Welcome to the online legacy for the International Technology Alliance in Network and Information Sciences (NIS ITA). Here you will find summary information relating to this highly successful 10-year program along with a full list of publications.
The NIS ITA represented a new way of doing business: forming an international alliance of government, industry and academia to jointly conduct fundamental research. The origins of the concept were in similar national programmes, such as the US Army Collaborative Technology Alliances (CTA) and the MoD’s Defence Technology Centres (DTC). Independent Peer Review identified the NIS ITA as “an outstanding example of true, deep and enduring International Research Collaboration”.
The NIS ITA was initiated with the strategic goal of producing fundamental advances in network and information sciences to enhance distributed, secure and flexible networks for information delivery and decision-making in coalition operations. The focus has been on the hard problems associated with coalition operations. This focus, coupled with the existing research interests and expertise of the two-nation, multi-organization, inter-discipline Alliance has brought a sharp focus to the programme, enabling different skills from academia, industry and government to be used together to great effect. Independent Peer Review identified that the NIS ITA has “significantly advanced the state-of-the-art in network and information science”.
You can read more about the NIS ITA on wikipedia, and access all of the legacy materials here.
The remainder of this page lists all of the publications from the NIS ITA program.
Paper type | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | 2012 | 2013 | 2014 | 2015 | 2016 | total |
journal | 0 | 18 | 18 | 37 | 22 | 21 | 31 | 23 | 23 | 9 | 5 | 207 |
patent | 0 | 1 | 0 | 0 | 2 | 3 | 11 | 16 | 12 | 10 | 0 | 55 |
external conference | 3 | 80 | 129 | 104 | 127 | 67 | 75 | 65 | 69 | 71 | 9 | 799 |
internal conference | 0 | 36 | 60 | 43 | 45 | 37 | 62 | 32 | 41 | 6 | 0 | 362 |
invited talk | 0 | 1 | 0 | 1 | 3 | 0 | 3 | 3 | 4 | 1 | 0 | 16 |
book chapter | 0 | 1 | 6 | 3 | 3 | 1 | 1 | 2 | 0 | 1 | 2 | 20 |
demo | 0 | 0 | 0 | 1 | 0 | 0 | 3 | 2 | 2 | 0 | 0 | 8 |
tech report | 2 | 14 | 7 | 28 | 13 | 10 | 24 | 20 | 29 | 7 | 2 | 156 |
poster | 0 | 0 | 0 | 5 | 0 | 0 | 1 | 2 | 1 | 0 | 0 | 9 |
software | 0 | 0 | 0 | 0 | 0 | 1 | 2 | 0 | 0 | 0 | 1 | 4 |
phd thesis | 0 | 2 | 0 | 1 | 1 | 2 | 2 | 1 | 1 | 1 | 0 | 11 |
workshop | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 | 0 | 3 |
total | 5 | 153 | 220 | 223 | 216 | 143 | 216 | 166 | 183 | 106 | 19 | 1650 |
All of the publications from the NIS ITA program are listed in the table below.
id | type | title | authors | date | venue | collaboration |
doc-x0031 | external conference | Formulating Conceptual Models for Reasoning about a Civil-Military Domain using ITA Controlled English |
|
Sep-2016 | Knowledge Systems for Coalition Operations (KSCO), 2016 | international with government |
doc-3123 | tech report | Island of Zombies, a logical problem to explore conceptualising in CE |
|
May-2016 | single institute | |
doc-3165 | tech report | The ITA Controlled English Report (Prolog version) |
|
May-2016 | single institute | |
doc-1670b | software | Prolog-based ITA Controlled English Reasoning System |
|
Apr-2016 | single institute | |
doc-x0011 | external conference | Robust monitor placement for network tomography in dynamic networks |
|
Apr-2016 | IEEE International Conference on Computer Communications (InfoCom), 2016 | international with government |
doc-x0012 | external conference | Optimization Framework with Reduced Complexity for Sensor Networks with In-Network Processing |
|
Apr-2016 | IEEE Wireless Communications and Networking Conference (WCNC), 2016 | international with government |
doc-x0034 | book chapter | Inferring Network Topologies in MANETs: Application to Service Redeployment |
|
Apr-2016 | Advances in Computer Communications and Networks - from green, mobile, pervasive networking to big data computing. River Publisher, April, 2016. | international |
doc-x1047 | external conference | Next-generation neurosynaptic tactical ISR systems |
|
Apr-2016 | International Society for Optics and Photonics - Defense, Security and Sensing, 2016 | single institute |
doc-x1048 | external conference | From Open Source Communications to Knowledge |
|
Apr-2016 | International Society for Optics and Photonics - Defense, Security and Sensing, 2016 | collaborative |
doc-x1049 | external conference | Agile Development of Ontologies Through Conversation |
|
Apr-2016 | International Society for Optics and Photonics - Defense, Security and Sensing, 2016 | collaborative with government |
doc-x0022 | journal | Aggregating Crowdsourced Quantitative Claims: Additive and Multiplicative Models |
|
Feb-2016 | IEEE Trans. on Knowledge and Data Engineering | international with government |
doc-x0483 | external conference | Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples |
|
Feb-2016 | The Network and Distributed System Security Symposium 2016 | collaborative |
doc-x0057 | external conference | Information Sharing for Collective Sensemaking |
|
2016 | Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, USA. | international |
doc-x0325 | journal | A Markovian Model for Coarse Timescale Channel Variation in Wireless Networks |
|
2016 | IEEE Transactions on Vehicular Technology, Volume:PP, Issue:99 | single institute |
doc-x0457 | external conference | Conversational intelligence analysis |
|
Jan-2016 | Proceedings of the 17th International Conference on Distributed Computing and Networking (p. 42). ACM. | international with government |
doc-x0756 | journal | Parallel and Streaming Truth Discovery in Large-Scale Quantitative Crowdsourcing |
|
Jan-2016 | IEEE Transactions on Parallel and Distributed Systems | international with government |
doc-x1025 | journal | General Graph Data De-anonymization: From Mobility Traces to Social Networks |
|
2016 | ACM Transactions on Information Systems Security (TIS- SEC), 2016 | collaborative |
doc-x1026 | journal | Structural Data De-anonymization: Theory and Practice |
|
2016 | ACM Transactions of Networking (ToN), 2016 | collaborative |
doc-x1055 | book chapter | Emerging Digital Technologies: Implications for Extended Conceptions of Cognition and Knowledge |
|
Jan-2016 | A. J. Carter, A. Clark, J. Kallestrup, O. S. Palermos & D. Pritchard (Eds.), Extended Epistemology, Ofxord University Press, Oxford, UK | single institute |
doc-2645a | external conference | Internet Media Upload Caching for Poorly-Connected Regions |
|
Dec-2015 | Proceedings of the 2015 Annual Symposium on Computing for Development (pp. 41-49). ACM | collaborative |
doc-x0384 | patent | Anonymizing Location Information of a Mobile Device |
|
Dec-2015 | U.S. Patent No. 20,150,350,890 | international |
doc-x0486 | external conference | Design, Implementation, and Evaluation of Energy-Aware Multi-Path TCP |
|
Dec-2015 | ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2015 | international |
doc-x1052 | patent | Efficient two party oblivious transfer using a leveled fully homomorphic encryption |
|
Dec-2015 | GB920150053US1 | single institute |
doc-x1053 | patent | Performing efficient comparison operations on encrypted data |
|
Dec-2015 | GB920150015US1 | international |
doc-x0037 | external conference | Controlled and Uncontrolled English for Ontology Editing |
|
Nov-2015 | Semantic Technology for Intelligence, Defense and Security (STIDS 2015), Fairfax, VA, Nov 2015. | international with government |
doc-x0548 | external conference | Experimental Results on the use of Genetic Algorithms for Scaling Virtualized Network Functions |
|
Nov-2015 | Network Function Virtualization and Software Defined Network (NFV-SDN), 2015 IEEE Conference on | international |
doc-x0722 | patent | Node-level sub-queries in distributed databases |
|
Nov-2015 | U.S. Patent No. 9,183,260. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0007 | external conference | Emulation-Based Study of Dynamic Service Placement in Mobile Micro-Clouds |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | international with government |
doc-x0008 | external conference | Security-aware Service Migration for Tactical Mobile-Micro Clouds |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | international with government |
doc-x0013 | external conference | Multicast vs. Unicast for Loss Tomography on Tree Topologies |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | international with government |
doc-x0080 | external conference | Network Science collaborative experimentation methods and tools to accelerate network science innovation within the ITA and NS-CTA |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | international with government |
doc-x0185 | external conference | Thin layer approach to increase reliability in ad hoc network |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | collaborative |
doc-x0512 | external conference | Dynamic placement of composite software services in hybrid wireless networks |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | international |
doc-x0581 | external conference | Global attestation of location in mobile devices |
|
Oct-2015 | IEEE Military Communications Conference, 2015 | international |
doc-x0624 | external conference | Integridb: Verifiable SQL for outsourced databases |
|
Oct-2015 | Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 1480-1491). ACM | single institute |
doc-x0657 | external conference | Low-Overhead Gaussian-Process Training for Indoor Positioning Systems |
|
Oct-2015 | Proceedings of the 2015 International Conference on Indoor Positioning and Indoor Navigation (IPIN), IEEE Xplore | international |
doc-x0869 | external conference | Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks Variants: doc-2908 |
|
Oct-2015 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015 | collaborative |
doc-x0888 | external conference | Social Signal Processing for Real-Time Situational Understanding: A Vision and Approach |
|
Oct-2015 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015 | international with government |
doc-2849b | internal conference | Conversational Sensemaking Variants: doc-2849a |
