard Mortier
  • Kuang Xu (Cambridge)
  • Jon Crowcroft (Cambridge)
  • Victor Li
Feb-2009 Proceedings of the 10th workshop on Mobile Computing Systems and Applications (p. 6). ACM collaborative
doc-1124 demo Inter-Domain Routing for Heterogeneous MANETs
  • Seung-Hoon Lee (UCLA)
  • Starsky Wong (IBM US)
  • Sid Chau (Cambridge)
  • Srivatsan Varadarajan (Honeywell)
  • Kang-won Lee (IBM US)
  • Jon Crowcroft (Cambridge)
  • Mario Gerla (UCLA)
Feb-2009 international
doc-1137 external conference Toward Identifying Process Models in Ad Hoc and Distributed Teams
  • Joseph Giampapa (CMU)
  • Katia Sycara (CMU)
  • Gita Sukthankar
Feb-2009 Proceedings of the 1st International Working Conference on Human Factors and Computational Models in Negotiation (pp. 55-62). ACM collaborative
doc-1170 external conference Utility-Based Joint Sensor Selection and Congestion Control for Task-Oriented WSNs
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Sharanya Eswaran (PSU)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
  • Archan Misra (IBM US)
  • Alun Preece (Cardiff)
Feb-2009 Signals, Systems and Computers, 2008 42nd Asilomar Conference on (pp. 1165-1169). IEEE international
doc-1171 journal FairCast: Fair Multi-Media Streaming in Ad Hoc Networks through Local Congestion Control
  • Gustavo Marfia (UCLA)
  • Paulo Lutterotti
  • Stephan Eidenbenz
  • Giovanni Pau (UCLA)
  • Mario Gerla (UCLA)
Feb-2009 MSWiM 2008, Vancouver, Oct., 2008 collaborative
doc-1195a journal On Low Dimensional Random Projections and Similarity Search
  • Yu-En Lu (Cambridge)
  • Pietro Lio (Cambridge)
  • Steven Hand (Cambridge)
Feb-2009 Proceedings of ACM Seventeenth Conference on Information and Knowledge Management, Napa Valley, CA, USA, 2008. single institute
doc-1365 journal Understanding the Quality of Monitoring for Network Management
  • Dinesh Verma (IBM US)
  • Bong Jun Ko (IBM US)
  • Petros Zerfos (IBM US)
  • Kang-won Lee (IBM US)
  • Ting He (IBM US)
  • Matthew Duggan (IBM UK)
  • Kristian Stewart (IBM UK)
  • Ananthram Swami (ARL)
  • Nikoletta Sofra (Imperial)
Feb-2009 the Computer Journal of Oxford University. April 2009 international with government
doc-1375 journal Efficient Peer-to-peer File Sharing using Network Coding in MANET
  • Uichin Lee (UCLA)
  • Joon-Sang Park
  • Seung-Hoon Lee (UCLA)
  • Won Ro
  • Giovanni Pau (UCLA)
  • Mario Gerla (UCLA)
Feb-2009 Journal of Communications and Networks (JCN), Special Issue on Network Coding, Volume 10, Issue 4, pp. 422-429, Dec. 2008. collaborative
doc-1441 tech report Evaluation of the Collaborative Planning Model
  • Michael Dorneich
  • David Mott (IBM UK)
  • Jitu Patel (DSTL)
  • Ed Gentle (DSTL)
  • Mike Strub (ARL)
  • Jun Yuan
  • Ali Bahrami
Feb-2009 international
doc-1443a tech report Multi-Sensor Centralized Tracking System
  • Vibhor Bageshwar (Honeywell)
Feb-2009 single institute
doc-x0090 external conference A framework for culturally adaptive policy management in ad hoc collaborative contexts
Variants: doc-1463a
  • John Karat (IBM US)
  • Winston Sieck
  • Timothy Norman (Aberdeen)
  • Clare-Marie Karat (IBM US)
  • Carolyn Brodie (IBM US)
  • Louise Rasmussen
  • Katia Sycara (CMU)
Feb-2009 Proceedings of the 2009 international workshop on Intercultural collaboration (pp. 257-260). ACM international
doc-x0122 external conference Cultural variations in collaborative decision making: driven by beliefs or social norms?
  • Winston Sieck
  • Shane Mueller
Feb-2009 Proceedings of the 2009 international workshop on Intercultural collaboration (pp. 111-118). ACM single institute
doc-x0187 external conference Toward quality of information aware rate control for sensor networks
  • Zainul Charbiwala (UCLA)
  • Sadaf Zahedi (UCLA)
  • Younghun Kim (UCLA)
  • Young Cho
  • Mani Srivastava (UCLA)
Feb-2009 Fourth International Workshop on Feedback Control Implemenation and Design in Computing Systems and Networks collaborative
doc-1125 external conference Robust MANET Routing using Adaptive Path Redundancy and Coding
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Jan-2009 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 single institute
doc-1126a external conference On the Mapping between Logical and Physical Topologies
  • Yun Hou (Imperial)
  • Murtaza Zafer (IBM US)
  • Kang-won Lee (IBM US)
  • Dinesh Verma (IBM US)
  • Kin Leung (Imperial)
Jan-2009 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 international
doc-1127a external conference Empirical Evaluation of Hybrid Opportunistic Networks
  • Pan Hui
  • Anders Lindgren (Cambridge)
  • Jon Crowcroft (Cambridge)
Jan-2009 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 collaborative
doc-1128 external conference Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks
  • Archan Misra (IBM US)
  • Sharanya Eswaran (PSU)
  • Thomas La Porta (PSU)
Jan-2009 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 collaborative
doc-1417a tech report Review of relational algebra for dynamic distributed federated databases
Variants: doc-1417b
  • Paul Stone (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Graham Bent (IBM UK)
2009 ITACS international
doc-1748b external conference Opportunism versus Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading
  • Anand Seetharam (UMass)
  • Sid Chau (Cambridge)
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Jan-2009 IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 international
doc-x0082 book chapter Data streams: An overview and scientific applications
  • Charu Aggarwal (IBM US)
2009 Scientific Data Mining and Knowledge Discovery (pp. 377-397). Springer Berlin Heidelberg. single institute
doc-x0083 book chapter Dialogue games for agent argumentation
  • Peter McBurney
  • Simon Parsons (CUNY)
2009 Argumentation in artificial intelligence (pp. 261-280). Springer US international
doc-x0084 book chapter On Applications of Density Transforms for Uncertain Data Mining
  • Charu Aggarwal (IBM US)
2009 Managing and Mining Uncertain Data (pp. 1-19). Springer US single institute
doc-x0093 external conference A model for integrating dialogue and the execution of joint plans
  • Yuqing Tang (CMU)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
2009 Argumentation in multi-agent systems (pp. 60-78). Springer Berlin Heidelberg international
doc-x0136 external conference Gconnect: A connectivity index for massive disk-resident graphs
  • Charu Aggarwal (IBM US)
  • Yan Xie
  • Philip Yu (IBM US)
2009 Proceedings of the VLDB Endowment, 2(1), 862-873 collaborative
doc-x0154 external conference Multistatic Pulse-Wave Angle-of-arrival-assisted relative interferometric RADAR
  • Jonathan Friedman (UCLA)
  • Thomas Schmid (UCLA)
  • Zainul Charbiwala (UCLA)
  • Mani Srivastava (UCLA)
  • Young Cho
2009 Radar Conference, 2009 IEEE (pp. 1-5). IEEE collaborative
doc-x0159 external conference On Segment-Based Stream Modeling and Its Applications.
  • Charu Aggarwal (IBM US)
Jan-2009 SDM (pp. 721-732) single institute
doc-x0180 external conference Signing a linear subspace: Signature schemes for network coding
  • Dan Boneh (Stanford)
  • David Freeman (Stanford)
  • Jonathan Katz (UMD)
  • Brent Waters
2009 Public Key Cryptography-PKC 2009 (pp. 68-87). Springer Berlin Heidelberg collaborative
doc-x0200 journal A survey of uncertain data algorithms and applications
  • Charu Aggarwal (IBM US)
  • Philip Yu (IBM US)
2009 IEEE Transactions on, 21(5), 609-623 single institute
doc-x0201 journal ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks
  • Heesook Choi (PSU)
  • William Enck (PSU)
  • Jaesheung Shin (PSU)
  • Patrick McDaniel (PSU)
  • Thomas La Porta (PSU)
2009 Wireless Networks, 15(4), 525-539 single institute
doc-x0206 journal Dissemination and harvesting of urban data using vehicular sensing platforms
  • Uichin Lee (UCLA)
  • Eugenio Magistretti
  • Mario Gerla (UCLA)
  • Paolo Bellavista
  • Antonio Corradi
2009 Vehicular Technology, IEEE Transactions on, 58(2), 882-901 collaborative
doc-x0216 journal On classification and segmentation of massive audio data streams
  • Charu Aggarwal (IBM US)
2009 Knowledge and information systems, 20(2), 137-156 single institute
doc-x0225 journal Temperature compensated time synchronization
  • Thomas Schmid (UCLA)
  • Zainul Charbiwala (UCLA)
  • Roy Shea (UCLA)
  • Mani Srivastava (UCLA)
2009 Embedded Systems Letters, IEEE, 1(2), 37-41 single institute
doc-x0232 phd thesis Enhancing privacy in cryptographic protocols
  • Ji Sun Shin (UMD)
2009 single institute
doc-x0237 tech report An MDP model for planning team actions with communication
  • Yuqing Tang (CMU)
  • Simon Parsons (CUNY)
2009 collaborative
doc-x0240 tech report Emergent mobile services
  • Michael Meisel (UCLA)
  • Vasilieos Pappas (IBM US)
  • Petros Zerfos (IBM US)
  • Lixia Zhang (UCLA)
2009 collaborative
doc-x0245 tech report QoI-Aware Operations & Management in Multi-Task-Oriented Wireless Sensor Networks
  • Chi Harold Liu
  • Chatschik Bisdikian (IBM US)
  • Joel Branch (IBM US)
  • Kin Leung (Imperial)
2009 IBM Res. Tech. Rep. RC24840 international
doc-x0487 external conference Development of a controlled natural language interface for semantic mediawiki
  • Paul Smart (Southampton)
  • Jie Bao (RPI)
  • Dave Braines (IBM UK)
  • Nigel Shadbolt (Southampton)
2009 Controlled Natural Language (pp. 206-225). Springer Berlin Heidelberg international
doc-x0542 tech report Exact and Fuzzy Sensor-Task Assignment
Variants: doc-x0241
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Lance Kaplan (ARL)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
2009 Network and Security Research Center, Pennsylvania State University, Tech. Rep. NAS-TR-0106-2009. international
doc-x0739 tech report On the interaction of clocks and power in embedded sensor nodes
  • Thomas Schmid (UCLA)
  • Roy Shea (UCLA)
  • Jonathan Friedman (UCLA)
  • Zainul Charbiwala (UCLA)
  • Mani Srivastava (UCLA)
  • Young Cho
2009 Tech. rep., University of California, Los Angeles, Networked and Embedded Systems Lab. collaborative
doc-x1039 journal A generic framework for automated multi-attribute negotiation
  • Guoming Lai (CMU)
  • Katia Sycara (CMU)
2009 Group Decision and Negotiation, doi10.1007/s10726-008-9119-9, ISSN 0926-2644 (Print), Vol 18, No. 2, pp. 169-187 single institute
doc-1131a external conference A Proposal for Trust Management in Coalition Environments
  • Dakshi Agrawal (IBM US)
  • Howard Chivers (Cranfield)
  • John Clark
  • Charanjit Jutla (IBM US)
  • John McDermid
Dec-2008 Army Science Conference (ASC), 2008 international
doc-1133 external conference Security Policy Automation from Specification to Device Configuration
  • Kirk Schloegel (Honeywell)
  • Thomas Markham (Honeywell)
  • Walt Heimerdinger (Honeywell)
Dec-2008 Army Science Conference (ASC), 2008 single institute
doc-1134a external conference A Metadata Calculus for Securing Information Flows
  • Mudhakar Srivatsa (IBM US)
  • Dakshi Agrawal (IBM US)
  • Shane Balfe (RHUL)
Dec-2008 Army Science Conference (ASC), 2008 international
doc-x0627 external conference Inter-Domain Path Authentication in Tactical MANETs
Variants: doc-1136
  • Steffen Reidt (RHUL)
  • Mudhakar Srivatsa (IBM US)
Dec-2008 Army Science Conference (ASC), 2008 international
doc-x0924 external conference The Base Zone Protection Problem
  • Dinesh Verma (IBM US)
  • Ted Brown (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Andi Toce (CUNY)
  • Lance Kaplan (ARL)
  • Mark Nixon (Southampton)
Dec-2008 Army Science Conference (ASC), 2008 international with government
doc-1072a external conference Using Argumentation Logic for Firewall Configuration Management
  • Arosha Bandara
  • Antonis Kakas
  • Emil Lupu (Imperial)
  • Alessandra Russo (Imperial)
Nov-2008 Integrated Network Management, 2009. IM'09. IFIP/IEEE International Symposium on (pp. 180-187). IEEE collaborative
doc-1110b external conference Expressive Policy Analysis with Enhanced System Dynamicity
Variants: doc-1110a
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
  • Arosha Bandara
Nov-2008 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS (pp. 239-250). ACM international
doc-1135 external conference The True Cost of Accurate Time
  • Thomas Schmid (UCLA)
  • Zainul Charbiwala (UCLA)
  • Jonathan Friedman (UCLA)
  • Mani Srivastava (UCLA)
  • Young Cho
Nov-2008 Workshop on Power Aware Computing and Systems (HotPower 2008), December 2008 collaborative
doc-1138 external conference Angle-of-Arrival Assisted Radio Interferometry (ARI) Target Localization
  • Jonathan Friedman (UCLA)
  • Zainul Charbiwala (UCLA)
  • Thomas Schmid (UCLA)
  • Young Cho
  • Mani Srivastava (UCLA)
Nov-2008 IEEE Military Communications Conference, 2008 collaborative
doc-1139 external conference Detecting Transient Signals with Incomplete Observations
Variants: doc-1484a
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
  • Chatschik Bisdikian (IBM US)
Nov-2008 IEEE Military Communications Conference, 2008 single institute
doc-1141 external conference A New Form of Network Coded Cooperative Transmission for Multiple Access Channels
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Nov-2008 IEEE Military Communications Conference, 2008 international
doc-1143a external conference Blind Estimation of Transmit-Power for Multiple Wireless Sources
  • Ivan Ho (Imperial)
  • Bong Jun Ko (IBM US)
  • Murtaza Zafer (IBM US)
Nov-2008 IEEE Military Communications Conference, 2008 international
doc-1144a external conference Securing Information Flows: A Quantitative Risk Analysis Approach
  • Mudhakar Srivatsa (IBM US)
  • Pankaj Rohatgi (IBM US)
  • Shane Balfe (RHUL)
Nov-2008 IEEE Military Communications Conference, 2008 international
doc-1145a external conference Connectivity Augmentation in Tactical Mobile Ad hoc Networks
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Nov-2008 IEEE Military Communications Conference, 2008 single institute
doc-1146 external conference Tiered Architecture for On-Line Detection, Isolation and Repair of Faults in Wireless Sensor Networks
  • Sadaf Zahedi (UCLA)
  • Marcin Szczodrak (CUNY)
  • Ping Ji (CUNY)
  • Dinkar Mylaraswamy (Honeywell)
  • Mani Srivastava (UCLA)
  • Rob Young (DSTL)
Nov-2008 IEEE Military Communications Conference, 2008 international with government
doc-1147a external conference Assigning Sensors to Competing Missions
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Thomas La Porta (PSU)
Nov-2008 IEEE Global Communications Conference (GlobeCom), 2008 collaborative
doc-1148 external conference Time Dependent Message Spraying for Routing in Intermittently Connected Networks
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2008 IEEE Global Communications Conference (GlobeCom), 2008 single institute
doc-1149 external conference Distributed Target Tracking with Imperfect Binary Sensor Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2008 IEEE Global Communications Conference (GlobeCom), 2008 single institute
doc-1150a external conference Flexible and Secure Communications in an Identity-Based Coalition Environment
  • Kent Boklan (CUNY)
  • Zev Klagsbrun (CUNY)
  • Kenny Paterson (RHUL)
  • Sriramkrishnan Srinivasan (RHUL)
Nov-2008 IEEE Military Communications Conference, 2008 international