|
Sep-2015 | 9th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2910 | external conference | Using a Cognitive Architecture to Control the Behaviour of Virtual Robots |
|
Sep-2015 | EuroAsianPacific Joint Conference on Cognitive Science, Turin, Italy, 25 - 27 Sep 2015. 6pp | international |
doc-2998 | internal conference | Use of Controlled English to Bridge the Gap Between Tactical and Strategic Echelons |
|
Sep-2015 | 9th Annual Fall Meeting of the International Technology Alliance | international |
doc-x0006 | journal | Dynamic Service Migration and Workload Scheduling in Edge-Clouds |
|
Sep-2015 | Elsevier Journal of Performance Evaluation, Vol 91 Issue C, pages 205-228, September 2015 | international with government |
doc-x0367 | internal conference | An Algebra for Vague Expressions |
|
Sep-2015 | 9th Annual Fall Meeting of the International Technology Alliance | international |
doc-x0383 | external conference | AnonyCast: privacy-preserving location distribution for anonymous crowd tracking systems |
|
Sep-2015 | Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (pp. 1119-1130). ACM. | collaborative |
doc-x0386 | internal conference | Applications of Directed Percolation in Wireless Networks |
|
Sep-2015 | 9th Annual Fall Meeting of the International Technology Alliance | single institute |
doc-x0393 | internal conference | Argumentation, CE, MARF: a comparison and integration |
|
Sep-2015 | 9th Annual Fall Meeting of the International Technology Alliance | international |
doc-x0426 | external conference | CAreDroid: Adaptation Framework for Android Context-Aware Applications Best paper and best community paper award |
|
Sep-2015 | Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (pp. 386-399). ACM | collaborative |
doc-x0604 | internal conference | IBN for Negotiating Policy-based Asset Sharing in Collaborative Environments |
|
Sep-2015 | 9th Annual Fall Meeting of the International Technology Alliance | international |
doc-x0014 | external conference | Inferring Network Topologies in MANETs Applied to Service Redeployment |
|
Aug-2015 | International Conference on Computer Communication and Networks (ICCCN), 2015, Las Vegas, Aug 2015 | international with government |
doc-x0544 | external conference | Experiences Deploying a Transparent Split TCP Middlebox and the Implications for NFV |
|
Aug-2015 | Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization (pp. 31-36). ACM. | single institute |
doc-x0766 | external conference | Planning over MDPs through Probabilistic HTNs |
|
Aug-2015 | Proceedings of the AAAI-11 Workshop on Generalized Planning. | collaborative |
doc-x1054 | patent | Comparison and search operations on encrypted |
|
Aug-2015 | GB920150016US1 | international |
doc-2901 | external conference | Representative Agents and the Contract Negotiation Cold Start Problem |
|
Jul-2015 | 24th International Joint Conference on Artificial Intelligence, 2015 | collaborative |
doc-2903 | external conference | Markov Argumentation Random Fields |
|
Jul-2015 | 24th International Joint Conference on Artificial Intelligence, 2015 | international |
doc-2909 | external conference | Building a "living database" for human-machine intelligence analysis |
|
Jul-2015 | 18th International Conference on Information FUSION | collaborative |
doc-x0001 | external conference | Advances in Network Sciences via Collaborative Multi-Disciplinary Research |
|
Jul-2015 | 18th International Conference on Information FUSION | collaborative with government |
doc-x0024 | journal | You Can't Get There From Here: Sensor Scheduling with Refocusing Delays Variants: doc-937 |
|
Jul-2015 | Wireless Networks, vol. 21, no. 8, pp. 1683-1698, Jul 2015 | collaborative with government |
doc-x0026 | external conference | FUSE-BEE: Fusion of Subjective Opinions through Behavior Estimation |
|
Jul-2015 | 18th International Conference on Information FUSION | international with government |
doc-x0812 | external conference | Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework |
|
Jul-2015 | Computer Security Foundations Symposium (CSF), 2015 IEEE 28th (pp. 232-242). IEEE | collaborative |
doc-x0966 | external conference | Trust metric integration in resource constrained networks via data fusion |
|
Jul-2015 | 18th International Conference on Information FUSION | single institute |
doc-2722 | external conference | Trust Management in Delay Tolerant Networks Utilizing Erasure Coding |
|
Jun-2015 | IEEE International Conference on Communications (ICC), 2015 | single institute |
doc-2773 | tech report | Inferring Network Topologies in MANETs Applied to Service Deployment |
|
Jun-2015 | Pennsylvania State University | international |
doc-2841 | external conference | Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs |
|
Jun-2015 | IEEE International Conference on Communications (ICC), 2015 | international with government |
doc-2889 | external conference | Fisher Information-based Experiment Design for Network Tomography Outstanding Student Paper |
|
Jun-2015 | SIGMETRICS Perform. Eval. Rev. 43, 1 (June 2015), 389-402 | international with government |
doc-2915a | external conference | Rateless and Pollution-Attack-Resilient Network Coding |
|
Jun-2015 | Information Theory (ISIT), 2015 IEEE International Symposium on (pp. 2623-2627). IEEE | collaborative |
doc-x0478 | external conference | Delay Tolerant Harvesting of Monitoring Data for MANET-Hosted Service-Based Systems |
|
Jun-2015 | Services Computing (SCC), 2015 IEEE International Conference on (pp. 9-16). IEEE | international |
doc-x0965 | external conference | Trust management in resource constraint networks |
|
Jun-2015 | 10th Annual Symposium on Information Assurance (ASIA'15) (p. 51) | single institute |
doc-x0967 | patent | Trustworthiness of processed data |
|
Jun-2015 | U.S. Patent No. 20,150,156,185 | international |
doc-x0980 | external conference | Understanding user behavior via mobile data analysis |
|
Jun-2015 | Communication Workshop (ICCW), 2015 IEEE International Conference on (pp. 1563-1568). IEEE | single institute |
doc-2635 | external conference | Argumentation Random Field |
|
May-2015 | Eleventh international workshop on argumentation in multi-agent systems | international |
doc-2847 | external conference | Global Approximations for Principal Agent Theory |
|
May-2015 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 | collaborative |
doc-2860 | external conference | Strategies for Truth Discovery under Resource Constraints |
|
May-2015 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 | single institute |
doc-2861 | external conference | Agent support to reasoning with different types of evidence in intelligence analysis |
|
May-2015 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 | international with government |
doc-2899 | external conference | Supporting Situation Understanding For The 2014 Nato Summit Through Human-Information Interaction |
|
May-2015 | NATO IST/SET-126 Symposium on Information Fusion (Hard and Soft) for Intelligence, Surveillance & Reconnaissance (ISR) | collaborative |
doc-2915b | external conference | Crowdsourcing for Argument Verification in Intelligence Analysis: A Position Paper |
|
May-2015 | Argumentation in Multi-Agent Systems (ArgMAS), 2015 | international |
doc-x0009 | journal | Network Capability in Localizing Node Failures via End-to-end Path Measurements |
|
May-2015 | IEEE/ACM Transactions on Networking, May 2015, revised Dec 2015 | international with government |
doc-x0038 | external conference | Sensor and Information Fusion for Actionable Intelligence at the Tactical Edge |
|
May-2015 | NATO IST-SET-126 RSM Symposium on Information Fusion (Hard and Soft) for ISR, Norfolk, VA, May 2015. | international with government |
doc-x0039 | external conference | Interest-based Negotiation for Asset Sharing Policies |
|
May-2015 | XIX International Workshop on Coordination, Organizations, Institutions and Norms in Multi-agent Systems Coordination (COIN15), Istanbul, Turkey, May 2015 | international with government |
doc-x0466 | external conference | Crowdsourcing for Argument Verification in Intelligence Analysis |
|
May-2015 | Workshop on Logical Aspects of Multi-Agent Systems (LAMAS 2015) | international |
doc-x0524 | external conference | Enabling Intelligence Analysis through Agent-Support: the CISpaces Toolkit |
|
May-2015 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 | international with government |
doc-x0908 | external conference | Supporting reasoning with different types of evidence in intelligence analysis |
|
May-2015 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2015 | international with government |
doc-2758 | external conference | On optimal monitor placement for localizing node failures via network tomography |
|
Apr-2015 | Performance Evaluation, 91, 16-37 | international with government |
doc-2793a | external conference | Optimal multicast in dense multi-channel multi-radio wireless networks |
|
Apr-2015 | IEEE International Conference on Computer Communications (InfoCom), 2015 | collaborative with government |
doc-2849a | external conference | Conversational Sensemaking Variants: doc-2849b |
|
Apr-2015 | International Society for Optics and Photonics - Defense, Security and Sensing, 2015 | international |
doc-2850 | external conference | Tasking the Tweeters: Obtaining Actionable Information from Human Sensors |
|
Apr-2015 | International Society for Optics and Photonics - Defense, Security and Sensing, 2015 | collaborative |
doc-2852 | external conference | Collaborative human-machine analysis using a Controlled Natural Language |
|
Apr-2015 | International Society for Optics and Photonics - Defense, Security and Sensing, 2015 | international with government |
doc-2857b | external conference | Detecting Distributed Signature-based Intrusion: The Case of Multi-Path Routing Attacks |
|
Apr-2015 | IEEE International Conference on Computer Communications (InfoCom), 2015 | international |
doc-x0079 | external conference | Computing on encrypted data and its applicability to a coalition operations environment |
|
Apr-2015 | International Society for Optics and Photonics - Defense, Security and Sensing, 2015 | single institute |
doc-x0720 | external conference | Next place predictions based on user mobility traces |
|
Apr-2015 | IEEE International Conference on Computer Communications (InfoCom), 2015 | single institute |
doc-x0898 | external conference | Spatial and temporal considerations in next place predictions |
|
Apr-2015 | IEEE International Conference on Computer Communications (InfoCom), 2015 | single institute |
doc-x1010 | external conference | The use of visual programming tools and techniques for rapid in field ad-hoc edge of the network situational application integration in a coalition environment |
|
Apr-2015 | International Society for Optics and Photonics - Defense, Security and Sensing, 2015 | single institute |
doc-2912 | external conference | Cognitive and Probabilistic Models of Group Decision Making |
|
Mar-2015 | 24th Conference on Behavior Representation in Modeling and Simulation | international |
doc-2572 | external conference | Multi-Client Verifiable Computation with Stronger Security Guarantees |
|
Feb-2015 | Theory of Cryptography (pp. 144-168). Springer Berlin Heidelberg | collaborative |
doc-2829 | phd thesis | Truth Discovery under Resource Constraints |
|
Feb-2015 | single institute | |
doc-2830 | external conference | Debiasing crowdsourced quantitative characteristics in local businesses and services |
|
Feb-2015 | Proceedings of the 14th International Conference on Information Processing in Sensor Networks (pp. 190-201). ACM | international with government |
doc-2858 | external conference | Towards Making Network Function Virtualization a Cloud Computing Service |
|
Feb-2015 | Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 89-97). IEEE | international |
doc-2862 | external conference | GeoSpatial Access Control for Mobile Devices |
|
Feb-2015 | Region 10 Symposium (TENSYMP), 2015 IEEE (pp. 86-89). IEEE | international |
doc-2884 | invited talk | Knowledge-based Security |
|
Feb-2015 | collaborative | |
doc-2891 | external conference | Access Control in Publicly Verifiable Outsourced Computation |
|
Feb-2015 | Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 657-662). ACM | single institute |
doc-2892 | tech report | Revocation in Publicly Verifiable Outsourced Computation Variants: doc-2866 |
|
Feb-2015 | Crypto Archives | single institute |
doc-2893 | external conference | Picking v.s. Guessing Secrets: A Game-Theoretic Analysis |
|
Feb-2015 | Computer Security Foundations Symposium (CSF), 2015 IEEE 28th (pp. 243-257). IEEE | international |
doc-2900 | external conference | When is Lying the Right Choice? |
|
Feb-2015 | Language and Ontologies, 43 | international with government |
doc-2902 | tech report | Results of Experimental Realization of Inference Management Firewall on Information Fabric |
|
Feb-2015 | international | |
doc-2904 | external conference | Dynamic Service Migration in Mobile Edge-Clouds |
|
Feb-2015 | In IFIP Networking Conference (IFIP Networking), 2015 (pp. 1-9). IEEE | international with government |
doc-2905 | journal | Online Workload Placement with Provable Performance Guarantees in Cloud Environments |
|
Feb-2015 | IEEE Transactions on Parallel and Distributed Systems | international |
doc-2906 | external conference | An online method for minimizing network monitoring overhead |
|
Feb-2015 | Distributed Computing Systems (ICDCS), 2015 IEEE 35th International Conference on (pp. 268-277). IEEE | collaborative |
doc-2908 | tech report | Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks Variants: doc-x0869 |
|
Feb-2015 | PSU Tech Report | collaborative |
doc-2911 | book chapter | Integrating ACT-R Cognitive Models with the Unity Game Engine |
|
Feb-2015 | IGI Global, Hershey, Pennsylvania, USA | international |
doc-2916 | journal | Partial Observable Update for Subjective Logic and Its Application for Trust Estimation |
|
Feb-2015 | Information Fusion | international with government |
doc-2895 | tech report | Examples of Natural Deduction |
|
Jan-2015 | single institute | |
doc-x0058 | external conference | Place Recognition and Topological Map Learning in a Virtual Cognitive Robot |
|
2015 | 17th International Conference on Artificial Intelligence, Las Vegas, Nevada, USA. | international |
doc-x0059 | external conference | Situating Cognition within the Virtual World |
|
2015 | 6th International Conference on Applied Human Factors and Ergonomics, Las Vegas, Nevada, USA. | international |
doc-x0469 | patent | Data collection from networked devices |
|
2015 | U.S. Patent No. 8,935,368. Washington, DC: U.S. Patent and Trademark Office. Chicago | single institute |
doc-x0559 | journal | Federating Policy-Driven Autonomous Systems: Interaction Specification and Management Patterns |
|
2015 | Journal of Network and Systems Management, 23(3), 753-793. | single institute |
doc-x0586 | external conference | Handling Uncertainty: An Extension of DL-Lite with Subjective Logic |
|
2015 | Proc. of 28th International Workshop on Description Logics (DL 2015) | international |
doc-x0588 | external conference | Hardness of learning problems over Burnside groups of exponent 3 |
|
2015 | Designs, Codes and Cryptography, 75(1), 59-70. | collaborative |
doc-x0678 | journal | Minimum congestion mapping in a cloud Variants: doc-x0677 |
|
2015 | SIAM Journal on Computing, 44(3), 819-843 | single institute |
doc-x0705 | patent | Multi-tier indexing methodology for scalable mobile device data collection |
|
2015 | U.S. Patent No. 9,014,161. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0732 | tech report | On markov argumentation random fields Variants: doc-2779 |
|
2015 | Technical report, ITACS (https://www.usukitacs. com/node/2903). | international |
doc-x0743 | journal | On-demand discovery of software service dependencies in MANETs |
|
2015 | Network and Service Management, IEEE Transactions on, 12(2), 278-292. | international |
doc-x0764 | tech report | Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report) |
|
2015 | arXiv preprint arXiv:1505.02325. | international |
doc-x0806 | patent | Rate adaptive transmission of wireless broadcast packets |
|
2015 | U.S. Patent No. 9,173,071. Washington, DC: U.S. Patent and Trademark Office | collaborative |
doc-x0809 | external conference | Rateless Pollution-Attack-Resilient Network Coding for Data Streams in Hybrid Coalition Networks |
|
2015 | IEEE International Symposium on Information Theory (ISIT) (p. 1) | collaborative |
doc-x0827 | patent | Reliable multicast broadcast in wireless networks |
|
2015 | U.S. Patent No. 9,059,847. Washington, DC: U.S. Patent and Trademark Office | single institute |
doc-x1044 | journal | netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks Variants: doc-1753 |
|
2015 | IEEE Trans. Dependable & Secure Computing, 2015 | collaborative with government |
doc-2872 | external conference | Lightweight Authentication of Freshness in Outsourced Key-Value Stores |
|
Dec-2014 | Proceedings of the 30th Annual Computer Security Applications Conference (pp. 176-185). ACM | collaborative |
doc-2894 | tech report | Experimentation on Controlled English based on Logic Reasoning |
|
Dec-2014 | single institute | |
doc-2914 | journal | Declarative Framework for Specification, Simulation and Analysis of Distributed Applications |
|
Dec-2014 | IEEE Transactions on Knowledge and Data Engineering | international |
doc-2726 | external conference | Node Failure Localization via Network Tomography |
|
Nov-2014 | Proceedings of the 2014 Conference on Internet Measurement Conference (pp. 195-208). ACM | international with government |
doc-2764b | journal | Reasoning with Streamed Uncertain Information from Unreliale Resources |
|
Nov-2014 | Expert Systems with Applications 42.22 (2015): 8381-8392. | international |
doc-2765b | journal | A review paper on Preserving Privacy in Mobile Environments |
|
Nov-2014 | Journal of Network and Computer Applications 53 (2015): 74-90. | international |
doc-2768 | external conference | MSPlayer: Multi-Source and multi-Path LeverAged YoutubER |
|
Nov-2014 | Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 263-270). ACM | single institute |
doc-2782 | tech report | Human-Information Interaction (peer review report) |
|
Nov-2014 | international | |
doc-2833 | tech report | More complex semantics in ELICIT sentences |
|
Nov-2014 | single institute | |
doc-2834 | tech report | Solving the Three Ties Problem in Controlled English |
|
Nov-2014 | single institute | |
doc-2835 | demo | AFM 2014 demonstration of fact extraction and NL processing |
|
Nov-2014 | international | |
doc-2836 | tech report | Rich Explanation when performing CE reasoning |
|
Nov-2014 | single institute | |
doc-2840 | workshop | The Analysis Game (workshop presentation) |
|
Nov-2014 | 8th Annual Fall Meeting of the International Technology Alliance | single institute |
doc-2843 | journal | Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation |
|
Nov-2014 | IEEE Transactions on Data and Knowledge Engineering | collaborative |
doc-2848 | external conference | An Inference Management Architecture for Risk-Aware Data Sharing in Mobile Networks |
|
Nov-2014 | ICPADS 2014 | international |
doc-2851 | tech report | Markov Argumentation Random Fields-based Linchpin Sensitivity Analysis |
|
Nov-2014 | usukitacs.com | international |
doc-2856 | tech report | On the zero-additional leak privacy of location traces using model-based falsification of data |
|
Nov-2014 | usukitacs.com | single institute |
doc-2863 | external conference | GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation Best paper award |
|
Nov-2014 | Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 87-101). ACM | collaborative |
doc-2866 | external conference | Revocation in Publicly Verifiable Outsourced Computation Variants: doc-2892 |
|
Nov-2014 | Information Security and Cryptology (pp. 51-71). Springer International Publishing | single institute |
doc-x0889 | external conference | Social spring: encounter-based path refinement for indoor tracking systems |
|
Nov-2014 | Proceedings of the 1st ACM Conference on Embedded Systems for Energy-Efficient Buildings (pp. 156-159). ACM. | single institute |
doc-2624 | external conference | Location Privacy - Where to Enforce? |
|
Oct-2014 | IEEE Military Communications Conference, 2014 | international |