doc-1151 external conference Multi-target Tracking and Identification by a Vector of Sensors
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2008 IEEE Military Communications Conference, 2008 single institute
doc-1152a external conference Balancing Cost-Quality Tradeoff in Cooperative Ad Hoc Sensor Networks
  • Eyuphan Bulut (RPI)
  • Jin Zheng (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2008 IEEE Military Communications Conference, 2008 single institute
doc-1153 external conference Reasoning and Resource Allocation for Sensor-Mission Assignment in a Coalition Context
  • Alun Preece (Cardiff)
  • Diego Pizzocaro (Cardiff)
  • Konrad Borowiecki (Cardiff)
  • Geeth de Mel (Aberdeen)
  • Mario Gomez (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Amotz Bar-Noy (CUNY)
  • Matthew Johnson (CUNY)
  • Thomas La Porta (PSU)
  • Hosam Rowaihy (PSU)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
Nov-2008 IEEE Military Communications Conference, 2008 international with government
doc-1154 external conference A Computational Framework for Quality of Information Analysis for Detection-oriented Sensor Networks
Variants: doc-1521
  • Sadaf Zahedi (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
Nov-2008 IEEE Military Communications Conference, 2008 collaborative
doc-1155 external conference "Direction" Assisted Geographic Routing for Mobile Ad Hoc Networks
  • Biao Zhou (UCLA)
  • Yeng-Zhong Lee (UCLA)
  • Mario Gerla (UCLA)
Nov-2008 IEEE Military Communications Conference, 2008 single institute
doc-1156 external conference Collaborative And Context-Aware Planning
  • Ali Bahrami
  • Jun Yuan
  • Chukwuemeka Emele (Aberdeen)
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
  • David Mott (IBM UK)
Nov-2008 IEEE Military Communications Conference, 2008 international
doc-1157 external conference On the performance of random linear network coding in relay networks
  • Ramin Khalili (UMass)
  • Majid Ghaderi
  • Jim Kurose (UMass)
  • Don Towsley (UMass)
Nov-2008 IEEE Military Communications Conference, 2008 collaborative
doc-1160a external conference Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
  • Rosario Gennaro (CUNY)
  • Shai Halevi (IBM US)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Nov-2008 Computer Security-ESORICS 2008 (pp. 49-65). Springer Berlin Heidelberg international
doc-1163a external conference Trust Management For Secure Information Flows
  • Mudhakar Srivatsa (IBM US)
  • Shane Balfe (RHUL)
  • Kenny Paterson (RHUL)
  • Pankaj Rohatgi (IBM US)
Nov-2008 Proceedings of the 15th ACM conference on Computer and communications security (pp. 175-188). ACM international
doc-1166a external conference ProbeCast: Ad Hoc Multicast Admission Control via Probing
  • Soon Young Oh (UCLA)
  • Gustavo Marfia (UCLA)
  • Mario Gerla (UCLA)
Nov-2008 Proceedings of Q2SWiNet 2008, Vancouver, BC single institute
doc-1167a external conference Relaycast: Scalable Multicast Routing in Delay Tolerant Networks
  • Uichin Lee (UCLA)
  • Soon Young Oh (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
Nov-2008 Network Protocols, 2008. ICNP 2008. IEEE International Conference on. IEEE, 2008 collaborative
doc-1189a external conference Enhancing Energy Efficiency for Data Fusion in Sensor Networks with a Detection Mission
  • Leeger Yu (UMD)
  • Anthony Ephremides (UMD)
Nov-2008 11th Int'l Symposium on Wireless Personal Multimedia Communications (WPMC 2008), Saariselk, Lapland, Finland, Sept. 8-11 2008 single institute
doc-1197 external conference Phase Transitions of Opportunistic Communication
  • Pan Hui
  • Anders Lindgren (Cambridge)
Nov-2008 Proceedings of the third ACM workshop on Challenged networks (pp. 73-80). ACM collaborative
doc-1198 external conference Predictability of Human Mobility and Its Impact on Forwarding
  • Pan Hui
  • Jon Crowcroft (Cambridge)
Nov-2008 Communications and Networking in China, 543-547. ChinaCom 2008. Date: 25-27 Aug. 2008 collaborative
doc-1206 external conference GeoDTN+Nav: A Hybrid Geographic and DTN Routing with Navigation Assistance in Urban Vehicular Networks
  • Pau-Chen Cheng (IBM US)
  • Kevin Lee (UCLA)
  • Mario Gerla (UCLA)
  • Jerome Haerri
Nov-2008 MobiQuitous/ISVCS 2008, Trinity College Dublin, Ireland, July. 2008 collaborative
doc-1376 journal Normative Conflict Resolution in Multi-Agent Systems
  • Wamberto Vasconcelos (Aberdeen)
  • Martin Kollingbaum (Aberdeen)
  • Timothy Norman (Aberdeen)
Nov-2008 Autonomous Agents and Multi-Agent Systems, DOI 10.1007/s10458-008-9070-9, ISSN 1387-2532 (Print) 1573-7454 (Online) single institute
doc-1377a external conference Information Quality Aware Sensor Network Services
  • Sadaf Zahedi (UCLA)
  • Edith Ngai
  • Erol Gelenbe (Imperial)
  • Dinkar Mylaraswamy (Honeywell)
  • Mani Srivastava (UCLA)
Nov-2008 Signals, Systems and Computers, 2008 42nd Asilomar Conference on (pp. 1155-1159). IEEE international
doc-1481b external conference Accuracy Analysis of Data Aggregation for Network Monitoring
Variants: doc-1481a
  • Nikoletta Sofra (Imperial)
  • Ting He (IBM US)
  • Petros Zerfos (IBM US)
  • Bong Jun Ko (IBM US)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Nov-2008 IEEE Military Communications Conference, 2008 international
doc-x0020 external conference Analyzing Finite MANETs by Transformations to Equivalent Static Graphs
  • Dinesh Verma (IBM US)
  • Bong Jun Ko (IBM US)
  • Ananthram Swami (ARL)
Nov-2008 IEEE Military Communications Conference, 2008 collaborative with government
doc-x0189 external conference Traffic analysis in anonymous MANETs
  • Ting He (IBM US)
  • Starsky Wong (IBM US)
  • Kang-won Lee (IBM US)
Nov-2008 IEEE Military Communications Conference, 2008 single institute
doc-x0970 external conference Two-tier framework for sensor fault characterization in sensor networks
Variants: doc-1485a
  • Sadaf Zahedi (UCLA)
  • Marcin Szczodrak (CUNY)
  • Ping Ji (CUNY)
  • Dinkar Mylaraswamy (Honeywell)
  • Mani Srivastava (UCLA)
  • Rob Young (DSTL)
Nov-2008 IEEE Military Communications Conference, 2008 international with government
doc-x1011 external conference Using commercial PC games in defence research
  • Helen Bowyer (IBM UK)
  • Peter Waggett (IBM UK)
  • Stephen Poltrock
  • Mark Handel
Nov-2008 Proceedings of the 9th International Animation, Games & SFX Conference international
doc-x0784 external conference ProbeCast: MANET admission control via probing
  • Soon Young Oh (UCLA)
  • Gustavo Marfia (UCLA)
  • Mario Gerla (UCLA)
Oct-2008 Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks (pp. 71-78). ACM. single institute
doc-1136 internal conference Inter-Domain Path Authentication in Tactical MANETs
Variants: doc-x0627
  • Steffen Reidt (RHUL)
  • Mudhakar Srivatsa (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1165 external conference Quality of Information: an Empirical Approach
  • Erol Gelenbe (Imperial)
  • Laurence Hey (Imperial)
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 single institute
doc-1172a external conference Distributed Network Utility Optimization in Wireless Sensor Networks Using Power Control
Variants: doc-1471
  • George Tychogiorgos (Imperial)
  • Kin Leung (Imperial)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Sep-2008 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008 international
doc-1175 external conference A System Architecture for Filtering and Disseminating Data in Sensors Networks
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Fangfei Chen (PSU)
  • Iris Fermin (SEA)
  • Thomas La Porta (PSU)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
Sep-2008 International Society for Optics and Photonics - Europe Security and Defense, 2008 international with government
doc-1176a external conference A knapsack approach to sensor-mission assignment with uncertain demands
  • Diego Pizzocaro (Cardiff)
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
  • Stuart Chalmers (Aberdeen)
  • Alun Preece (Cardiff)
  • Thomas La Porta (PSU)
Sep-2008 International Society for Optics and Photonics - Europe Security and Defense, 2008 international
doc-1177 external conference Addressing Practical Challenges in Utility Optimization of Mobile Wireless Sensor Networks
Variants: doc-1250
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
  • Kin Leung (Imperial)
Sep-2008 International Society for Optics and Photonics - Europe Security and Defense, 2008 international
doc-1178 external conference Quality-Driven Congestion Control for Target Tracking in Wireless Sensor Networks
  • Lei Chen (RPI)
  • Boleslaw Szymanski (RPI)
  • Joel Branch (IBM US)
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 collaborative
doc-1182 external conference Opportunistic Forwarding in Wireless Networks with Duty Cycling
  • Prithwish Basu (BBN)
  • Sid Chau (Cambridge)
Sep-2008 Annual International Conference on Mobile Computing and Networking, 2008 international
doc-1184 external conference Relays, Base Stations, and Meshes : Enhancing Mobile Networks with Infrastructure
  • Nilanjan Banerjee (UMass)
  • Mark Corner (UMass)
  • Don Towsley (UMass)
  • Brian Levine (UMass)
Sep-2008 Annual International Conference on Mobile Computing and Networking, 2008 single institute
doc-1185a external conference Cross-Layer Routing Optimization for Wireless Networks with Cooperative Diversity
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2008 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008 single institute
doc-1186 external conference Adaptive QoS Routing for Significant Events in Wireless Sensor Networks
  • Erol Gelenbe (Imperial)
  • Edith Ngai
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 collaborative
doc-1188a external conference Securing Information Flows: A Metadata Framework
  • Mudhakar Srivatsa (IBM US)
  • Pankaj Rohatgi (IBM US)
  • Shane Balfe (RHUL)
  • Steffen Reidt (RHUL)
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 international
doc-1190a external conference Adaptive Sampling for Transient Signal Detection in the Presence of Missing Samples
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 single institute
doc-1445 internal conference Creation of a cooperative beam formed antenna system within a cluster
  • Emma Jones (SEA)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1446 internal conference Framing the problem of creating ad-hoc distributed antenna arrays for cluster communications
  • Emma Jones (SEA)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1448a internal conference Holistan Revisited: Demonstrating Agent- and Knowledge-Based Capabilities for Future Coalition Military Operations
  • Paul Smart (Southampton)
  • David Mott (IBM UK)
  • Ed Gentle (DSTL)
  • Dave Braines (IBM UK)
  • Winston Sieck
  • Stephen Poltrock
  • Peter Houghton (DSTL)
  • Alun Preece (Cardiff)
  • Mark Nixon (Southampton)
  • Mike Strub (ARL)
  • Dave Roberts (IBM UK)
  • Dinesh Verma (IBM US)
  • Nigel Shadbolt (Southampton)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1449 internal conference Sensor-mission assignment: A scenario-driven walkthrough
  • Alun Preece (Cardiff)
  • Mike Jackson (SEA)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1451 internal conference Frugal Sensor Assignment
Variants: doc-1221
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Stuart Chalmers (Aberdeen)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1453 internal conference Robust Routing for Dynamic MANETS
  • Victor Manfredi (UMass)
  • Robert Hancock (Roke)
  • Jim Kurose (UMass)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1454a internal conference Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1455a internal conference A Framework for Supporting Human Military Planning
  • John Allen (Honeywell)
  • David Mott (IBM UK)
  • Ali Bahrami
  • Jun Yuan
  • Cheryl Giammanco (ARL)
  • Jitu Patel (DSTL)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1456a internal conference Agent Support for Mission Planning Under Policy Constraints
  • Chris Burnett (Aberdeen)
  • Daniele Masato (Aberdeen)
  • Mairi McCallum (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Joseph Giampapa (CMU)
  • Martin Kollingbaum (Aberdeen)
  • Katia Sycara (CMU)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1457a internal conference Collaborative, Context-Aware and Chain of Command Sensitive Planning
  • Ali Bahrami
  • Jun Yuan
  • David Mott (IBM UK)
  • Chukwuemeka Emele (Aberdeen)
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1458 internal conference Unsupervised Multi-Scale Salient Temporal Outlier Detection
  • Mandis Beigi (IBM US)
  • Shih-Fu Chang
  • Dinesh Verma (IBM US)
  • Shahram Ebadollahi (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-1459a internal conference Analysis of Cost-Quality Tradeoff in Cooperative Ad Hoc Sensor Networks
  • Eyuphan Bulut (RPI)
  • Jin Zheng (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1460a internal conference Distributed Target Tracking Using Binary Sensors with Imprecise Range Measurements
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1462a internal conference Models of Network Growth by Combination
  • Abbe Mowshowitz (CUNY)
  • Valia Mitsou (CUNY)
  • Graham Bent (IBM UK)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1463a internal conference A Framework for Culturally Adaptive Policy Management in Ad Hoc Collaborative Contexts
Variants: doc-x0090
  • John Karat (IBM US)
  • Winston Sieck
  • Timothy Norman (Aberdeen)
  • Clare-Marie Karat (IBM US)
  • Carolyn Brodie (IBM US)
  • Louise Rasmussen
  • Katia Sycara (CMU)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1466 internal conference Enabling Accurate Node Control in Randomized Duty Cycling Networks
Variants: doc-1209
  • Kang-won Lee (IBM US)
  • Vasilieos Pappas (IBM US)
  • Asser Tantawi (IBM US)
  • Sid Chau (Cambridge)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1468a internal conference From mission specification to quality of information measures - closing the loop in military sensor networks
  • Dave Thornley (Imperial)
  • Rob Young (DSTL)
  • James Richardson (Honeywell)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1470a internal conference A Multivariate Model for Data Cleansing in Sensor Networks
  • Ping Ji (CUNY)
  • Marcin Szczodrak (CUNY)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1471 internal conference Distributed Network Utility Optimization in Wireless Sensor Networks Using Power Control
Variants: doc-1172a
  • George Tychogiorgos (Imperial)
  • Kin Leung (Imperial)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1472 internal conference Multi-monitor Estimation of Transmit-power under Wireless Fading
  • Murtaza Zafer (IBM US)
  • Bong Jun Ko (IBM US)
  • Ivan Ho (Imperial)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1474a internal conference On the Impact of Time Synchronization on Quality of Information and Network Performance
  • Kartik Ariyur (Honeywell)
  • Thomas Schmid (UCLA)
  • Yunjung Yi (Honeywell)
  • Zainul Charbiwala (UCLA)
  • Mani Srivastava (UCLA)
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-1475 internal conference Adaptive Random Re-Routing in Sensor Networks
  • Erol Gelenbe (Imperial)
  • Edith Ngai