doc-2669a | external conference | Mobility-Induced Service Migration in Mobile Micro-Clouds |
|
Oct-2014 | IEEE Military Communications Conference, 2014 | international with government |
doc-2677 | external conference | Representing Uncertainty in CE |
|
Oct-2014 | IEEE Military Communications Conference, 2014 | international with government |
doc-2721 | external conference | Dynamic Policy Enforcement using Restriction Set Theoretic Expressions (RSTE) |
|
Oct-2014 | IEEE Military Communications Conference, 2014 | single institute |
doc-2724 | external conference | Optimal Caching and Routing in Hybrid Networks |
|
Oct-2014 | IEEE Military Communications Conference, 2014 | collaborative |
doc-x0040 | external conference | Distributed Decision Making at the Tactical Edge: An Agile Hybrid Human-Machine Processing Approach |
|
Oct-2014 | 2014 Military Sensing Symposium BAMS, Springfield, VA, Oct 2014. | international with government |
doc-x0614 | patent | Increasing resilience of a network service |
|
Oct-2014 | U.S. Patent No. 8,869,035 | collaborative |
doc-2569c | internal conference | Conversational Sensing Variants: doc-2569a |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2670 | external conference | Obfuscation of Semantic Data: Restricting the Spread of Sensitive Information |
|
Sep-2014 | Description Logics (pp. 434-446) | international with government |
doc-2703 | external conference | Argumentation-based collaborative intelligence analysis in CISpaces |
|
Sep-2014 | Fifth International Conference on Computational Models of Argumentation (COMMA) (pp. 481-482) | international |
doc-2745 | internal conference | Cognitive Architectures and Virtual Worlds: Integrating ACT-R with the XNA Framework |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2746 | internal conference | Socially-Distributed Cognition and Cognitive Architectures: Towards an ACT-R-Based Cognitive Social Simulation Capability |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2748 | internal conference | Challenges solved and unsolved in Fact Extraction from Natural Language |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2753 | internal conference | Representing Natural Language Expressions of Uncertainty in CE |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2754 | internal conference | Investigating the use of distributional semantics to expand domain vocabulary |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2756 | internal conference | Reasoning under Uncertainty in Controlled English: an Argumentation-based Perspective |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2759 | tech report | The Project 4 integrated demonstration |
|
Sep-2014 | single institute | |
doc-2760 | internal conference | Beyond the graph: Telling the story with PROV and Controlled English |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2762 | internal conference | Applying Human-Information Interaction Techniques to Assess Community Impacts of the 2014 NATO Summit |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2763 | internal conference | Modeling Uncertainty in Controlled Natural Language for Crowdsourcing |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2767 | internal conference | Ontology-Based Data Access over Subjective Ontologies |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2770 | internal conference | Managing Information Sharing in Coalitions through Credible Obfuscation Variants: doc-x0661 |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2772 | internal conference | Optimal Monitor Selection using Measurement Correlation |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2774 | internal conference | On the Impacts of Information Sharing |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2775 | internal conference | Inference Management in the Experimentation Framework |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2779 | internal conference | On Markov Argumentation Random Fields Variants: doc-x0732 |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2780 | internal conference | Civil-Military Domain Modeling in Controlled English |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2781 | internal conference | Practical Applications of Controlled English in a Tactical Environment |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2783 | internal conference | An Offline Optimal SPARQL Query Planning Approach to Evaluate Online Heuristic Planners Variants: doc-2685 |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2784 | internal conference | Dynamic Service Placement in Hybrid Wireless Networks |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2785 | internal conference | Dynamic Multi-Layer Management of Service Based Systems in Hybrid Wireless Networks |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2786 | internal conference | Delay Tolerant Harvesting of Monitoring Data in Mobile Ad Hoc Networks |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2787 | internal conference | Assessing the credibility of information in collaborative intelligence analysis |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2788 | internal conference | Source Selection and Fusion in Resource-Constrained Environments |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2792 | internal conference | An approach to argumentation-based reasoning under uncertainty |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | single institute |
doc-2794 | internal conference | Understanding the Information Flow Dynamics in Coalition Networks: A Game Theoretic Analysis |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2796 | internal conference | Accountability as a Service |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2798 | internal conference | Multi-layer Human-in-the-loop Service Management Utilizing Rule-based Policies and Set Theoretic Expressions |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2804 | internal conference | Assessing the Applicability of Commercial Cloud Distributed Processing Techniques to Mobile Micro-Cloud Deployments |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2810 | internal conference | A security model for micro-cloud technology in hybrid tactical environments, |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2811 | internal conference | Mobile Micro-Cloud Scenario: Distributed Application Deployment to Track and Intercept a Vehicle of Interest |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2837 | internal conference | Node Failure Localization in Communication Networks via Network Tomography |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2838 | internal conference | Experiment Design for Link Loss Tomography |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2839 | internal conference | Monitor Placement for Maximizing Network Identifiability via End-to-end Path Measurements |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2842 | internal conference | Authorization Information Leakage Control in Collaborative Distributed Query Processing |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2844 | internal conference | Improving Energy Efficiency of MPTCP |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2845 | internal conference | On Enhancing Multipath Data Transport via Traffic Splitting |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2846 | internal conference | MSPlayer: Multi-Source Multi-Path Video Streaming |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | single institute |
doc-2853 | internal conference | Robust Multicast in Mobility-induced Dynamic Networks |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-2870 | internal conference | Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2871 | internal conference | Adaptive stream query planning for hybrid coalition networks |
|
Sep-2014 | 8th Annual Fall Meeting of the International Technology Alliance | international |
doc-x0015 | external conference | A distributed, energy-efficient and QoI-aware framework for in-network processing |
|
Sep-2014 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2014 | international with government |
doc-x0922 | patent | Techniques for Policy Aware Service Composition |
|
Sep-2014 | U.S. Patent Application No. 13/769,469 | collaborative |
doc-x0988 | patent | Using penalty and reward to aggregate data to assess trust |
|
Sep-2014 | U.S. Patent No. 8,825,577 | single institute |
doc-2126 | journal | Improving Coalition Planning by Making Plans Alive |
|
Aug-2014 | IEEE Intelligent Systems | international with government |
doc-2637 | external conference | Truth Discovery in Crowdsourced Detection of Spatial Events |
|
Aug-2014 | Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (pp. 461-470). ACM | international |
doc-2685 | external conference | An Offline Optimal SPARQL Query Planning Approach to Evaluate Online Heuristic Planners Variants: doc-2783 |
|
Aug-2014 | Web Information Systems Engineering-WISE 2014 (pp. 480-495). Springer International Publishing | single institute |
doc-2689 | external conference | Data De-anonymization: From Mobility Traces to Online Social Networks |
|
Aug-2014 | ISC 2014 | collaborative |
doc-2694 | external conference | ALITHEIA: Towards Practical Verifiable Graph Processing |
|
Aug-2014 | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 856-867). ACM | single institute |
doc-2702 | external conference | Formal Arguments, Preferences, and Natural Language Interfaces to Humans: an Empirical Evaluation |
|
Aug-2014 | ECAI 2014 (pp. 207-212) | collaborative |
doc-2719 | external conference | How Green is Multipath TCP for Mobile Devices? |
|
Aug-2014 | Proceedings of the 4th workshop on All things cellular: operations, applications, & challenges (pp. 3-8). ACM | international |
doc-2730 | external conference | Efficiently Verifiable Computation on Encrypted Data |
|
Aug-2014 | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 844-855). ACM | collaborative |
doc-2743 | external conference | Quantifying Herding Effects in Crowd Wisdom |
|
Aug-2014 | Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1087-1096). ACM | single institute |
doc-2744 | external conference | Structural Data De-anonymization: Quantification, Practice, and Implications |
|
Aug-2014 | Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 1040-1053). ACM | collaborative |
doc-2752 | tech report | Solving the Analysis Game with Controlled English |
|
Aug-2014 | single institute | |
doc-2757 | poster | Fact Extraction and Reasoning using ITA Controlled English (Poster for CNL14) |
|
Aug-2014 | CNL14 | international |
doc-2766 | external conference | Adversary Gain vs. Defender Loss in Quantified Information Flow |
|
Aug-2014 | Proceedings of the International Workshop on Foundations of Computer Security (FCS) | collaborative |
doc-2776 | demo | Multitiered Inference Management for Context-Aware Information Masking |
|
Aug-2014 | international | |
doc-2778 | tech report | Initial Realization of Inference Management in Information Fabric |
|
Aug-2014 | international | |
doc-x0010 | journal | Inferring Link Metrics from End-to-End Path Measurements: Identifiability and Monitor Placement |
|
Aug-2014 | IEEE/ACM Transactions on Networking, 22(4), 1351-1368 | international with government |
doc-x0786 | patent | Propagating a query in a federated database |
|
Aug-2014 | U.S. Patent No. 8,812,535. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-2574 | external conference | Trust Estimation and Fusion of Uncertain Information by Exploiting Consistency |
|
Jul-2014 | 17th International Conference on Information FUSION | international with government |
doc-2675 | external conference | Natural Language Fact Extraction and Domain Reasoning using Controlled English |
|
Jul-2014 | 10th Annual DELPH-IN Summit, Tomar, Portugal | international |
doc-2697 | external conference | Enabling CoIST Users: D2D at the Network Edge |
|
Jul-2014 | 17th International Conference on Information FUSION | international with government |
doc-2723 | journal | Towards Relevancy Aware Service Oriented Systems in WSNs |
|
Jul-2014 | Services Computing, IEEE Transactions on (Vol 7, Issue 4, 2014) | international |
doc-2791 | external conference | Scalable Routing for Tag-Based Information-Centric Networking |
|
Jul-2014 | Proceedings of the 1st international conference on Information-centric networking (pp. 17-26). ACM | collaborative |
doc-x0913 | patent | System and method for secure information sharing with untrusted recipients |
|
Jul-2014 | U.S. Patent No. 8,793,211 | single institute |
doc-2571 | external conference | Soldier Decision-Making for Allocation of Intelligence, Surveillance, and Reconnaissance Assets |
|
Jun-2014 | International Command and Control Research Technology Symposium (ICCRTS), 2014 | international with government |
doc-2619 | external conference | Towards a Cognitively Realistic Computational Model of Team Problem Solving Using ACT-R Agents and the ELICIT Experimentation Framework |
|
Jun-2014 | International Command and Control Research Technology Symposium (ICCRTS), 2014 | international |
doc-2687 | external conference | CISpaces, towards a system for online collaborative argument construction and debate |
|
Jun-2014 | Proceedings of the First International Workshop on Arguing on the Web 2.0, 2014 | international with government |
doc-2716 | external conference | On Bufferbloat and Delay Analysis of MultiPath TCP in Wireless Networks |
|
Jun-2014 | Networking Conference, 2014 IFIP (pp. 1-9). IEEE | single institute |
doc-x0035 | external conference | Layered Percolation |
|
Jun-2014 | NetSci 2014 | collaborative with government |
doc-2502b | invited talk | Authenticated Data Structures, Generically Variants: doc-2502a |
|
May-2014 | single institute | |
doc-2559 | journal | Subjective Logic Operators in Trust Assessment: an Empirical Study |
|
May-2014 | Information Systems Frontiers Journal | international with government |
doc-2560a | journal | Reasoning about the Impacts of Information Sharing |
|
May-2014 | Information Systems Frontiers 17.4 (2015): 725-742. | international |
doc-2563 | external conference | Using Cognitive Architectures to Study Issues in Team Cognition in a Complex Task Environment |
|
May-2014 | International Society for Optics and Photonics - Defense, Security and Sensing, 2014 | international |
doc-2565d | invited talk | WYSTERIA: A Programming Language for Generic, Mixed-Mode Multiparty Computations Variants: doc-x1001 |
|
May-2014 | single institute | |
doc-2569a | external conference | Conversational Sensing Variants: doc-2569c |
|
May-2014 | International Society for Optics and Photonics - Defense, Security and Sensing, 2014 | international with government |
doc-2570 | external conference | Agile Sensor Tasking for COIST using Natural Language Knowledge Representation and Reasoning |
|
May-2014 | International Society for Optics and Photonics - Defense, Security and Sensing, 2014 | collaborative with government |
doc-2576 | external conference | Sharing Policies for Multi-Partner Asset Management in Smart Environments |
|
May-2014 | NOMS 2014 | international |
doc-2613 | external conference | Multi-Input Functional Encryption |
|
May-2014 | IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2014 | collaborative |
doc-2618 | external conference | Cognitive Social Simulation and Collective Sensemaking: An Approach Using the ACT-R Cognitive Architecture |
|
May-2014 | 6th International Conference on Advanced Cognitive Technologies and Applications (COGNITIVE 2014), Venice, IT, 25 - 29 May 2014. 10pp | international |
doc-2629 | external conference | Making informed decisions with provenance and argumentation schemes |
|
May-2014 | Argumentation in Multi-Agent Systems (ArgMAS), 2014 | international |
doc-2660 | external conference | Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation |
|
May-2014 | Security and Privacy Workshops (SPW), 2014 IEEE (pp. 61-64). IEEE | single institute |
doc-2676 | tech report | ITA Controlled English and its applications |
|
May-2014 | ITACS | international |
doc-2688 | external conference | Automating Efficient RAM-Model Secure Computation |
|
May-2014 | Security and Privacy (SP), 2014 IEEE Symposium on (pp. 623-638). IEEE | collaborative |
doc-2691 | tech report | ITA Project 4 common demonstration |
|
May-2014 | single institute | |
doc-2695 | tech report | ACT-R CE Integration Module Design Specification |
|
May-2014 | ITACS | single institute |
doc-2701 | tech report | Preliminary Report on Privacy in Trust/Reputation Mechanism |
|
May-2014 | international | |
doc-2704 | invited talk | Reasoning about information use and mis-use |
|
May-2014 | single institute | |
doc-2705 | tech report | Information Fabric and the Experimentation Framework |
|
May-2014 | single institute | |
doc-2715 | external conference | Virtual information exchange: enabling secure, dynamic, and policy-controlled interoperation |
|
May-2014 | International Society for Optics and Photonics - Defense, Security and Sensing, 2014 | international with government |
doc-2717 | journal | Multi-source Multipath HTTP (mHTTP): A Proposal |
|
May-2014 | ACM SIGMETRICS Performance Evaluation Review, 42(1), 583-584 | collaborative |
doc-2720 | external conference | An operational framework to reason about policy behavior in trust management systems |
|
May-2014 | AMW 2014: Alberto Mendelzon Workshop on Foundations of Data Management: Proceedings of the 8th Alberto Mendelzon Workshop on Foundations of Data Management: Cartagena de Indias, Colombia, June 4-6, 2014.(CEUR Workshop Proceedings; 1189) | collaborative |
doc-x0078 | external conference | Practical use of a framework for network science experimentation |
|
May-2014 | International Society for Optics and Photonics - Defense, Security and Sensing, 2014 | international with government |
doc-x0560 | external conference | Fine-grained policy control in US Army Research Laboratory (ARL) multimodal signatures database |
|
May-2014 | International Society for Optics and Photonics - Defense, Security and Sensing, 2014 | collaborative with government |
doc-x0796 | external conference | Quantifying information flow for dynamic secrets |
|
May-2014 | 2014 IEEE Symposium on Security and Privacy (SP) (pp. 540-555). IEEE. | collaborative |
doc-x0883 | external conference | Sharing smart environment assets in dynamic multi-partner scenarios |
|
May-2014 | Network Operations and Management Symposium (NOMS), 2014 IEEE (pp. 1-6). IEEE | international |
doc-x1001 | external conference | Wysteria: A programming language for generic, mixed-mode multiparty computations Variants: doc-2565d |
|
May-2014 | Security and Privacy (SP), 2014 IEEE Symposium on (pp. 655-670). IEEE | single institute |
doc-2484 | external conference | Monitor Placement for Maximal Identifiability in Network Tomography |
|
Apr-2014 | IEEE International Conference on Computer Communications (InfoCom), 2014 | international with government |
doc-2486 | external conference | Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices Variants: doc-2597 |
|
Apr-2014 | IEEE International Conference on Computer Communications (InfoCom), 2014 | collaborative |
doc-2587 | external conference | ipShield: A Framework For Enforcing Context-Aware Privacy |
|
Apr-2014 | NSDI | single institute |
doc-2690 | tech report | Extending CE to include adjunct expressions |
|
Apr-2014 | ITACS | international |
doc-2706 | external conference | Robust Network Tomography in the Presence of Failures |
|
Apr-2014 | Distributed Computing Systems (ICDCS), 2014 IEEE 34th International Conference on (pp. 481-492). IEEE | collaborative |
doc-2812 | external conference | On the Complexity of Optimal Routing and Content Caching in Heterogeneous Networks |
|
Apr-2014 | IEEE International Conference on Computer Communications (InfoCom), 2014 | collaborative |
doc-2586 | external conference | Multitiered Inference Management Architecture for Participatory Sensing |
|
Mar-2014 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2014 | international |
doc-x0754 | external conference | Outsourcing multi-version key-value stores with verifiable data freshness |
|
Mar-2014 | Data Engineering (ICDE), 2014 IEEE 30th International Conference on (pp. 1214-1217). IEEE. | international |
doc-2359 | external conference | Verifiable Oblivious Storage |
|
Feb-2014 | Public-Key Cryptography-PKC 2014 (pp. 131-148). Springer Berlin Heidelberg | single institute |