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-1476a internal conference The Use of Rationale in Collaborative Planning
  • David Mott (IBM UK)
  • Cheryl Giammanco (ARL)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1478a internal conference Engineering Abstractions for Modelling Interactions between Self-Managed Cells
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
  • Jorge Lobo (IBM US)
  • Seraphin Calo (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1480 internal conference Rate-optimal decentralized broadcasting: the wireless case
  • Don Towsley (UMass)
  • Andrew Twigg (Cambridge)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1481a internal conference Accuracy Analysis of Data Aggregation for Network Monitoring
Variants: doc-1481b
  • Nikoletta Sofra (Imperial)
  • Ting He (IBM US)
  • Petros Zerfos (IBM US)
  • Bong Jun Ko (IBM US)
  • Kang-won Lee (IBM US)
  • Kin Leung (Imperial)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1483 internal conference Maximizing Utility of Sensor Mission Assignment with Uncertain Demands
Variants: doc-1215
  • Diego Pizzocaro (Cardiff)
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
  • Stuart Chalmers (Aberdeen)
  • Alun Preece (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1484a internal conference Detecting Transient Signals with Incomplete Observations: Performance Analysis
Variants: doc-1139
  • Ting He (IBM US)
  • Murtaza Zafer (IBM US)
  • Chatschik Bisdikian (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1485a internal conference Two-Tier Framework for Sensor Fault Characterization in Sensor Networks
Variants: doc-x0970
  • Sadaf Zahedi (UCLA)
  • Marcin Szczodrak (CUNY)
  • Ping Ji (CUNY)
  • Dinkar Mylaraswamy (Honeywell)
  • Mani Srivastava (UCLA)
  • Rob Young (DSTL)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1489b internal conference Error Performance Bounds for Routing Algorithms in Wireless Cooperative Networks
Variants: doc-x0133
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1491a internal conference Improved Energy Efficiency in Sensor Network based Data Fusion for Hypothesis Testing
  • Leeger Yu (UMD)
  • Anthony Ephremides (UMD)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1492a internal conference Experimental Insights into Quality of Information
  • Erol Gelenbe (Imperial)
  • Laurence Hey (Imperial)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1493 internal conference Network Coding vs. Erasure Coding: Reliable Multicast in Wireless Ad hoc Networks
  • Atsushi Fujimura (UCLA)
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1494a internal conference Simulation Framework for QoI Characterization of Sensor Networks in the Presence of Faults
  • Marcin Szczodrak (CUNY)
  • Sadaf Zahedi (UCLA)
  • Ping Ji (CUNY)
  • Dinkar Mylaraswamy (Honeywell)
  • Mani Srivastava (UCLA)
  • Rob Young (DSTL)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1495a internal conference Mission-Based Joint Adaptation of Data Rates and Transmission Power for Multicast Wireless Sensor Networks
  • Yun Hou (Imperial)
  • Kin Leung (Imperial)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1496a internal conference Neighbor discovery with reception status feedback
  • Ramin Khalili (UMass)
  • Dennis Goeckel (UMass)
  • Emma Jones (SEA)
  • Ananthram Swami (ARL)
  • Don Towsley (UMass)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1497a internal conference On The Data Gathering Capacity of Large Scale Multihop Wireless Networks
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
  • Ananthram Swami (ARL)
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-1499 internal conference Policy Evolution with Grammatical Evolution
Variants: doc-x0085
  • Yow Tzu Lim
  • Pau-Chen Cheng (IBM US)
  • John Clark
  • Pankaj Rohatgi (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1500a internal conference A Dynamic Model of Mission Context
  • Stephen Poltrock
  • Mark Handel
  • Helen Bowyer (IBM UK)
  • Peter Waggett (IBM UK)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1501 internal conference Semantic Web techniques to support interoperability in distributed networked environments
  • Dave Braines (IBM UK)
  • Yannis Kalfoglou (Southampton)
  • Paul Smart (Southampton)
  • Jie Bao (RPI)
  • Nigel Shadbolt (Southampton)
  • Jim Hendler (RPI)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1503a internal conference Antenna Beam Pattern Model for Cooperative Ad-Hoc Networks
  • Kery Hardwick (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
  • Zhiguo Ding (Imperial)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1504a internal conference Probabilistic Inference Measures of the Quality of Information in Military Sensor Networks
  • Duncan Gillies (Imperial)
  • Dave Thornley (Imperial)
  • Chatschik Bisdikian (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1505a internal conference A Framework for Quality of Information Analysis for Detection-oriented Sensor Network Deployments
  • Sadaf Zahedi (UCLA)
  • Mani Srivastava (UCLA)
  • Chatschik Bisdikian (IBM US)
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-1506a internal conference Agent-Based Dialogues to Support Plan Execution by Human Teams
Variants: doc-1246a
  • Yuqing Tang (CMU)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1517 internal conference Location Dependent Heuristics for Sensor Coverage Planning
Variants: doc-1583a
  • Dinesh Verma (IBM US)
  • Chai Wah Wu (IBM US)
  • Ted Brown (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Simon Shamoun (CUNY)
  • Mark Nixon (Southampton)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1522 internal conference Simulating ITA Scenarios using Battlefield 2
  • Helen Bowyer (IBM UK)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1523a internal conference A Grammar Inference Algorithm for Event Recognition in Sensor Networks
  • Sahin Geyik (RPI)
  • Boleslaw Szymanski (RPI)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-1524 internal conference Words Are Mightier Than Swords and Yet Miscommunication Costs Lives!
  • Stephen Poteet
  • Jitu Patel (DSTL)
  • Cheryl Giammanco (ARL)
  • Iya Solodilova-Whiteley (SEA)
  • Ping Xue
  • Anne Kao
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1525a internal conference Analysis of a Recorded Team Coordination Dialogue
  • Simon Parsons (CUNY)
  • Stephen Poltrock
  • Helen Bowyer (IBM UK)
  • Yuqing Tang (CMU)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-1532 internal conference On the design of opportunistic decode-forward cooperative transmission protocol
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-x0021 external conference Data gathering capacity of large scale multihop wireless networks
  • Benyuan Liu (UMass)
  • Don Towsley (UMass)
  • Ananthram Swami (ARL)
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 collaborative with government
doc-x0149 external conference Modeling distributed beamforming in wireless networks
  • Kery Hardwick (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Sep-2008 Communication, Control, and Computing, 2008 46th Annual Allerton Conference on (pp. 475-482). IEEE single institute
doc-x0300 internal conference A Biologically Inspired Architecture for a Self Organizing Computing Network
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
  • Ananthram Swami (ARL)
  • Brian Rivera (ARL)
  • Yu-En Lu (Cambridge)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-x0311 internal conference A dynamic distributed federated database
  • Graham Bent (IBM UK)
  • Patrick Dantressangle (IBM UK)
  • David Vyvyan (IBM UK)
  • Abbe Mowshowitz (CUNY)
  • Valia Mitsou (CUNY)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-x0339 internal conference A semantic routing framework
  • Alan Ford (Roke)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-x0368 internal conference An economic model for securing cross-domain information flows
  • Mudhakar Srivatsa (IBM US)
  • Pankaj Rohatgi (IBM US)
  • Shane Balfe (RHUL)
  • Kenny Paterson (RHUL)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-x0388 internal conference Applying Policy to Inter-domain MANET Routing in Challenging Environments
  • Alan Ford (Roke)
  • Jon Crowcroft (Cambridge)
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-x0552 internal conference Exploiting UAVs capabilities in tactical MANETs
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-x0605 internal conference Impact of coverage on the performance of wireless ad hoc networks
  • Chun Lee (CMU)
  • Vasilieos Pappas (IBM US)
  • Sambit Sahu (IBM US)
  • Srinivasan Seshan (CMU)
Sep-2008 2nd Annual Conference of the International Technology Alliance collaborative
doc-x0626 internal conference Inter-and Intra-Domain Routing Interactions for MANETs
  • Alan Ford (Roke)
  • Starsky Wong (IBM US)
  • Sid Chau (Cambridge)
Sep-2008 2nd Annual Conference of the International Technology Alliance international
doc-x0638 internal conference Key Deactivation Strategies in MANETs-A Survey
  • Shane Balfe (RHUL)
  • Steffen Reidt (RHUL)
Sep-2008 2nd Annual Conference of the International Technology Alliance single institute
doc-x1030 external conference More is more: The benefits of dense sensor deployment
Variants: doc-x1031
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Matthew Johnson (CUNY)
  • Deniz Sarioz (CUNY)
  • Dinesh Verma (IBM US)
  • Chai Wah Wu (IBM US)
Sep-2008 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 collaborative
doc-1164 external conference Scalable Topology Discovery and Link State Detection using Routing Events
  • Mudhakar Srivatsa (IBM US)
  • Bong Jun Ko (IBM US)
  • Alina Beygelzimer (IBM US)
  • Venkateshwara Madduri
Aug-2008 Reliable Distributed Systems, 2008. SRDS'08. IEEE Symposium on (pp. 165-174). IEEE collaborative
doc-1180 external conference An Ontology-Centric Approach to Sensor-Mission Assignment
  • Mario Gomez (Aberdeen)
  • Alun Preece (Cardiff)
  • Matthew Johnson (CUNY)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Christopher Gibson (IBM UK)
  • Amotz Bar-Noy (CUNY)
  • Konrad Borowiecki (Cardiff)
  • Thomas La Porta (PSU)
  • Diego Pizzocaro (Cardiff)
  • Hosam Rowaihy (PSU)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
Aug-2008 Knowledge Engineering: Practice and Patterns (pp. 347-363). Springer Berlin Heidelberg international with government
doc-1181a external conference ROFL: Routing as the Firewall Layer
  • Hang Zhao
  • Sid Chau (Cambridge)
  • Steve Bellovin
Aug-2008 Proceedings of the 2008 workshop on New security paradigms (pp. 23-31). ACM international
doc-1183 journal Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks
  • Erol Gelenbe (Imperial)
  • Edith Ngai
Aug-2008 Computer Journal, 53(7), 1052-1061 collaborative
doc-1196a external conference Latency of Opportunistic Forwarding in Finite Regular Wireless Networks
  • Prithwish Basu (BBN)
  • Sid Chau (Cambridge)
Aug-2008 Proceedings of the fifth international workshop on Foundations of mobile computing (pp. 55-64). ACM international
doc-1205 external conference Assault and PEPA
  • Dave Thornley (Imperial)
Aug-2008 the 7th Workshop on Process Algebra and Stochastically Timed Activities (PASTA 2008), Edinburgh, UK, July 30-31, 2008 single institute
doc-1372 book chapter Communications for Agent-Based Human Team Support
  • Gita Sukthankar
  • Katia Sycara (CMU)
  • Joseph Giampapa (CMU)
  • Chris Burnett (Aberdeen)
  • Alun Preece (Cardiff)
Aug-2008 Handbook of research on multi-agent dystems: Semantics and dynamics of organizational models (2009): 285 international
doc-1373 book chapter Personal Assistants for Human Organizations
  • Steven Okamoto (CMU)
  • Katia Sycara (CMU)
  • Paul Scerri (CMU)
Aug-2008 book chapter in V. Dignum (ed), Organizations in Multi-Agent Systems, an IGI-Global (http://www.igi-pub.com/) Handbook of Research, Information Science Reference single institute
doc-1378 journal On the Study of Network Coded AF Transmission Protocol for Wireless Multiple Access Channels
Variants: doc-x0033
  • Zhiguo Ding (Imperial)
  • Tharmalingam Ratnarajah
  • Kin Leung (Imperial)
Aug-2008 Wireless Communications, IEEE Transactions on, 7(11), 4568-4574 collaborative
doc-x0025 book chapter Quality of Sensor-originated Information in Coalition Information Networks
  • Chatschik Bisdikian (IBM US)
  • Lance Kaplan (ARL)
  • Mani Srivastava (UCLA)
  • Dave Thornley (Imperial)
  • Dinesh Verma (IBM US)
Aug-2008 Network Science for Military Coalition Operations: Information Exchange and Interaction, D. Verma, Ed. IGI Global (2010) international
doc-x0030 book chapter The Network-Extended Mind
  • Paul Smart (Southampton)
  • Paula Engelbrecht (Southampton)
  • Dave Braines (IBM UK)
  • Mike Strub (ARL)
  • Cheryl Giammanco (ARL)
Aug-2008 Network Science for Military Coalition Operations: Information Exchange and Interaction, D. Verma, Ed. IGI Global (2010) international
doc-x0088 external conference A data-intensive lightweight semantic wrapper approach to aid information integration
  • Dave Braines (IBM UK)
  • Yannis Kalfoglou (Southampton)
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
  • Jie Bao (RPI)
Jul-2008 4th International Workshop on Contexts and Ontologies (C&O 2008), Patraz, Greece, 21 - 22 Jul 2008 international
doc-1173 external conference A Multidimensional Approach to Studying Cultural Differences and Coping Strategies in a Multinational Coalition Environment
  • Annika Larsson (Cranfield)
  • Iya Solodilova-Whiteley (SEA)
  • Anne Kao
  • Stephen Poteet
  • Ping Xue
Jun-2008 International Command and Control Research Technology Symposium (ICCRTS), 2008 international
doc-1174 external conference Social sensemaking in multinational groups: a common ground approach
  • Annika Larsson (Cranfield)
  • Louise Rasmussen
Jun-2008 International Command and Control Research Technology Symposium (ICCRTS), 2008 international
doc-1203a external conference Acoustic Information Fusion for Ground Vehicle Classification
  • Baofeng Guo (Southampton)
  • Mark Nixon (Southampton)
  • Thyagaraju Damarla (ARL)
Jun-2008 11th International Conference on Information FUSION international with government
doc-1212 external conference An Algebra for Integration and Analysis of Ponder2 Policies
  • Hang Zhao
  • Jorge Lobo (IBM US)
  • Steve Bellovin
Jun-2008 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 collaborative
doc-1215 external conference Maximizing Utility of Sensor-Mission Assignment with Uncertain Demands
Variants: doc-1483
  • Diego Pizzocaro (Cardiff)
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
  • Stuart Chalmers (Aberdeen)
  • Alun Preece (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Jun-2008 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2008 international
doc-1216 external conference Content Distribution in VANETs using Network Coding: The Effect of Disk I/O and Processing O/H
Variants: doc-1526
  • Seung-Hoon Lee (UCLA)
  • Uichin Lee (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
Jun-2008 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 collaborative
doc-1217a external conference How to Enable Policy-based Interactions in Dynamic Wireless Networks?
  • Sid Chau (Cambridge)
  • Jon Crowcroft (Cambridge)
  • Kang-won Lee (IBM US)
  • Starsky Wong (IBM US)
Jun-2008 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 international
doc-1218a external conference Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
  • Christopher Gibson (IBM UK)
  • Andy Stanford-Clark (IBM UK)
  • Dinesh Verma (IBM US)
  • Seraphin Calo (IBM US)
Jun-2008 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 international
doc-1220a external conference Broadcasting Info-Pages to Sensors: Efficiency vs. Energy Conservation
Variants: doc-x0420
  • Yosef Alayev (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Jun-2008 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 collaborative
doc-1221 external conference Frugal Sensor Assignment
Variants: doc-1451
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
  • Diego Pizzocaro (Cardiff)
  • Amotz Bar-Noy (CUNY)
  • Stuart Chalmers (Aberdeen)
  • Thomas La Porta (PSU)
  • Alun Preece (Cardiff)
Jun-2008 IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2008 international
doc-1233a external conference The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment
  • Carolyn Brodie (IBM US)
  • David George (IBM US)
  • Clare-Marie Karat (IBM US)
  • John Karat (IBM US)
  • Jorge Lobo (IBM US)
  • Mandis Beigi (IBM US)
  • Xiping Wang (IBM US)
  • Seraphin Calo (IBM US)
  • Dinesh Verma (IBM US)
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
Jun-2008 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 international
doc-1389b external conference Distributed Utility-Based Sensor Rate Adaptation Protocols for Missions with Differentiated Priorities
  • Sharanya Eswaran (PSU)
  • Matthew Johnson (CUNY)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Jun-2008 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 collaborative
doc-x0003 external conference Intelligence, Surveillance, and Reconnaissance fusion for coalition operations
  • Tien Pham (ARL)
  • Greg Cirincione (ARL)
  • Dinesh Verma (IBM US)
  • Gavin Pearson (DSTL)
Jun-2008 11th International Conference on Information FUSION international with government
doc-x0004 external conference Policy-enabled ITA sensor fabric for the validation of experimental algorithms using real and simulated sensors
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
  • Christopher Gibson (IBM UK)
  • Andy Stanford-Clark (IBM UK)
  • Dinesh Verma (IBM US)
  • Seraphin Calo (IBM US)
  • Greg Cirincione (ARL)
  • Tien Pham (ARL)
Jun-2008 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 international with government
doc-x0148 external conference Mobility models for wireless networks: Challenges, Pitfalls, and Successes
  • Don Towsley (UMass)
Jun-2008 Principles of Advanced and Distributed Simulation, 2008. PADS'08. 22nd Workshop on (pp. 3-3). IEEE single institute
doc-x0183 external conference TCP performance in coded wireless mesh networks
  • Yong Huang (UMass)
  • Majid Ghaderi
  • Don Towsley (UMass)
  • Weibo Gong (UMass)
Jun-2008 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 collaborative
doc-1110d external conference Expressive Policy Analysis with Enhanced System Dynamicity
Variants: doc-1110b
  • Robert Craven (Imperial)
  • Jorge Lobo (IBM US)
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Emil Lupu (Imperial)
  • Arosha Bandara
May-2008 ESORICS, October 2008 international
doc-1159 external conference Bio-inspired Multi-Agent Collaboration for Urban Monitoring Applications
  • Uichin Lee (UCLA)
  • Eugenio Magistretti
  • Mario Gerla (UCLA)
  • Paolo Bellavista
  • Pietro Lio (Cambridge)
  • Kang-won Lee (IBM US)
May-2008 Bio-Inspired Computing and Communication (pp. 204-216). Springer Berlin Heidelberg. international
doc-1179 external conference Security And Anonymity Of Identity-Based Encryption With Multiple Trusted Authorities
  • Kenny Paterson (RHUL)
  • Sriramkrishnan Srinivasan (RHUL)
May-2008 Pairing-Based Cryptography-Pairing 2008 (pp. 354-375). Springer Berlin Heidelberg single institute
doc-1192a external conference Command Dialogues
  • Katie Atkinson
  • Rod Girle
  • Peter McBurney
  • Simon Parsons (CUNY)
May-2008 Argumentation in Multi-Agent Systems (ArgMAS), 2008 international
doc-1194 external conference Low-Power High-Accuracy Timing Systems for Efficient Duty Cycling
  • Thomas Schmid (UCLA)
  • Jonathan Friedman (UCLA)
  • Zainul Charbiwala (UCLA)
  • Young Cho
  • Mani Srivastava (UCLA)
May-2008 Proceedings of the 2008 international symposium on Low Power Electronics & Design (pp. 75-80). ACM collaborative
doc-1199a external conference MLS Security Policy Evolution with Genetic Programming
  • Yow Tzu Lim
  • Pau-Chen Cheng (IBM US)
  • Pankaj Rohatgi (IBM US)
  • John Clark
May-2008 Proceedings of the 10th annual conference on Genetic and evolutionary computation (pp. 1571-1578). ACM international
doc-1201 external conference A Role-based Infrastructure for the Management of Dynamic Communities
Variants: doc-1527
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
  • Sye-Loong Keoh (Imperial)
  • Jorge Lobo (IBM US)
  • Seraphin Calo (IBM US)
May-2008 Resilient Networks and Services (pp. 1-14). Springer Berlin Heidelberg international
doc-1202 external conference A Middleware Framework for Market-Based Actuator Coordination in Sensor and Actuator Networks
  • Joel Branch (IBM US)
  • Boleslaw Szymanski (RPI)
  • Lei Chen (RPI)
May-2008 Proceedings of the 5th international conference on Pervasive services (pp. 101-110). ACM collaborative
doc-1211a external conference Policy Evolution using Genetic Programming: A comparison of three approaches
  • Yow Tzu Lim
  • Pau-Chen Cheng (IBM US)
  • John Clark
  • Pankaj Rohatgi (IBM US)
May-2008 Evolutionary Computation, 2008. CEC 2008.(IEEE World Congress on Computational Intelligence). IEEE Congress on (pp. 1792-1800). IEEE international
doc-1213a external conference Hypothesis Pruning and Ranking for Large Plan Recognition Problems
  • Gita Sukthankar
  • Katia Sycara (CMU)
May-2008 Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (AAAI-08) Vol. 8, pp. 998-1003, June 2008 collaborative
doc-1219a journal Utility-Based Adaptation in Mission-oriented Wireless Sensor Networks
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
May-2008 ACM Transactions on Sensor Networks (TOSN), 8(2), 17 collaborative
doc-1222 external conference Adaptive Military Behaviour in a Collaborative Simulation
  • Daniele Masato (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Stephen Poltrock
  • Helen Bowyer (IBM UK)
  • Peter Waggett (IBM UK)
May-2008 Proceedings of the 2008 Summer Computer Simulation Conference (p. 34). Society for Modeling & Simulation International international
doc-1224a external conference Connectivity in Cooperative Wireless Ad Hoc Networks
Variants: doc-1224b
  • Liaoruo Wang (UMass)
  • Benyuan Liu (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Cedric Westphal
May-2008 Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing (pp. 121-130). ACM collaborative
doc-1227 external conference A Cost-Quality Tradeoff in Cooperative Sensor Networking
  • Eyuphan Bulut (RPI)
  • Zijian Wang (RPI)
  • Boleslaw Szymanski (RPI)
May-2008 IEEE International Conference on Communications (ICC), 2008 single institute
doc-1228a external conference Robust and Efficient Plan Recognition for Dynamic Multi-Agent Teams
  • Gita Sukthankar
  • Katia Sycara (CMU)
May-2008 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2008 collaborative
doc-1232 external conference Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing (pp. 381-390). ACM
  • Murtaza Zafer (IBM US)
  • Bong Jun Ko (IBM US)
  • Ivan Ho (Imperial)
May-2008 ACM Mobihoc 2008 international
doc-1235 external conference A Distributed Cooperative Target Tracking with Binary Sensor Networks
  • Zijian Wang (RPI)
  • Eyuphan Bulut (RPI)
  • Boleslaw Szymanski (RPI)
May-2008 IEEE International Conference on Communications (ICC), 2008 single institute
doc-1239 external conference Cultural Network Analysis: Characterizing Target Audience Cognition
  • Winston Sieck
  • Louise Rasmussen
May-2008 Proceedings of the 2008 Phoenix Challenge Conference on Information Operations, April 2008, Monterey CA. single institute
doc-1246a external conference Automated Requirements-Driven Definition of Norms for the Regulation of Behavior in Multi-Agent Systems
Variants: doc-1506a
  • Martin Kollingbaum (Aberdeen)
  • Ivan Jureta
  • Wamberto Vasconcelos (Aberdeen)
  • Katia Sycara (CMU)
May-2008 Proceedings of the AISB Workshop on Behaviour Regulation in Multi-Agent Systems (AISB'08) (pp. 43-48) international
doc-1247 external conference A Model of Human Teamwork for Agent-Assisted Search Operations
  • Gita Sukthankar
  • Katia Sycara (CMU)
  • Joseph Giampapa (CMU)
  • Chris Burnett (Aberdeen)
May-2008 NATO Research and Technology Organisation: Human Factors and Medicine Panel Symposium (NATO HFM-142/RTO Symposium), NATO RTA / HFM, B.P. 25, 7 Rue Ancelle, F-92201 Neuilly-sur-Seine Cedex, France, April, 2008 international
doc-1384a journal A Circulatory System Approach for Wireless Sensor Networks
Variants: doc-1384c
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
  • Bong Jun Ko (IBM US)
  • Ananthram Swami (ARL)
May-2008 Ad-Hoc Networks, July 2008 collaborative with government
doc-1386 journal Mitigating Performance Degradation in Congested Sensor Networks
  • Raju Kumar (PSU)
  • Riccardo Crepaldi
  • Hosam Rowaihy (PSU)
  • Albert Harris
  • Guohong Cao (PSU)
  • Michele Zorzi
  • Thomas La Porta (PSU)
May-2008 IEEE Transactions on Mobile Computing, 7(6):682-697, 2008 collaborative
doc-1388 external conference Biologically Inspired Self Selective Routing with Preferred Path Selection
  • Boleslaw Szymanski (RPI)
  • Christopher Morrell (RPI)
  • Sahin Geyik (RPI)
  • Thomas Babbitt (RPI)
May-2008 Bio-Inspired Computing and Communication (pp. 229-240). Springer Berlin Heidelberg single institute
doc-1390 journal Self-Selecting Reliable Paths for Wireless Sensor Network Routing
  • Thomas Babbitt (RPI)
  • Christopher Morrell (RPI)
  • Boleslaw Szymanski (RPI)
  • Joel Branch (IBM US)
May-2008 Computer Communication Journal, April 2008 collaborative
doc-1391a journal Gait Feature Subset Selection by Mutual Information
Variants: doc-1282
  • Baofeng Guo (Southampton)
  • Mark Nixon (Southampton)
May-2008 IEEE Transactions on Systems, Man, and Cybernetics April 2008 single institute
doc-1521 tech report A Computational Framework for Quality of Information Analysis for Detection-Oriented Sensor Network Deployments
Variants: doc-1154
  • Chatschik Bisdikian (IBM US)
May-2008 invited talk at UoMd, College Park, MD, USA, Feb. 12, 2008 single institute
doc-x0099 external conference A sensor placement algorithm for redundant covering based on riesz energy minimization
  • Chai Wah Wu (IBM US)
  • Dinesh Verma (IBM US)
May-2008 ISCAS 2008. IEEE International Symposium on (pp. 2074-2077). IEEE single institute
doc-1243a external conference Threshold RSA for Dynamic and Ad-Hoc Groups
  • Rosario Gennaro (CUNY)
  • Shai Halevi (IBM US)
  • Hugo Krawczyk (IBM US)
  • Tal Rabin (IBM US)
Apr-2008 IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008 collaborative
doc-1244 external conference On Data Centric Trust Establishment in Ephemeral Ad-Hoc Networks
  • Maxim Raya
  • Panagiotis Papadimitratos
  • Virgil Gligor (CMU)
  • Jean-Pierre Hubaux
Apr-2008 IEEE International Conference on Computer Communications (InfoCom), 2008 collaborative
doc-x0132 external conference Enhancing Energy Efficiency for Routing in Sensor Networks with a Detection Mission
  • Leeger Yu (UMD)
  • Anthony Ephremides (UMD)
Apr-2008 IPSN 2008 (International Conference on Information Processing in Sensor Networks), April 22-24, 2008 single institute
doc-x0632 tech report IT security as risk management: A research perspective
  • Pau-Chen Cheng (IBM US)
  • Pankaj Rohatgi (IBM US)
Apr-2008 IBM Research Report RC24529 (April 2008) single institute
doc-x0779 external conference Predicate encryption supporting disjunctions, polynomial equations, and inner products
Variants: doc-x2004
  • Jonathan Katz (UMD)
  • Amit Sahai (UCLA)
  • Brent Waters
Apr-2008 IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008 collaborative
doc-x0826 external conference Reliability gain of network coding in lossy wireless networks
  • Majid Ghaderi
  • Don Towsley (UMass)
  • Jim Kurose (UMass)
Apr-2008 IEEE International Conference on Computer Communications (InfoCom), 2008 collaborative
doc-1249 external conference Cooperative Transmit-Power Estimation in MANETs
  • Ivan Ho (Imperial)
  • Bong Jun Ko (IBM US)
  • Murtaza Zafer (IBM US)
  • Chatschik Bisdikian (IBM US)
  • Kin Leung (Imperial)
Mar-2008 IEEE Wireless Communications and Networking Conference (WCNC), 2008 international
doc-1250 external conference Addressing Practical Challenges in Utility Optimization of Mobile Wireless Sensor Networks
Variants: doc-1177
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
  • Kin Leung (Imperial)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 international
doc-1251a external conference Matching Sensors to Missions using a Knowledge-Based Approach
  • Alun Preece (Cardiff)
  • Mario Gomez (Aberdeen)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Derek Sleeman (Aberdeen)
  • Stuart Colley (DSTL)
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
  • Thomas La Porta (PSU)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 international with government
doc-1252 external conference On the Resiliency of Wireless Sensor Networks with Circulation Graphs
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