doc-2526 | external conference | Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption |
|
Feb-2014 | Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on (pp. 472-479). IEEE | single institute |
doc-2565b | invited talk | WYSTERIA: A Programming Language for Generic, Mixed-Model Multiparty Computations |
|
Feb-2014 | single institute | |
doc-2603 | tech report | On Interpreting the ELICIT sentences |
|
Feb-2014 | single institute | |
doc-2604 | tech report | Conceptualisation of ELICIT sentences in CE |
|
Feb-2014 | single institute | |
doc-2605 | tech report | Running ELICIT sentences through the ERG system |
|
Feb-2014 | single institute | |
doc-2611 | tech report | 'Tank' revisited - Handling of Ambiguous Sentences in CE |
|
Feb-2014 | single institute | |
doc-2612 | tech report | CE-based mechanisms for handling ambiguity in Natural Language |
|
Feb-2014 | single institute | |
doc-2625 | journal | Cross-cloud MapReduce: A Result Integrity Check Framework on Hybrid Clouds |
|
Feb-2014 | Intl Journal of Cloud Computing (IJCC) | international |
doc-2626 | external conference | De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information |
|
Feb-2014 | NDSS 2014 | collaborative |
doc-2627 | external conference | Optimal Contracts for Outsourced Computation |
|
Feb-2014 | Decision and Game Theory for Security (pp. 79-98). Springer International Publishing | single institute |
doc-2631 | external conference | Generalizing Homomorphic MACs for Arithmetic Circuits |
|
Feb-2014 | Public-Key Cryptography-PKC 2014 (pp. 538-555). Springer Berlin Heidelberg | collaborative |
doc-2633 | tech report | Architecture Options for Realization of Inference Management in Information Fabric |
|
Feb-2014 | ITACS | international |
doc-2636 | tech report | Argumentation Random Field for Linchpin Analysis |
|
Feb-2014 | Technical Report | international |
doc-2638a | tech report | Empirical Study: Is CDN Working Well in Cellular Networks? |
|
Feb-2014 | Technical report | collaborative |
doc-2639 | journal | Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks Variants: doc-1902 |
|
Feb-2014 | IEEE Transactions on Parallel and Distributed Systems | collaborative with government |
doc-2643 | tech report | Balancing Behavioral Privacy and Information Utility in Sensory Data Flows Variants: doc-1877 |
|
Feb-2014 | single institute | |
doc-2644 | tech report | Thoughts on Uncertainty in Natural Language |
|
Feb-2014 | international | |
doc-x0351 | patent | Adaptive remote decision making under quality of information requirements |
|
Feb-2014 | U.S. Patent No. 8,660,022 | single institute |
doc-x0396 | patent | Assessing response routes in a network |
|
Feb-2014 | U.S. Patent Application 14/171,256 | single institute |
doc-2607 | tech report | Natural Language and Uncertainty, P4T2, Face to Face 2014 |
|
Jan-2014 | ITA Face-to-face 2014 | international |
doc-2610 | tech report | Simple Uncertainty Example |
|
Jan-2014 | single institute | |
doc-2630 | journal | Human-Machine Conversations to Support Multi-Agency Missions |
|
Jan-2014 | ACM SIGMOBILE Mobile Computing and Communications Review, Volume 18 Issue 1 | collaborative |
doc-2815 | external conference | Distributed Route Aggregation on the Global Network |
|
2014 | Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (pp. 161-172). ACM | collaborative |
doc-x0041 | journal | Efficient solutions framework for optimal multitask resource assignments for data fusion in wireless sensor networks |
|
2014 | ACM Transactions on Sensor Networks (TOSN), 2014. | collaborative with government |
doc-x0202 | journal | Authenticated broadcast with a partially compromised public-key infrastructure Variants: doc-x0112 |
|
2014 | Information and Computation, 234, 17-25 | collaborative |
doc-x0318 | journal | A Generic Admission-Control Methodology for Packet Networks |
|
2014 | Wireless Communications, IEEE Transactions on, 13(2), 604-617 | collaborative |
doc-x0375 | external conference | An operational framework to reason about policy behavior in trust management systems (High-level Work) |
|
2014 | AMW 2014: Alberto Mendelzon Workshop on Foundations of Data Management: Proceedings of the 8th Alberto Mendelzon Workshop on Foundations of Data Management: Cartagena de Indias, Colombia, June 4-6, 2014.(CEUR Workshop Proceedings; 1189). 2014. | collaborative |
doc-x0377 | external conference | Analysis and Refinement of Temporal Relation Aggregation |
|
2014 | COLING (pp. 1556-1566). Chicago | collaborative with government |
doc-x0401 | patent | Assigning gateways for heterogeneous wireless mobile networks |
|
2014 | U.S. Patent No. 8,855,010. Washington, DC: U.S. Patent and Trademark Office. | international |
doc-x0407 | patent | Automated query path reporting in distributed databases |
|
2014 | U.S. Patent No. 8,626,747. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0501 | journal | Distributed stochastic cross-layer optimization for multi-hop wireless networks with cooperative communications |
|
2014 | Mobile Computing, IEEE Transactions on, 13(10), 2269-2282. | single institute |
doc-x0625 | phd thesis | Intelligent Resource Selection for Sensor-task Assignment: A Knowledge-based Approach Variants: doc-822 |
|
2014 | Doctoral dissertation, Aberdeen University | single institute |
doc-x0630 | external conference | ipShield: A Framework For Enforcing Context-Aware Privacy on Android |
|
2014 | USENIX NSDI, 2014 | single institute |
doc-x0661 | tech report | Managing Information Sharing in Coalitions through Credible Obfuscation Variants: doc-2770 |
|
2014 | Technical report, ITA | international |
doc-x0709 | journal | MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation |
|
2014 | EURASIP Journal on Information Security, 2014(1), 1-9. | single institute |
doc-x0751 | journal | Optimization-based resource allocation in communication networks |
|
2014 | Computer Networks, 66, 32-45. | single institute |
doc-x0818 | patent | Reconciling network management data |
|
2014 | U.S. Patent No. 8,898,269. Washington, DC: U.S. Patent and Trademark Office | international |
doc-x0859 | patent | Secure user authentication in a dynamic network |
|
2014 | U.S. Patent Application No. 14/193,127 | single institute |
doc-x0881 | patent | Serving time critical information to mobile devices |
|
2014 | U.S. Patent No. 8,880,030. Washington, DC: U.S. Patent and Trademark Office | single institute |
doc-x0899 | journal | Stage: Stereotypical trust assessment through graph extraction |
|
2014 | Computational Intelligence | single institute |
doc-x0902 | external conference | Structure based data de-anonymization of social networks and mobility traces |
|
2014 | Information Security (pp. 237-254). Springer International Publishing | collaborative |
doc-x0909 | journal | Supporting Trust Assessment and Decision Making in Coalitions |
|
2014 | Intelligent Systems, IEEE,29(4), 18-24 | international |
doc-x0938 | journal | Throughput maximization in mobile WSN scheduling with power control and rate selection |
|
2014 | Wireless Communications, IEEE Transactions on, 13(7), 4066-4079 | international |
doc-x0946 | external conference | Towards a rich sensing stack for IoT devices |
|
2014 | Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on (pp. 424-427). IEEE | single institute |
doc-x0999 | journal | Why Amazon's Ratings Might Mislead You: The Story of Herding Effects |
|
2014 | Big Data, 2(4), 196-204 | single institute |
doc-2042 | external conference | Fully Homomorphic Message Authenticators |
|
Dec-2013 | IACR Annual International Conference on the Theory and Application of Cryptology and Information (ASIACRYPT), 2013 | collaborative |
doc-2481 | external conference | Link Identifiability in Communication Networks with Two Monitors Variants: doc-2594 |
|
Dec-2013 | IEEE Global Communications Conference (GlobeCom), 2013 | international with government |
doc-x0771 | patent | Policy evolution with machine learning |
|
Dec-2013 | U.S. Patent No. 8,606,724. Washington, DC: U.S. Patent and Trademark Office. | international |
doc-x0788 | patent | Providing a Sensor Composite Service Based on Operational and Spatial Constraints |
|
Dec-2013 | U.S. Patent Application No. 14/135,911. | international |
doc-2317 | external conference | Human Factors in Intelligence, Surveillance, and Reconnaissance: Gaps for Soldiers and Technology Recommendations |
|
Nov-2013 | IEEE Military Communications Conference, 2013 | international with government |
doc-2349 | external conference | Inferring Military Activity in Hybrid Networks through Cache Behavior |
|
Nov-2013 | IEEE Military Communications Conference, 2013 | collaborative |
doc-2368 | external conference | Self-Optimization in Future Hybrid Networks |
|
Nov-2013 | IEEE Military Communications Conference, 2013 | international with government |
doc-2372 | external conference | Reliable Multicast Clouds |
|
Nov-2013 | IEEE Military Communications Conference, 2013 | single institute |
doc-2544 | demo | Syncoin3001 Demonstration of CE fact extraction Fall Meeting 2013 (contains 23 documents) |
|
Nov-2013 | international | |
doc-2562 | tech report | Writing an ERG mal-rule |
|
Nov-2013 | single institute | |
doc-2564 | tech report | Is 'male' a mass noun: searching for mal-rules and justifications |
|
Nov-2013 | single institute | |
doc-2566 | external conference | Quantifying Information Flow for Time Varying Data |
|
Nov-2013 | Proceedings of the IEEE Symposium on Security and Privacy (S&P) | collaborative |
doc-2568 | tech report | Moving from linguistic semantics to domain semantics in SYNCOIN3000 |
|
Nov-2013 | single institute | |
doc-2573 | tech report | Installing the ERG system on Linux |
|
Nov-2013 | single institute | |
doc-2580 | tech report | Online Application Placement with Provable Performance Guarantees in Cloud Environments |
|
Nov-2013 | ICDCS | international |
doc-2584 | external conference | Secure Outsourcing of Big Key-Value Storage with Freshness Authenticity |
|
Nov-2013 | IEEE International Conference on Data Engineering 2014 | international |
doc-2585 | external conference | IncBm-Tree: Outsourcing Big Stream with Authenticated Freshness Variants: doc-2542 |
|
Nov-2013 | IEEE International Conference on Data Engineering (ICDE) | international |
doc-x0753 | external conference | Optimizing Control Overhead for Power-aware Routing in Wireless Networks Variants: doc-2195 |
|
Nov-2013 | IEEE Military Communications Conference, 2013 | international |
doc-2247 | external conference | Broadcast Steganography |
|
Oct-2013 | Topics in Cryptology-CT-RSA 2014 (pp. 64-84). Springer International Publishing | collaborative |
doc-2275 | external conference | Resource Allocation with Non-Deterministic Demands and Profits |
|
Oct-2013 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2013 | international |
doc-2377 | external conference | Human-Machine Conversations to Support Mission-Oriented Information Provision Best paper award |
|
Oct-2013 | Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking (pp. 43-50). ACM | collaborative |
doc-2439 | internal conference | A Working Implementation of Secure Keyword Search on Files Stored over Untrusted Servers |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | single institute |
doc-2479 | internal conference | Collaborative Intelligence Analysis for Effective Decision Making |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2480 | internal conference | On the benefits of argumentation schemes in deliberative dialogue for collaborative decision-making |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2483 | external conference | Identifiability of Link Metrics Based on End-to-end Path Measurements |
|
Oct-2013 | Proceedings of the 2013 conference on Internet measurement conference (pp. 391-404). ACM | international with government |
doc-2490 | internal conference | Using ACT-R to Model Collective Sensemaking in Military Coalition Environments |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2492 | internal conference | Revisiting Mix-Zones for Location Information Flow Control |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2494 | internal conference | Policy Enabled Real-time Information Flow Control Across Multiple Administrative Domains |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2498 | internal conference | Using the English Resource Grammar to extend fact extraction capabilities |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2499 | internal conference | Exploring the use of Controlled English for communication with ACT-R agents |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2500 | internal conference | Demonstrating enhanced fact extraction capabilities using Controlled English |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2501 | internal conference | Peer-to-Peer Ontological Reasoning in Military Coalition Data Networks |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2503 | internal conference | Leveraging Controlled English at the Network Edge for Policy-Based Management of ISR Services |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2504 | internal conference | Extending the NS-CTA RTD2D Platform to the Wireless Sensor Network Edge |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2505 | internal conference | CE-Based Policies Conflict Analysis for Sensor Services Management in Information Fabric |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2508 | internal conference | Sources of Uncertainty in Facts Extracted from Natural Language |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | single institute |
doc-2513 | internal conference | Decentralized Policy Confidentiality Preserving Query Planning in Coalition Networks |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2515 | internal conference | Efficient Multicast in Hybrid Wireless Networks |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2517 | internal conference | Enhancing Specification and Analysis of Declarative Distributed Computing and Comparison with Existing Approaches |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2518 | internal conference | A simulation environment for distributed applications |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2520 | internal conference | Distributed Pattern Matching using Declarative Networking Framework |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2522 | internal conference | Security-aware Application Placement in a Mobile Micro-cloud |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2523 | internal conference | Mobile Micro-Cloud: Application Classification, Mapping, and Deployment |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2542 | internal conference | INCBM-TREE : Outsourcing Big Stream with Authenticated Freshness Variants: doc-2585 |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2543 | internal conference | Adaptive Data Stream Processing for Hybrid Coalition Networks: Challenges and Initial Solutions |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2567 | internal conference | Location Information Flow Control in Coalition Networks |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2575 | internal conference | Localizing Network Problems in Tactical Hybrid Wireless Networks |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2583 | internal conference | Data Stream Processing for Hybrid Coalition Networks (HCNs): Demo |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-2593 | internal conference | Efficient Identification of Additive Link Metrics via Network Tomography Variants: doc-2482 |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2594 | internal conference | Link Identifiability in Communication Networks with Two Monitors Variants: doc-2481 |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2595 | internal conference | Measurement Design Framework for Network Tomography Using Fisher Information |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2596 | internal conference | A Measurement-based Study of MultiPath TCP Performance over Wireless Networks Variants: doc-2371 |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | international |
doc-2597 | internal conference | Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices Variants: doc-2486 |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-x0640 | internal conference | Knowledge inference for optimizing and enforcing secure computations |
|
Oct-2013 | 7th Annual Fall Meeting of the International Technology Alliance | collaborative |
doc-x0917 | patent | Systems and methods for provisioning sensing resources for mobile sensor networks |
|
Oct-2013 | U.S. Patent Application No. 13/432,337 | single institute |
doc-2547 | tech report | Developing an ACT-R Model of Collective Sensemaking. I. Research Context, Motivating Factors and Research Focus Areas |
|
Sep-2013 | N/A | international |
doc-x0314 | external conference | A Fluid Model Study of Multipath Communication in a Hybrid Network for a Moving Convoy Variants: doc-2059 |
|
Sep-2013 | 25th International Teletraffic Congress (ITC'25), 10-12 September 2013. | international |
doc-x0334 | external conference | A performance analysis study of multipath routing in a hybrid network with mobile users |
|
Sep-2013 | Teletraffic Congress (ITC), 2013 25th International (pp. 1-9). IEEE. | international |
doc-x0380 | patent | Analysis of IT resource performance to business organization |
|
Sep-2013 | U.S. Patent No. 8,539,018. Washington, DC: U.S. Patent and Trademark Office | single institute |
doc-2334 | external conference | An Empirical Evaluation of Geometric Subjective Logic Operators |
|
Aug-2013 | Agreement Technologies (pp. 90-104). Springer Berlin Heidelberg | collaborative |
doc-2335 | external conference | A Framework for Using Trust to Assess Risk in Information Sharing |
|
Aug-2013 | Agreement Technologies (pp. 135-149). Springer Berlin Heidelberg | international |
doc-2360 | external conference | Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields |
|
Aug-2013 | IACR Annual International Cryptology Conference (CRYPTO), 2013 | single institute |
doc-2364 | external conference | Protecting Data Against Unwanted Inferences |
|
Aug-2013 | Information Theory Workshop (ITW), 2013 IEEE (pp. 1-5). IEEE | single institute |
doc-2367 | journal | A Declarative Approach to Distributed Computing: Specification, Execution and Analysis |
|
Aug-2013 | Theory and Practice of Logic Programming 13.4-5 (2013): 815-830. | international |
doc-2436 | poster | Decentralised Certificateless Public-Key Infrastructure |
|
Aug-2013 | CCC IMA | collaborative |
doc-2493 | invited talk | Using LLVM for Program Analysis and Transformation |
|
Aug-2013 | single institute | |
doc-2495 | tech report | Survey on argumentation schemes and linchpin analysis |
|
Aug-2013 | ITACS | international |
doc-2509 | tech report | Report on the use of the English Resource Grammar to extend fact extraction capabilities |
|
Aug-2013 | international | |
doc-2512 | tech report | Motivating Scenario |
|
Aug-2013 | international | |
doc-2514 | invited talk | Fact Extraction using Controlled English and the English Resource Grammar |
|
Aug-2013 | international | |
doc-2524 | demo | Mobile Micro-Cloud: Demo |
|
Aug-2013 | single institute | |
doc-2535 | external conference | IntegrityMR: Integrity Assurance Framework for Big Data Analytics and Management Applications |
|
Aug-2013 | Big Data, 2013 IEEE International Conference on (pp. 33-40). IEEE | collaborative |
doc-2050 | journal | On the Complexity of the BKW Algorithm on LWE |
|
Jul-2013 | Design Codes Cryptography | collaborative |
doc-2305 | external conference | TIDY: A Trust-Based Approach to Information Fusion through Diversity |
|
Jul-2013 | 16th International Conference on Information FUSION | international |
doc-2312 | external conference | Assessing Trust over Uncertain Rules and Streaming Data |
|
Jul-2013 | 16th International Conference on Information FUSION | international |
doc-2345 | external conference | Reasoning Under Uncertainty: Variations of Subjective Logic Deduction |
|
Jul-2013 | 16th International Conference on Information FUSION | international with government |
doc-2390 | tech report | Installing the ERG and PET parser on Linux |
|
Jul-2013 | single institute | |
doc-2478 | external conference | Argument Schemes and Provenance to Support Collaborative Intelligence Analysis |
|
Jul-2013 | Proceedings of the Third International Conference on Advanced Collaborative Networks, Systems and Applications (pp. 51-54) | collaborative |