  • Ananthram Swami (ARL)
  • Bong Jun Ko (IBM US)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 collaborative with government
doc-1253 external conference A Biologically-Inspired MANET Architecture
  • Aaron Kershenbaum (IBM US)
  • Vasilieos Pappas (IBM US)
  • Kang-won Lee (IBM US)
  • Pietro Lio (Cambridge)
  • Brian Sadler (ARL)
  • Dinesh Verma (IBM US)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 international with government
doc-1255 external conference Using stochastic process algebra models to estimate the quality of information in military sensor networks
  • Dave Thornley (Imperial)
  • Chatschik Bisdikian (IBM US)
  • Duncan Gillies (Imperial)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 international
doc-1583a external conference Location Dependent Heuristics for Sensor Coverage Planning
Variants: doc-1517
  • Dinesh Verma (IBM US)
  • Chai Wah Wu (IBM US)
  • Ted Brown (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Simon Shamoun (CUNY)
  • Mark Nixon (Southampton)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 international
doc-x0005 external conference Policy-enabled interconnection of sensor networks
  • Dinesh Verma (IBM US)
  • Greg Cirincione (ARL)
  • Tien Pham (ARL)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 collaborative with government
doc-x0054 external conference Policy enabled interconnection of sensor networks using a message queue infrastructure
  • Dinesh Verma (IBM US)
  • Greg Cirincione (ARL)
  • Tien Pham (ARL)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 collaborative with government
doc-x0055 external conference The challenge of sensor information processing and delivery within network and information science research
  • Gavin Pearson (DSTL)
  • Tien Pham (ARL)
Mar-2008 International Society for Optics and Photonics - Defense, Security and Sensing, 2008 international with government
doc-x0056 external conference US-UK ITA Sensor Information Processing & Delivery
  • Tien Pham (ARL)
  • Gavin Pearson (DSTL)
Mar-2008 SET-130 Symposium on NATO Military Sensing, Orlando, FL, Mar 2008. international with government
doc-x1038 journal Creating physically embodied agents using realistic human motion models
  • Gita Sukthankar
  • Michael Mandel
  • Katia Sycara (CMU)
Mar-2008 Journal on Simulation and Gaming, special Issue on AI techniques, Vol. 39, No. 1, pp. 64-82 collaborative
doc-1193a external conference Inter-Domain Routing for Mobile Ad Hoc Networks
  • Sid Chau (Cambridge)
  • Jon Crowcroft (Cambridge)
  • Kang-won Lee (IBM US)
  • Starsky Wong (IBM US)
Feb-2008 Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture (pp. 61-66). ACM international
doc-1209 external conference Enabling Accurate Node Control in Randomized Duty Cycling Networks
Variants: doc-1466
  • Kang-won Lee (IBM US)
  • Vasilieos Pappas (IBM US)
  • Asser Tantawi (IBM US)
Feb-2008 Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on (pp. 123-132). IEEE single institute
doc-1210 external conference Compact forbidden-set routing on planar graphs
  • Cyril Gavoille
  • Andrew Twigg (Cambridge)
Feb-2008 SPAA 2008 collaborative
doc-1229 external conference On the design of a quality-of-service driven routing protocol for wireless cooperative networks
  • Zhengguo Sheng (Imperial)
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Feb-2008 Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE (pp. 624-628). IEEE single institute
doc-1230 external conference Connectivity check in 3-connected planar graphs with obstacles
  • Bruno Courcelle
  • Cyril Gavoille
  • Mamadou Kante
  • Andrew Twigg (Cambridge)
Feb-2008 International Conference on Topological and Geometric Graph Theory, Paris, 2008 collaborative
doc-1240a external conference NITELIGHT: A Graphical Tool for Semantic Query Construction
  • Alistair Russell (Southampton)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Nigel Shadbolt (Southampton)
Feb-2008 Semantic Web User Interaction Workshop (SWUI 2008) at CHI 2008, Florence, Italy. collaborative
doc-1241b external conference US/UK Mental Models of Planning: The Relationship between Plan Detail and Plan Quality
  • Louise Rasmussen
  • Winston Sieck
  • Paul Smart (Southampton)
Feb-2008 NATO RTO HFM-142 Symposium on Adaptability in Coalition Teamwork, 21-23 April 2008, Copenhagen, Denmark international
doc-1242 external conference Linguistic Sources of Coalition Miscommunication
  • Stephen Poteet
  • Ping Xue
  • Jitu Patel (DSTL)
  • Anne Kao
  • Cheryl Giammanco (ARL)
  • Iya Solodilova-Whiteley (SEA)
Feb-2008 NATO RTO HFM-142 Symposium on Adaptability in Coalition Teamwork, Copenhagen, Denmark international with government
doc-1256 journal A New Privacy Enhanced Matchmaking Protocol
  • Ji Sun Shin (UMD)
  • Virgil Gligor (CMU)
Feb-2008 IEICE Transactions on Communications, 96(8), 2049-2059 collaborative
doc-1394 journal Sequence Alignment for Masquerade Detection
  • Scott Coull
  • Boleslaw Szymanski (RPI)
Feb-2008 Computational Statistics & Data Analysis 52.8 (2008): 4116-4131. collaborative
doc-1398a journal Web 3.0: Chicken Farms on the Semantic Web
  • Jim Hendler (RPI)
Feb-2008 Computer, 41(1), 106-108 (2008) single institute
doc-1530 tech report Framework for Sensors System: Data Fusion and Information Dissemination
  • Iris Fermin (SEA)
  • Thomas La Porta (PSU)
Feb-2008 Technical report international
doc-1531 journal On the combination of cooperative diversity and network coding for wireless uplink transmissions
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Feb-2008 Vehicular Technology, IEEE Transactions on, 60(4), 1590-1601. single institute
doc-x0238 tech report Bootstrapping coalition manets
  • Mudhakar Srivatsa (IBM US)
  • Dakshi Agrawal (IBM US)
  • Shane Balfe (RHUL)
Feb-2008 international
doc-x0085 book chapter Policy evolution with grammatical evolution
Variants: doc-1499
  • Yow Tzu Lim
  • Pau-Chen Cheng (IBM US)
  • John Clark
  • Pankaj Rohatgi (IBM US)
2008 Simulated Evolution and Learning (pp. 71-80). Springer Berlin Heidelberg international
doc-x0102 external conference A visual approach to semantic query design using a web-based graphical query designer
  • Paul Smart (Southampton)
  • Alistair Russell (Southampton)
  • Dave Braines (IBM UK)
  • Yannis Kalfoglou (Southampton)
  • Jie Bao (RPI)
  • Nigel Shadbolt (Southampton)
2008 Knowledge Engineering: Practice and Patterns (pp. 275-291). Springer Berlin Heidelberg international
doc-x0105 external conference An analysis of the origin of ontology mismatches on the semantic web
  • Paul Smart (Southampton)
  • Paula Engelbrecht (Southampton)
2008 Knowledge Engineering: Practice and Patterns (pp. 120-135). Springer Berlin Heidelberg single institute
doc-x0127 external conference Efficient handling of adversary attacks in aggregation applications
  • Gelareh Taban (UMD)
  • Virgil Gligor (CMU)
2008 Computer Security-ESORICS 2008 (pp. 66-81). Springer Berlin Heidelberg collaborative
doc-x0165 external conference POAF: Portable ontology aligned fragments
  • Yannis Kalfoglou (Southampton)
  • Paul Smart (Southampton)
  • Dave Braines (IBM UK)
  • Nigel Shadbolt (Southampton)
2008 International Workshop on Ontologies: Reasoning and Modularity (WORM 2008), Tenerife, Spain collaborative
doc-x0175 external conference Securing grid workflows with trusted computing
  • Po-Wah Yau (RHUL)
  • Allan Tomlinson (RHUL)
  • Shane Balfe (RHUL)
  • Eimear Gallery (RHUL)
2008 Computational Science-ICCS 2008 (pp. 510-519). Springer Berlin Heidelberg single institute
doc-x0194 external conference XCXO: An ultra-low cost ultra-high accuracy clock system for wireless sensor networks in harsh remote outdoor environments
  • Thomas Schmid (UCLA)
  • Jonathan Friedman (UCLA)
  • Zainul Charbiwala (UCLA)
  • Young Cho
  • Mani Srivastava (UCLA)
2008 ISSCC/DAC'08 collaborative
doc-x0203 journal Computing with time: from neural networks to sensor networks
  • Boleslaw Szymanski (RPI)
  • Gilbert Chen (RPI)
2008 The Computer Journal, 51(4), 511-522 single institute
doc-x0205 journal CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
  • Yunjung Yi (Honeywell)
  • Jiejun Kong (UCLA)
  • Mario Gerla (UCLA)
  • Joon-Sang Park
2008 Computer Communications, 31(15), 3672-3682 collaborative
doc-x0209 journal Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization
  • Thomas Schmid (UCLA)
  • Zainul Charbiwala (UCLA)
  • Jonathan Friedman (UCLA)
  • Young Cho
  • Mani Srivastava (UCLA)
2008 ACM SIGMETRICS Performance Evaluation Review, 36(1), 97-108 collaborative
doc-x0222 journal Secure time synchronization in sensor networks
  • Saurabh Ganeriwal (UCLA)
  • Christina Popper
  • Srdjan Capkun
  • Mani Srivastava (UCLA)
2008 ACM Transactions on Information and System Security (TISSEC), 11(4), 23 collaborative
doc-x0226 journal The Extended Mind and Network-Enabled Cognition
  • Paul Smart (Southampton)
  • Paula Engelbrecht (Southampton)
  • Dave Braines (IBM UK)
  • Jim Hendler (RPI)
  • Nigel Shadbolt (Southampton)
2008 The Computer Journal international
doc-x0234 tech report A coordination-theoretic approach to understanding process differences
  • Mark Klein
  • Stephen Poltrock
  • Mark Handel
2008 MIT Sloan Research Paper No. 4637-07 collaborative
doc-x0242 tech report Knowledge representation and query in semantic MediaWiki: a formal study
  • Jie Bao (RPI)
  • Li Ding (RPI)
  • Jim Hendler (RPI)
2008 Tetherless World Constellation (RPI) Technical Report single institute
doc-x0244 tech report Optimal labelling for connectivity checking in planar networks with obstacles
  • Bruno Courcelle
  • Cyril Gavoille
  • Mamadou Kante
  • Andrew Twigg (Cambridge)
2008 collaborative
doc-x0774 book chapter Policy technologies for self-managing systems
  • Dakshi Agrawal (IBM US)
  • Seraphin Calo (IBM US)
  • Kang-won Lee (IBM US)
  • Jorge Lobo (IBM US)
  • Dinesh Verma (IBM US)
2008 Pearson Education. single institute
doc-1207 external conference Near-Optimal Co-ordinated Coding in Wireless Multihop Networks
  • Bjorn Scheuermann
  • Wenjun Hu (Cambridge)
  • Jon Crowcroft (Cambridge)
Dec-2007 ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2007 collaborative
doc-1226a external conference Robust Routing in Networks With Time-Varying Links
  • Victor Manfredi (UMass)
Dec-2007 ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2007 single institute
doc-x0197 journal 4GM@ 4GW: Implementing 4G in the Military Mobile Ad-Hoc Network Environment
  • Marcin Szczodrak (CUNY)
  • Jinwoo Kim (CUNY)
  • Yuncheol Baek
Dec-2007 IJCSNS, 7(4), 70. collaborative
doc-1129a external conference Player Collaboration in Virtual Environments using Hierarchical Task Network Planning
  • Daniele Masato (Aberdeen)
  • Stuart Chalmers (Aberdeen)
  • Alun Preece (Cardiff)
Nov-2007 Applications and Innovations in Intelligent Systems XV. Springer London, 2008. 203-216 collaborative
doc-1237b external conference Network Domain Entrypoint/path Detemination for DDoS Attacks
  • Vrizlynn Thing
  • Morris Sloman (Imperial)
  • Naranker Dulay (Imperial)
Nov-2007 Network Operations and Management Symposium, 2008. NOMS 2008. IEEE (pp. 57-64). IEEE collaborative
doc-1259a external conference Enhanced TCP SYN Attack Detection
  • Vrizlynn Thing
  • Morris Sloman (Imperial)
  • Naranker Dulay (Imperial)
Nov-2007 IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM) collaborative
doc-1262a external conference Covering With Inexactly Placed Sensors
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Matthew Johnson (CUNY)
  • Ou Liu (CUNY)
Nov-2007 !7th Fall Workshop on Computational and Combinatorial Geometry (FWCG 2007), Hawthorne, NY single institute
doc-1263 external conference A Framework for QoI-inspired Analysis for Sensor Network Deployment Planning
Variants: doc-1581
  • Sadaf Zahedi (UCLA)
  • Chatschik Bisdikian (IBM US)
Nov-2007 Proceedings of the 3rd international conference on Wireless internet (p. 28). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) collaborative
doc-1265 tech report Overview of MEMBRANE and ITA Projects on Mesh and Cooperative Networks
  • Kin Leung (Imperial)
Nov-2007 the opening speech at the IET Seminar on Smart Antennas and Cooperative Communications, October 22, 2007, London, UK single institute
doc-1279a external conference Capacity of a Wireless Ad Hoc Network with Infrastructure
Variants: doc-1279c
  • Benyuan Liu (UMass)
  • Patrick Thiran
  • Don Towsley (UMass)
Nov-2007 Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 239-246). ACM collaborative
doc-1282 journal Gait Feature Subset Selection by Mutual Information
Variants: doc-1391a
  • Baofeng Guo (Southampton)
  • Mark Nixon (Southampton)
Nov-2007 Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 39(1), 36-46 single institute
doc-1289 external conference Beta Random Projection
  • Yu-En Lu (Cambridge)
  • Pietro Lio (Cambridge)
  • Steven Hand (Cambridge)
Nov-2007 Bio-Inspired Computing and Communication (pp. 319-331). Springer Berlin Heidelberg single institute
doc-1290 external conference Wavelet-domain statistics of packet switching networks near traffic congestion
  • Pietro Lio (Cambridge)
  • Anna Lawniczak
  • Shengkun Xie
  • Jiaying Xu
Nov-2007 Bio-Inspired Computing and Communication (pp. 268-279). Springer Berlin Heidelberg collaborative
doc-1326a external conference Neighborhood Changing Rate: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios
  • Jerome Haerri
  • Biao Zhou (UCLA)
  • Mario Gerla (UCLA)
  • Fethi Filali
  • Christian Bonnet
Nov-2007 Wireless on Demand Network Systems and Services, 2007. WONS'07. Fourth Annual Conference on (pp. 38-45). IEEE collaborative
doc-1392b journal DARE: A System for Distributed Abductive Reasoning
  • Jiefei Ma (Imperial)
  • Alessandra Russo (Imperial)
  • Krysia Broda (Imperial)
  • Keith Clark (Imperial)
Nov-2007 Autonomous Agents and Multi-Agent Systems, 16(3), 271-297 single institute
doc-1393a book chapter Managing Intelligence Resources Using Semantic Matchmaking and Argumentation
  • Alun Preece (Cardiff)
  • Timothy Norman (Aberdeen)
  • Mario Gomez (Aberdeen)
  • Nir Oren (Aberdeen)
Nov-2007 M Pechoucek, S G Thompson, & H Voos, Defense Industry Applications of Autonomous Agents and Multi-Agent Systems, Birkhauser, pages 33-50, 2008. [ISBN: 978-3-7643-8570-5] collaborative
doc-1395a journal Computing with Time: From Neural Networks to Wireless Networks

Best paper in volume 51 award
  • Gang Chen (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2007 Computer Journal, vol.51, 2008 single institute
doc-1397 journal Naming Games in Two-Dimensional and Small-World-Connected Random Geometric Networks
  • Qiming Lu (RPI)
  • Gyorgy Korniss (RPI)
  • Boleslaw Szymanski (RPI)
Nov-2007 Physical Reviews E, vol. 77, 2008 single institute
doc-1400 journal The International Technology Alliance in Network and Information Sciences
  • Alun Preece (Cardiff)
  • Winston Sieck
Nov-2007 IEEE Intelligent Systems, Vol. 22, No. 5, September/October 2007 international
doc-1526 tech report Content Distribution in VANETs using Network Coding: The Effect of Disk I/O and Processing O/H
Variants: doc-1216
  • Sihyung Lee (IBM US)
  • Uichin Lee (UCLA)
  • Kang-won Lee (IBM US)
  • Mario Gerla (UCLA)
Nov-2007 UCLA CSD Technical Report collaborative
doc-1527 tech report A Role-based Infrastructure for the Management of Dynamic Communities
Variants: doc-1201
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
  • Sye-Loong Keoh (Imperial)
  • Jorge Lobo (IBM US)
  • Seraphin Calo (IBM US)
Nov-2007 international
doc-1533 external conference Inter-domain Routing over Mobile Ad-hoc Networks
  • Sid Chau (Cambridge)
  • Jon Crowcroft (Cambridge)
  • Kang-won Lee (IBM US)
  • Starsky Wong (IBM US)
Nov-2007 HotMobile, 2008 international
doc-1534 tech report Risk Modulating Factors in Risk-Based Access Control for Information in a MANET
  • Pau-Chen Cheng (IBM US)
  • Paul Karger (IBM US)
Nov-2007 IBM Research report single institute
doc-1535 tech report Unifying MANET safety and Security
  • John Clark
  • Howard Chivers (Cranfield)
  • John Murdoch
  • John McDermid
Nov-2007 Report ITA/TR/2007/02 collaborative
doc-1536 tech report Dynamic Trust and Risk Management in MANETs
  • John Clark
  • Howard Chivers (Cranfield)
  • John Murdoch
  • John McDermid
Nov-2007 collaborative
doc-x0131 external conference Enhanced perimeter routing for geographic forwarding protocols in urban vehicular scenarios
  • Kevin Lee (UCLA)
  • Jerome Haerri
  • Uichin Lee (UCLA)
  • Mario Gerla (UCLA)
Nov-2007 IEEE Global Communications Conference (GlobeCom), 2007 collaborative
doc-1260a external conference Secure Dynamic Community Establishment in Coalitions
  • Eskindir Asmare (Imperial)
  • Naranker Dulay (Imperial)
  • Emil Lupu (Imperial)
  • Morris Sloman (Imperial)
  • Seraphin Calo (IBM US)
  • Jorge Lobo (IBM US)
Oct-2007 IEEE Military Communications Conference, 2007 international
doc-1264b external conference Network Coding Performance for Reliable Multicast
  • Majid Ghaderi
  • Don Towsley (UMass)
  • Jim Kurose (UMass)
Oct-2007 IEEE Military Communications Conference, 2007 collaborative
doc-1266a external conference MIMO and TCP: A Case for Cross Layer Design
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
  • Joon-Sang Park
Oct-2007 IEEE Military Communications Conference, 2007 collaborative
doc-1271a external conference Key Refreshing in Identity-based Cryptography and its Application in MANETs
  • Shane Balfe (RHUL)
  • Kent Boklan (CUNY)
  • Zev Klagsbrun (CUNY)
  • Kenny Paterson (RHUL)
Oct-2007 IEEE Military Communications Conference, 2007 international
doc-1273a external conference Efficient Trust Authority Distribution in Tactical MANET Environments
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Oct-2007 IEEE Military Communications Conference, 2007 single institute
doc-1277a external conference Context Aware Information Retrieval for Enhanced Situation Awareness
  • Ali Bahrami
  • Jun Yuan
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
Oct-2007 IEEE Military Communications Conference, 2007 international
doc-1278a external conference MIMO-Cast: A Cross-Layer Ad Hoc Multicast Protocol Using MIMO Radios
  • Soon Young Oh (UCLA)
  • Mario Gerla (UCLA)
  • Pengkai Zhao (UCLA)
  • Babak Daneshrad (UCLA)
  • Guangyu Pei
  • Jae Kim
Oct-2007 IEEE Military Communications Conference, 2007 collaborative
doc-1541d external conference NCR: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios, and Its Analytic Study
Variants: doc-1327
  • Biao Zhou (UCLA)
  • Mario Gerla (UCLA)
  • Jerome Haerri
Oct-2007 IEEE Military Communications Conference, 2007 collaborative
doc-1554b external conference Performance of Network-Coding in Multi-Rate Wireless Environments for Multicast Applications
Variants: doc-1554a
  • Luiz Filipe Vieira (UCLA)
  • Archan Misra (IBM US)
  • Mario Gerla (UCLA)
Oct-2007 IEEE Military Communications Conference, 2007 collaborative
doc-1561a external conference Achievable Rates for Network Coding on the Exchange Channel
Variants: doc-1561b
  • Yonggang Hao (UMass)
  • Dennis Goeckel (UMass)
  • Zhiguo Ding (Imperial)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
Oct-2007 IEEE Military Communications Conference, 2007 international
doc-1566e external conference Approaching semantically-mediated acoustic data fusion
Variants: doc-1566a
  • Baofeng Guo (Southampton)
  • Yi Wang (Southampton)
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
  • Mark Nixon (Southampton)
  • Thyagaraju Damarla (ARL)
Oct-2007 IEEE Military Communications Conference, 2007 international with government
doc-x0128 external conference Empirical study of topology effects on diagnosis in computer networks
  • Natalia Odintsova (IBM US)
  • Irina Rish (IBM US)
Oct-2007 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2007 single institute
doc-x0313 external conference A first cut of the military QoI attribute space and hypothesis structure for abductive reasoning
  • Dave Thornley (Imperial)
  • Mark Harvey (Imperial)
Oct-2007 IEEE Military Communications Conference, 2007 single institute
doc-1280 internal conference Mobile Ad-hoc Inter-domain Network Routing
  • Jon Crowcroft (Cambridge)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1283a external conference Study of a Bus-Based Disruption-Tolerant Network: Mobility Modeling and Impact on Routing
  • Xiaolan Zhang (UMass)
  • Jim Kurose (UMass)
  • Brian Levine (UMass)
  • Don Towsley (UMass)
  • Honggang Zhank
Sep-2007 Annual International Conference on Mobile Computing and Networking, 2007 collaborative
doc-1361c internal conference Cognitive and Self-Healing Routing for Sensor Networks
Variants: doc-1361a
  • Erol Gelenbe (Imperial)
  • Peng Liu (PSU)
  • Boleslaw Szymanski (RPI)
  • Mark Lisee (RPI)
  • Christopher Morrell (RPI)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1384c internal conference A Circulatory System Approach for Wireless Sensor Networks
Variants: doc-1384a
  • Vasilieos Pappas (IBM US)
  • Dinesh Verma (IBM US)
  • Ananthram Swami (ARL)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1529 internal conference Policy Authoring, Verification, and Deployment. Poster presentation and prototype demonstration
  • David George (IBM US)
  • Carolyn Brodie (IBM US)
  • Jorge Lobo (IBM US)
  • Alberto Schaeffer-Filho (Imperial)
  • Xiping Wang (IBM US)
  • Mandis Beigi (IBM US)
  • Clare-Marie Karat (IBM US)
  • John Karat (IBM US)
  • Seraphin Calo (IBM US)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1538 internal conference An Ontology-Based Approach to Sensor-Mission Assignment
  • Alun Preece (Cardiff)
  • Mario Gomez (Aberdeen)
  • Geeth de Mel (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Derek Sleeman (Aberdeen)
  • Stuart Colley (DSTL)
  • Thomas La Porta (PSU)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1539 internal conference Toward a Formal Characterization of Policy Specification and Analysis
  • Arosha Bandara
  • Seraphin Calo (IBM US)
  • Jorge Lobo (IBM US)
  • Emil Lupu (Imperial)
  • Alessandra Russo (Imperial)
  • Morris Sloman (Imperial)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1540 internal conference Conversation Analysis of Coalition Communication in Computational Pragmatics
  • Anne Kao
  • Stephen Poteet
  • Ping Xue
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1541a internal conference NCR: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios, and Its Analytic Study
Variants: doc-1541d
  • Biao Zhou (UCLA)
  • Mario Gerla (UCLA)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1542 internal conference Quality of Information in Sensor Networks
Variants: doc-1890
  • Chatschik Bisdikian (IBM US)
  • Thyagaraju Damarla (ARL)
  • Tien Pham (ARL)
  • Vicraj Thomas (Honeywell)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1543 internal conference Progress on the Collaborative Planning Model
  • David Mott (IBM UK)
  • Jim Hendler (RPI)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1546 internal conference A Distributed Test Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors
  • Flavio Bergamaschi (IBM UK)
  • Dave Conway-Jones (IBM UK)
  • Christopher Gibson (IBM UK)
  • Andy Stanford-Clark (IBM UK)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1547 internal conference Towards a Model of Agent-Assisted Team Search
  • Gita Sukthankar
  • Katia Sycara (CMU)
  • Joseph Giampapa (CMU)
  • Chris Burnett (Aberdeen)
  • Alun Preece (Cardiff)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1548 internal conference Policy Algebras for Hybrid Firewalls
Variants: doc-1587
  • Hang Zhao
  • Steve Bellovin
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1549 internal conference Sensor-Mission Matching: Centralized and Distributed Approaches
  • Hosam Rowaihy (PSU)
  • Matthew Johnson (CUNY)
  • Ted Brown (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1550 internal conference Threat Modelling for Mobile Ad Hoc and Sensor Networks
  • John Clark
  • John Murdoch
  • John McDermid
  • Sevil Sen
  • Howard Chivers (Cranfield)
  • Olwen Worthington (DSTL)
  • Pankaj Rohatgi (IBM US)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1551 internal conference The Case for an Agile SOA
  • John Ibbotson (IBM UK)
  • Syd Chapman (IBM UK)
  • Boleslaw Szymanski (RPI)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1554a internal conference Performance of Network-Coding in Multi-Rate Wireless Environments for Multicast Applications
Variants: doc-1554b
  • Luiz Filipe Vieira (UCLA)
  • Archan Misra (IBM US)
  • Mario Gerla (UCLA)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1555 internal conference Reliability Gain of Network Coding
  • Majid Ghaderi
  • Don Towsley (UMass)
  • Jim Kurose (UMass)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1558 internal conference A Coordination-Theoretic Model of the Military Decision-Making Process
  • Stephen Poltrock
  • Mark Klein
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1559b internal conference Full Coverage of a Region Allowing Inexact Placement of Sensors
Variants: doc-1559a
  • Ted Brown (CUNY)
  • Deniz Sarioz (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
  • Dinesh Verma (IBM US)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1560 internal conference Cultural Network Analysis
  • Winston Sieck
  • Louise Rasmussen
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1561b internal conference Achievable Rates of Physical Layer Network Coding Schemes on the Exchange Channel
Variants: doc-1561a
  • Yonggang Hao (UMass)
  • Dennis Goeckel (UMass)
  • Zhiguo Ding (Imperial)
  • Don Towsley (UMass)
  • Kin Leung (Imperial)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1562a internal conference On the study of cross-layer optimization for wireless cooperative networks
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1562b internal conference On the Cross-layer optimization for wireless cooperative networks
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1563a internal conference On the Capacity of Network Coding with Diversity
Variants: doc-1563b
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1563b internal conference On the Capacity of Network Coding with Diversity
Variants: doc-1563a
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1564 internal conference Semantic Technologies and Enhanced Situation Awareness
  • Paul Smart (Southampton)
  • Ali Bahrami
  • Dave Braines (IBM UK)
  • Duncan McRae-Spencer (Southampton)
  • Jun Yuan
  • Nigel Shadbolt (Southampton)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1565 internal conference Formal Properties of Distributed Database Networks
  • Abbe Mowshowitz (CUNY)
  • Graham Bent (IBM UK)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1566a internal conference Approaching Semantically-Mediated Acoustic Data Fusion
Variants: doc-1566e
  • Baofeng Guo (Southampton)
  • Yi Wang (Southampton)
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
  • Mark Nixon (Southampton)
  • Thyagaraju Damarla (ARL)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1567 internal conference Using Stochastic Process Algebras to Measure Quality of Information
  • Duncan Gillies (Imperial)
  • Chatschik Bisdikian (IBM US)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1568 internal conference Inspect: A General Framework for On-Line Detection and Diagnosis of Sensor Faults
  • Daniela Tulone (UCLA)
  • Mani Srivastava (UCLA)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1570 internal conference Managing Collaboration in Hybrid-Agent Teams
  • Abbe Mowshowitz (CUNY)
  • John Allen (Honeywell)
  • Timothy Norman (Aberdeen)
  • Simon Parsons (CUNY)
  • Alun Preece (Cardiff)
Sep-2007 1st Annual Conference of the International Technology Alliance international
doc-1576 internal conference An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Sep-2007 1st Annual Conference of the International Technology Alliance single institute
doc-1581 internal conference A framework for QoI-inspired analysis for sensor network deployment planning
Variants: doc-1263
  • Sadaf Zahedi (UCLA)
  • Chatschik Bisdikian (IBM US)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1584 internal conference Identity Crisis: On the Problem of Namespace Design for ID-PKC and MANETs
Variants: doc-x0212
  • Shane Balfe (RHUL)
  • Kenny Paterson (RHUL)
  • Andrew McDonald (Roke)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-x0150 external conference Modeling of a bus-based disruption tolerant network trace
  • Xiaolan Zhang (UMass)
  • Jim Kurose (UMass)
  • Brian Levine (UMass)
  • Don Towsley (UMass)
  • Honggang Zhank
Sep-2007 ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007 collaborative
doc-x0174 external conference Secure incentives for commercial ad dissemination in vehicular networks
Variants: doc-x0221
  • Suk-Bok Lee (UCLA)
  • Gabriel Pan (UCLA)
  • Joon-Sang Park
  • Mario Gerla (UCLA)
  • Songwu Lu (UCLA)
Sep-2007 Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 150-159). ACM collaborative
doc-x0178 external conference SET: Detecting node clones in sensor networks
  • Heesook Choi (PSU)
  • Sencun Zhu (PSU)
  • Thomas La Porta (PSU)
Sep-2007 Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on (pp. 341-350). IEEE single institute
doc-x0502 internal conference Distributed utility optimization in mission-oriented wireless sensor networks
  • Sharanya Eswaran (PSU)
  • Archan Misra (IBM US)
  • Thomas La Porta (PSU)
Sep-2007 1st Annual Conference of the International Technology Alliance collaborative
doc-1257 external conference Sensor Assignment In Virtual Environments Using Constraint Programming
  • Diego Pizzocaro (Cardiff)
  • Stuart Chalmers (Aberdeen)
  • Alun Preece (Cardiff)
Aug-2007 Applications and Innovations in Intelligent Systems XV (pp. 333-338). Springer London collaborative
doc-1269a external conference Efficient Plan Recognition for Dynamic Multi-agent Teams
  • Gita Sukthankar
  • Katia Sycara (CMU)
Aug-2007 Grace Hopper Women in Computer Science Conference (pp. 204-208) collaborative
doc-1274a external conference Managing Conflict Resolution in Norm-Regulated Environments
  • Martin Kollingbaum (Aberdeen)
  • Wamberto Vasconcelos (Aberdeen)
  • Andres Garcia-Camino
  • Timothy Norman (Aberdeen)
Aug-2007 Engineering Societies in the Agents World VIII (pp. 55-71). Springer Berlin Heidelberg collaborative
doc-1288 external conference SHR: Self-Healing Routing for Wireless ad hoc Sensor Networks
  • Joel Branch (IBM US)
  • Mark Lisee (RPI)
  • Boleslaw Szymanski (RPI)
Aug-2007 Proc. Intern. Symp. Performance Evaluation of Computer and Telecommunication Systems SPECTS (Vol. 7, pp. 5-14) collaborative
doc-1295a external conference First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed
  • Kevin Lee (UCLA)
  • Sihyung Lee (IBM US)
  • Ryan Cheung (UCLA)
  • Uichin Lee (UCLA)
  • Mario Gerla (UCLA)
Aug-2007 2007 Mobile Networking for Vehicular Environments (pp. 109-114). IEEE collaborative
doc-1296a external conference Evaluating Vehicle Network Strategies for Downtown Portland: Opportunistic Infrastructure and the Importance of Realistic Mobility Models
  • Gustavo Marfia (UCLA)
  • Giovanni Pau (UCLA)
  • Enzo de Sena
  • Eugenio Giordano
  • Mario Gerla (UCLA)
Aug-2007 Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking (pp. 47-51). ACM collaborative
doc-1298a external conference Efficient Distribution of Trust Authority Functions in Tactical Networks
  • Steffen Reidt (RHUL)
  • Stephen Wolthusen (RHUL)
Aug-2007 Information Assurance and Security Workshop, 2007. IAW'07. IEEE SMC (pp. 84-91). IEEE single institute
doc-1327 external conference NCR: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios, and its Analytic Study
Variants: doc-1541d
  • Jerome Haerri
  • Biao Zhou (UCLA)
  • Mario Gerla (UCLA)
  • Fethi Filali
  • Christian Bonnet
Aug-2007 IEEE Wireless On Line Networked Systems (WONS), Innsbruck, Austria, January 2007 collaborative
doc-1361a journal Cognitive and Self-Healing Routing for Sensor Networks
Variants: doc-1361c
  • Erol Gelenbe (Imperial)
  • Peng Liu (PSU)
  • Boleslaw Szymanski (RPI)
  • Christopher Morrell (RPI)
Aug-2007 Computational Management Science, DOI: 10.1007/s10287-009-0102-y international
doc-1381a journal Distributed beamforming and power allocation for cooperative networks
  • Zhiguo Ding (Imperial)
  • Woon Hau Chin
  • Kin Leung (Imperial)
Aug-2007 Wireless Communications, IEEE Transactions on, 7(5), 1817-1822 collaborative
doc-1382a journal Bio-inspired Multi-Agent Data Harvesting in a Proactive Urban Monitoring Environment
  • Uichin Lee (UCLA)
  • Eugenio Magistretti
  • Mario Gerla (UCLA)
  • Paolo Bellavista
  • Pietro Lio (Cambridge)
  • Kang-won Lee (IBM US)
Aug-2007 Special Issue on "Bio-Inspired Computing and Communication in Wireless Ad Hoc and Sensor Networks" Elsevier Ad Hoc Networks Journal international
doc-1401 journal A diffusion model for packet travel time in a random multi-hop medium
  • Erol Gelenbe (Imperial)
Aug-2007 ACM Transactions on Sensor Networks, 2(3), June 2007 single institute
doc-x0191 external conference Universally-composable two-party computation in two rounds
  • Omer Horvitz (UMD)
  • Jonathan Katz (UMD)
Aug-2007 IACR Annual International Cryptology Conference (CRYPTO), 2007 single institute
doc-x0192 external conference Using Sensors Sensability Toward Sensor Localization and K-Coverage Problems
  • Zhanyang Zhang (CUNY)
Aug-2007 Proceedings of the Sixth IASTED International Conference on Communication Systems and Networks (pp. 210-217). ACTA Press single institute
doc-1292 external conference Privacy Preserving Communication in MANETs
  • Haksoo Choi (UCLA)
  • Patrick McDaniel (PSU)
  • Thomas La Porta (PSU)
Jun-2007 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2007 collaborative
doc-x0023 journal A new paradigm in International Collaboration: The US-UK International Technology Alliance in Network and Information Sciences
  • Thomas Killion
  • Phil Sutton
  • Michael Frame
  • Pearl Gendason (ARL)
Jun-2007 RUSI Defence Systems international with government
doc-1299 external conference Evidential Reasoning in Bipolar Argumentation Frameworks
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Alun Preece (Cardiff)
May-2007 Argumentation in Multi-Agent Systems (ArgMAS), 2007 collaborative
doc-1305 external conference Policy Recognition for Multi-Player Tactical Scenarios
  • Gita Sukthankar
  • Katia Sycara (CMU)
May-2007 International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2007 collaborative
doc-x0114 external conference Bounds on the gain of network coding and broadcasting in wireless networks
  • Junning Liu (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
May-2007 IEEE International Conference on Computer Communications (InfoCom), 2007 single institute
doc-x0147 external conference Mobile Agents and the Deus Ex Machina
  • Shane Balfe (RHUL)
  • Eimear Gallery (RHUL)
May-2007 AINA Workshops (2) (pp. 486-492) single institute
doc-1316 external conference Quality of information trade-offs in the detection of transient phenomena
  • Chatschik Bisdikian (IBM US)
Apr-2007 International Society for Optics and Photonics - Defense, Security and Sensing, 2007 single institute
doc-1318 external conference Self-Healing Routing: A Study in Efficiency and Resiliency of Data Delivery in Wireless Sensor Networks
  • Kamil Wasilewski (RPI)
  • Joel Branch (IBM US)
  • Mark Lisee (RPI)
  • Boleslaw Szymanski (RPI)
Apr-2007 International Society for Optics and Photonics - Defense, Security and Sensing, 2007 collaborative
doc-x0101 external conference A survey of sensor selection schemes in wireless sensor networks
  • Hosam Rowaihy (PSU)
  • Sharanya Eswaran (PSU)
  • Matthew Johnson (CUNY)
  • Dinesh Verma (IBM US)
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Thomas La Porta (PSU)
Apr-2007 International Society for Optics and Photonics - Defense, Security and Sensing, 2007 collaborative
doc-x0109 external conference Assessing the transmission of Commander's Intent
  • Ian Whitworth (Cranfield)
  • Geoff Hone (Cranfield)
Apr-2007 Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 413-417). IEEE single institute
doc-x0130 external conference Energy saving in joint acoustic-video target detection and tracking
  • Shuqun Zhang (CUNY)
  • Galathara Kahanda (CUNY)
Apr-2007 International Society for Optics and Photonics - Defense, Security and Sensing, 2007 single institute
doc-x0138 external conference Geometric considerations distribution of sensors in ad-hoc sensor networks
  • Ted Brown (CUNY)
  • Deniz Sarioz (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
  • Dinesh Verma (IBM US)
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
Apr-2007 International Society for Optics and Photonics - Defense, Security and Sensing, 2007 collaborative
doc-x0145 external conference Maximizing the data utility of a data archiving & querying system through joint coding and scheduling
  • Junning Liu (UMass)
  • Zhen Liu (IBM US)
  • Don Towsley (UMass)
  • Cathy Xia (IBM US)
Apr-2007 Proceedings of the 6th international conference on Information processing in sensor networks (pp. 244-253). ACM collaborative
doc-x1033 external conference Holistan: A futuristic scenario for international coalition operations
Variants: doc-x1034
  • Dave Roberts (IBM UK)
  • Gavin Lock
  • Dinesh Verma (IBM US)
Apr-2007 Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 423-427). IEEE international
doc-1317a external conference A Mobile Delay-tolerant Approach to Long-term Energy-efficient Underwater Sensor Networking
  • Eugenio Magistretti
  • Jiejun Kong (UCLA)
  • Uichin Lee (UCLA)
  • Mario Gerla (UCLA)
  • Paolo Bellavista
  • Antonio Corradi
Mar-2007 IEEE Wireless Communications and Networking Conference (WCNC), 2007 collaborative
doc-1334b external conference On Sensor Sampling and Quality of Information: A starting point
Variants: doc-1334a
  • Chatschik Bisdikian (IBM US)
Mar-2007 IEEE International Conference on Pervasive Computing and Communications (PerCom), 2007 single institute
doc-x0121 external conference Cultural Issues in Coalition Planning
  • Winston Sieck
  • Jitu Patel (DSTL)
Mar-2007 Knowledge Systems for Coalition Operations (KSCO), 2007 international with government
doc-x1034 external conference Holistan: A futuristic scenario for international coalition operations
Variants: doc-x1033
  • Dave Roberts (IBM UK)
  • Gavin Lock
  • Dinesh Verma (IBM US)
Mar-2007 Knowledge Systems for Coalition Operations (KSCO), 2007 international
doc-1224b tech report Connectivity in Cooperative Wireless Ad Hoc Networks
Variants: doc-1224a
  • Liaoruo Wang (UMass)
  • Benyuan Liu (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
  • Cedric Westphal
Jan-2007 collaborative
doc-1275b external conference A Survey of Bots Used for Distributed Denial of Service Attacks
  • Vrizlynn Thing
  • Morris Sloman (Imperial)
  • Naranker Dulay (Imperial)
Jan-2007 New Approaches for Security, Privacy and Trust in Complex Environments (pp. 229-240). Springer US collaborative
doc-1276 external conference Towards Supporting Interactions between Self-Managed Cells
  • Alberto Schaeffer-Filho (Imperial)
  • Emil Lupu (Imperial)
  • Naranker Dulay (Imperial)
  • Sye-Loong Keoh (Imperial)
  • Kevin Twidle (Imperial)
  • Morris Sloman (Imperial)
  • Steven Heeps
  • Steven Strowes
  • Joe Sventek
Jan-2007 Self-Adaptive and Self-Organizing Systems, 2007. SASO'07. First International Conference On (pp. 224-236). IEEE collaborative
doc-1279c tech report Capacity of a Wireless Ad Hoc Network with Infrastructure
Variants: doc-1279a
  • Benyuan Liu (UMass)
  • Patrick Thiran
  • Don Towsley (UMass)
Jan-2007 UMass Technical Report 07-14 collaborative
doc-1286 external conference Distributed Cooperative Sensor Networks Using Intelligent Adaptive Antennas
  • Emma Jones (SEA)
Jan-2007 Geoscience and Remote Sensing Symposium, 2007. IGARSS 2007. IEEE International (pp. 2931-2934). IEEE single institute
doc-1300 external conference The semantic battlespace infosphere: a knowledge infrastructure for improved coalition inter-operability
  • Paul Smart (Southampton)
  • Nigel Shadbolt (Southampton)
Jan-2007 Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 390-395). IEEE single institute
doc-1302 external conference Understanding Process Differences: Agreeing Upon a Single Way to Skin a Cat
  • Stephen Poltrock
  • Mark Handel
  • Mark Klein
Jan-2007 Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 446-451). IEEE collaborative
doc-1306a external conference Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics (pp. 1-10). Springer Berlin Heidelberg
  • Claudia Angelini
  • Luisa Cutillo
  • Italia de Feis
  • Richard van der Wath (Cambridge)
  • Pietro Lio (Cambridge)
Jan-2007 EVOBIO 2007 collaborative
doc-1312 invited talk Topology control and data dissemination in wireless networks - Why look for biological inspirations?
  • Kang-won Lee (IBM US)
Jan-2007 single institute
doc-1314 external conference Issues in Designing a Policy Language for Distributed Management of IT Infrastructures
  • Dakshi Agrawal (IBM US)
  • Seraphin Calo (IBM US)
  • Kang-won Lee (IBM US)
  • Jorge Lobo (IBM US)
Jan-2007 Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International Symposium on (pp. 30-39). IEEE single institute
doc-1319 external conference BlueTorrent: Cooperative Content Sharing for Bluetooth Users
  • Sewook Jung (UCLA)
  • Uichin Lee (UCLA)
  • Alexander Chang (UCLA)
  • Dae-Ki Cho (UCLA)
  • Mario Gerla (UCLA)
Jan-2007 Pervasive and Mobile Computing, 3(6), 609-634 single institute
doc-1323 external conference FiG: Automatic Fingerprint Generation
  • Juan Caballero (CMU)
  • Shobha Venkataraman (CMU)
  • Pongsin Pooksman (CMU)
  • Min Guang Kang (CMU)
  • Dawn Song (CMU)
  • Avrim Blum (CMU)
Jan-2007 Symposium on Network and Distributed Systems Security (NDSS), Feb 2007 single institute
doc-1324 external conference Argumentation Based Contract Monitoring in Uncertain Domains
  • Nir Oren (Aberdeen)
  • Timothy Norman (Aberdeen)
  • Alun Preece (Cardiff)
Jan-2007 20th International Joint Conference on Artificial Intelligence, 2007 collaborative
doc-1325 external conference On the Development of an Internetwork-centric Defense for Scanning Worms
Variants: doc-1364a
  • Scott Coull
  • Boleslaw Szymanski (RPI)
Jan-2007 Proc. 40th Hawaii International Conference for System Sciences (HICSS-40), IEEE Computer Society 28(7), 637-647, January 2007 collaborative
doc-1328 external conference Argument Based Contract Enforcement
  • Nir Oren (Aberdeen)
  • Alun Preece (Cardiff)
  • Timothy Norman (Aberdeen)
Jan-2007 Research and Development in Intelligent Systems XXIII (pp. 145-158). Springer London collaborative
doc-1330 journal A Reusable Commitment Management Service using Semantic Web Technology
  • Alun Preece (Cardiff)
  • Stuart Chalmers (Aberdeen)
  • Craig McKenzie (Aberdeen)
Jan-2007 Knowledge-Based Systems, to appear, 2007 collaborative
doc-1332 external conference Secure Hierarchical In-Network Aggregation in Sensor Networks
  • Haowen Chan (CMU)
  • Adrian Perrig (CMU)
  • Dawn Song (CMU)
Jan-2007 Proceedings of the 13th ACM conference on Computer and communications security (pp. 278-287). ACM single institute
doc-1333 external conference Black-box Anomaly Detection: Is it Utopian?
  • Shobha Venkataraman (CMU)
  • Juan Caballero (CMU)
  • Dawn Song (CMU)
  • Avrim Blum (CMU)
  • Jennifer Yates
Jan-2007 Proceedings of HotNets, Nov 2006 collaborative
doc-1334a tech report On Sensor Sampling and Quality of Information: A starting point
Variants: doc-1334b,doc-1334d
  • Chatschik Bisdikian (IBM US)
Jan-2007 IBM Research Report RC24067, Oct. 2006; also submitted to IEEE PerSeNs workshop single institute
doc-1337 external conference A Simple Argumentation Based Contract Enforcement Mechanism
  • Nir Oren (Aberdeen)
  • Alun Preece (Cardiff)
  • Timothy Norman (Aberdeen)
Jan-2007 Cooperative Information Agents X (pp. 347-359). Springer Berlin Heidelberg collaborative
doc-1338a external conference CodeTorrent: Content Distribution using Network Coding in VANET
  • Uichin Lee (UCLA)
  • Joon-Sang Park
  • Joseph Yeh (UCLA)
  • Giovanni Pau (UCLA)
  • Mario Gerla (UCLA)
Jan-2007 Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking (pp. 1-5). ACM collaborative
doc-1339 external conference The Workflow Based Architecture for Mobile Information Access in Occasionally Connected Computing
  • Ali Bahrami
  • Changzhou Wang
  • Jun Yuan
  • Anne Hunt
Jan-2007 2006 IEEE International Conference on Services Computing (SCC 2006), September 18-22, 2006 Chicago, IL single institute
doc-1383 journal E-ODMRP:Enhanced ODMRP with Motion Adaptive Refresh
  • Soon Young Oh (UCLA)
  • Joon-Sang Park
  • Mario Gerla (UCLA)
Jan-2007 Journal of Parallel and Distributed Computing collaborative
doc-1403 journal In-Network Outlier Detection in Wireless Sensor Networks
  • Joel Branch (IBM US)
  • Chris Giannella
  • Boleslaw Szymanski (RPI)
  • Ran Wolff
  • Hillol Kargupta (UMD)
Jan-2007 IEEE Transactions on Data and Knowledge and Engineering collaborative
doc-1404 external conference The influence of risk perception in epidemics: a cellular agent model
  • Luca Sguanci
  • Pietro Lio (Cambridge)
  • Franco Bagnoli
Jan-2007 LNCS ACRI2006 - Cellular Automata for Research and Industry, Perpignan Arxiv preprint q-bio.PE/0607010, 2006 collaborative
doc-1559a tech report Full Coverage of a Region Allowing Inexact Placement of Sensors
Variants: doc-1559b
  • Ted Brown (CUNY)
  • Deniz Sarioz (CUNY)
  • Amotz Bar-Noy (CUNY)
  • Thomas La Porta (PSU)
  • Dinesh Verma (IBM US)
  • Matthew Johnson (CUNY)
  • Hosam Rowaihy (PSU)
Jan-2007 ITA Technical Report collaborative
doc-1578e journal On the Study of Network Coding with Diversity
  • Zhiguo Ding (Imperial)
  • Kin Leung (Imperial)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Jan-2007 IEEE Trans. on Wireless Communications international
doc-1585 tech report Analyzing User Behavior in Instant Messaging
  • Shruti Gandhi
  • Vishal Singh
  • Henning Schulzrinne
Jan-2007 single institute
doc-1587 tech report Policy Algebras for Hybrid Firewalls
Variants: doc-1548
  • Hang Zhao
  • Steve Bellovin
Jan-2007 Technical Report CUCS-017-07, March 2007,http://mice.cs.columbia.edu/getTechreport.php?techreportID=453 single institute
doc-1590 tech report Towards Semantic Matchmaking in Sensor-Mission Assignment: Analysis of the Missions and Means Framework
  • Mario Gomez (Aberdeen)
  • Alun Preece (Cardiff)
  • Geeth de Mel (Aberdeen)
Jan-2007 Technical Report Task 2, Project 8, Technical Area 3 collaborative
doc-x0110 external conference Assigning sensors to missions with demands
  • Amotz Bar-Noy (CUNY)
  • Ted Brown (CUNY)
  • Matthew Johnson (CUNY)
  • Thomas La Porta (PSU)
  • Ou Liu (CUNY)
  • Hosam Rowaihy (PSU)
2007 Algorithmic Aspects of Wireless Sensor Networks (pp. 114-125). Springer Berlin Heidelberg collaborative
doc-x0141 external conference Key establishment in heterogeneous self-organized networks
  • Gelareh Taban (UMD)
  • Rei Safavi-Naini
2007 Lecture Notes in Computer Science (pp. 58-72). Springer Berlin Heidelberg, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings collaborative
doc-x0143 external conference Managing Sensors and Information Sources Using Semantic Matchmaking and Argumentation
  • Alun Preece (Cardiff)
2007 Cooperative Information Agents XI (pp. 1-4). Springer Berlin Heidelberg single institute
doc-x0151 external conference Modeling TCP in a Multi-rate Multi-user CDMA System
  • Majid Ghaderi
  • Ashwin Sridharan (PSU)
  • Hui Zang
  • Don Towsley (UMass)
  • Rene Cruz
2007 NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 403-414). Springer Berlin Heidelberg collaborative
doc-x0193 external conference Utility Sampling for Trust Metrics in PKI
  • Dakshi Agrawal (IBM US)
  • Charanjit Jutla (IBM US)
2007 IACR Cryptology ePrint Archive, 2007, 178 single institute
doc-x0198 journal A cluster based approach toward sensor localization and K-coverage problems
  • Zhanyang Zhang (CUNY)
2007 Ubiquitous Computing and Communication Journal, 2(4), 15-23 single institute
doc-x0227 journal Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods
  • Uichin Lee (UCLA)
  • Jiejun Kong (UCLA)
  • Mario Gerla (UCLA)
  • Joon-Sang Park
  • Eugenio Magistretti
2007 Ad Hoc Networks, 5(6), 943-958 collaborative
doc-x0229 journal Two-Level ZigBee-4G Design for Secure and Efficient Communications in the Resources Constrained Military Environment
  • Marcin Szczodrak (CUNY)
  • Jinwoo Kim (CUNY)
  • Yuncheol Baek
2007 IJCSNS, 7(10), 14 collaborative
doc-x0231 phd thesis Activity recognition for agent teams
Variants: doc-x0344
  • Gita Sukthankar
2007 single institute
doc-x0344 phd thesis Activity recognition for agent team
Variants: doc-x0231
  • Gita Sukthankar
2007 (No. CMU-RI-07-23). CARNEGIE-MELLON UNIV PITTSBURGH PA ROBOTICS INST. single institute
doc-x0672 patent Method and system for optimizing wireless networks through feedback and adaptation
  • Kartik Ariyur (Honeywell)
  • Srivatsan Varadarajan (Honeywell)
  • Yunjung Yi (Honeywell)
2007 U.S. Patent Application No. 11/857,748. single institute
doc-x0685 tech report MIT SLOAN SCHOOL OF MANAGEMENT WORKING PAPER 4637-07
  • Mark Klein
  • Stephen Poltrock
  • Mark Handel
2007 MIT SLOAN SCHOOL OF MANAGEMENT WORKING PAPER 4637-07 collaborative
doc-1334d tech report On Sensor Sampling and Quality of Information: A starting point
Variants: doc-1334b,doc-1334a
  • Chatschik Bisdikian (IBM US)
Nov-2006 single institute
doc-1331 external conference UAV Assisted Disruption Tolerant Routing
  • Triet Le (UCLA)
  • Joon-Sang Park
  • Mario Gerla (UCLA)
Oct-2006 IEEE Military Communications Conference, 2006 collaborative
doc-1335 external conference Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs
  • Guang Yang (UCLA)
  • Ling-Jyh Chen (UCLA)
  • Tony Sun (UCLA)
  • Biao Zhou (UCLA)
  • Mario Gerla (UCLA)
Oct-2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2006 single institute
doc-1336 external conference The Throughput Order of Ad Hoc Networks Employing Network Coding and Broadcasting
  • Junning Liu (UMass)
  • Dennis Goeckel (UMass)
  • Don Towsley (UMass)
Oct-2006 IEEE Military Communications Conference, 2006 single institute
doc-x0243 tech report Literature review of teamwork models
  • Katia Sycara (CMU)
  • Gita Sukthankar
2006 Robotics Institute, Carnegie Mellon University, 31. collaborative