doc-2482 | external conference | Efficient Identification of Additive Link Metrics via Network Tomography Best paper award Variants: doc-2593 |
|
Jul-2013 | Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on (pp. 581-590). IEEE | international with government |
doc-2488 | external conference | TRIBE: Trust Revision for Information Based on Evidence |
|
Jul-2013 | 16th International Conference on Information FUSION | international with government |
doc-2491 | external conference | Cross-Path Inference Attacks on Multipath TCP |
|
Jul-2013 | Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks (p. 15). ACM | collaborative |
doc-2502a | journal | Authenticated Data Structures, Generically Variants: doc-2502b |
|
Jul-2013 | ACM SIGPLAN Notices (Vol. 49, No. 1, pp. 411-423). ACM | single institute |
doc-2369 | journal | Rewards, Costs and Flexibility in Dynamic Resource Allocation: A Stochastic Optimal Control Approach Variants: doc-2370 |
|
Jun-2013 | ACM SIGMETRICS Performance Evaluation Review, 41(3), 61-63 | collaborative |
doc-2506 | external conference | Controlled English for Effective Communication during Coalition Operations |
|
Jun-2013 | International Command and Control Research Technology Symposium (ICCRTS), 2013 | international with government |
doc-x0789 | patent | QA Based on Context Aware, Real-Time Information from Mobile Devices |
|
Jun-2013 | U.S. Patent Application No. 13/912,147. | single institute |
doc-2045 | external conference | Quadratic Span Programs and Succinct NIZKs without PCPs |
|
May-2013 | IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2013 | international |
doc-2057e | external conference | Multicasting under Multi-domain and Hierarchical Constraints Variants: doc-2057a |
|
May-2013 | Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on (pp. 524-531). IEEE | international |
doc-2221 | external conference | Reasoning about Uncertain Information and Conflict Resolution through Trust Revision |
|
May-2013 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2013 | international |
doc-2283 | external conference | Quantum noise limited optical communication with low probability of detection |
|
May-2013 | Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on (pp. 1715-1719). IEEE | collaborative |
doc-2303 | external conference | Price Based Routing for Event Driven Prioritized Traffic in Wireless Sensor Networks |
|
May-2013 | Network Science Workshop (NSW), 2013 IEEE 2nd (pp. 1-8). IEEE | single institute |
doc-2306 | external conference | Understanding the Cognitive Impact of Emerging Web Technologies |
|
May-2013 | 1st International Web for Wellbeing & Human Performance Workshop, Paris, France | single institute |
doc-2319a | phd thesis | Models of argument for deliberative dialogue in complex domains |
|
May-2013 | single institute | |
doc-2329 | tech report | OptiMeas: Optimized Measurement Selection in Network Tomography |
|
May-2013 | collaborative | |
doc-2339 | invited talk | Presentation on Controlled English at the NS-CTA bootcamp (April 2013) |
|
May-2013 | single institute | |
doc-2340 | tech report | BPP11 Summary of NL processing and Fact Extraction |
|
May-2013 | ITACS | international |
doc-2341 | tech report | 4th Battalion Communications Report |
|
May-2013 | single institute | |
doc-2342 | tech report | BPP11 NL processing and fact extraction (CE embedded Word document) |
|
May-2013 | single institute | |
doc-2343 | external conference | Dempster-Shafer Argument Schemes |
|
May-2013 | Argumentation in Multi-Agent Systems (ArgMAS), 2013 | international |
doc-2344 | external conference | Position-based Trust Update in Delegation Chains |
|
May-2013 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2013 | single institute |
doc-2346 | tech report | Development of a Simulation Capability to Support Experimental Analyses of Collective Sensemaking |
|
May-2013 | international | |
doc-2355 | external conference | Constructing Controlled English for Both Human Usage and Machine Processing |
|
May-2013 | RuleML 2013 | international |
doc-2357 | journal | An Efficient Heuristic Approach to Detecting Graph Isomorphism Based on Combinations of Highly Discriminating Invariants |
|
May-2013 | Advances in Computational Mathematics 2013 | international |
doc-2362 | external conference | Robust Confidentiality Preserving Data Delivery in Federated Coalition Networks |
|
May-2013 | Networking Conference, 2014 IFIP (pp. 1-9). IEEE | international |
doc-2370 | journal | Stochastic Optimal Control for a Class of General Dynamic Resource Allocation Problems Variants: doc-2369 |
|
May-2013 | Performance Evaluation Review | collaborative |
doc-2371 | external conference | A Measurement-based Study of MultiPath TCP Performance over Wireless Networks Variants: doc-2596 |
|
May-2013 | Proceedings of the 2013 conference on Internet measurement conference (pp. 455-468). ACM | international |
doc-x0780 | patent | Privacy Preserving Query Method and System for Use in Federated Coalition Networks |
|
May-2013 | U.S. Patent Application No. 13/887,873. | international |
doc-1866 | external conference | Endhost-Based Shortest Path Routing in Dynamic Networks: An Online Learning Approach |
|
Apr-2013 | IEEE International Conference on Computer Communications (InfoCom), 2013 | collaborative |
doc-2225 | external conference | Managing ISR sharing policies at the network edge using Controlled English |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international |
doc-2228a | external conference | CE-SAM: a conversational interface for ISR mission support |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international with government |
doc-2230 | external conference | Exploring the Dynamics of Collective Cognition Using a Computational Model of Cognitive Dissonance |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international |
doc-2252 | external conference | A System Architecture for Decision-making Support on ISR Missions with Stochastic Needs and Profits |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international |
doc-2293b | external conference | Controlled English to facilitate human/machine analytical processing |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international with government |
doc-2320 | external conference | Result Integrity Check for MapReduce Computation on Hybrid Clouds |
|
Apr-2013 | Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on (pp. 847-854). IEEE | collaborative |
doc-2323 | external conference | MIPS: A Service-Based Aid for Intelligence Analysis |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | single institute |
doc-2348 | external conference | Reasoning with Uncertain Information and Trust |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international with government |
doc-x0042 | external conference | Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international with government |
doc-x0043 | external conference | UK MoD Land Open Systems Architecture and Coalition Interoperability with the U.S. |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international with government |
doc-x0076 | external conference | Practical experience in deploying and controlling the data sharing interoperability layer at the U.K. Land Open Systems Architecture (LOSA) field trials in October 2012 |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | collaborative with government |
doc-x0077 | external conference | Characterization and definition of a software stack for a reference experimental framework |
|
Apr-2013 | International Society for Optics and Photonics - Defense, Security and Sensing, 2013 | international with government |
doc-x0723 | patent | Non-interactive hierarchical identity-based key-agreement |
|
Apr-2013 | U.S. Patent No. 8,422,681. Washington, DC: U.S. Patent and Trademark Office. | collaborative |
doc-2223b | external conference | TAF: A Trust Assessment Framework for Inferencing with Uncertain Streaming Information |
|
Mar-2013 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 | international |
doc-2309 | external conference | Memory Trace Oblivious Program Execution Winner of the 2014 NSA Best Scientific Cybersecurity Paper competition |
|
Mar-2013 | Computer Security Foundations Symposium (CSF), 2013 IEEE 26th (pp. 51-65). IEEE | collaborative |
doc-2310 | external conference | Knowledge Inference for Optimizing Secure Multi-party Computation |
|
Mar-2013 | Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security (pp. 3-14). ACM | single institute |
doc-2325 | journal | Constructing Limited Scale-Free Topologies Over Peer-to-Peer Networks |
|
Mar-2013 | IEEE Trans. Parallel and Distributed Systems | single institute |
doc-2358 | journal | Is Information-Centric Multi-Tree Routing Feasible? |
|
Mar-2013 | ACM SIGCOMM Computer Communication Review (Vol. 43, No. 4, pp. 3-8). ACM | collaborative |
doc-x0408 | external conference | Autonomous configuration of spatially aware sensor services in service oriented WSNs |
|
Mar-2013 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2013 | international |
doc-1900 | journal | Dynamic Enforcement of Knowledge-based Security Policies Variants: doc-1668b |
|
Feb-2013 | JCS | collaborative |
doc-2251 | external conference | Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption |
|
Feb-2013 | Public-Key Cryptography-PKC 2013 (pp. 14-31). Springer Berlin Heidelberg | collaborative |
doc-2274 | tech report | User-defined extensions to CE |
|
Feb-2013 | single institute | |
doc-2279 | external conference | Relaxing Independence Assumptions in Probabilistic Argumentation |
|
Feb-2013 | Proceedings of ArgMAS, 2013 | single institute |
doc-2286 | book chapter | Physical-Layer Secrecy in Large Multi-Hop Wireless Networks |
|
Feb-2013 | Physical-Layer Security in Wireless Communications | single institute |
doc-2296 | poster | Balancing Behavioral Privacy and Information Utility in Sensor Data Flows |
|
Feb-2013 | 2013 Information Theory and Applications Workshop | single institute |
doc-2297 | external conference | A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems |
|
Feb-2013 | Proceedings of the 14th Workshop on Mobile Computing Systems and Applications (p. 11). ACM | collaborative |
doc-1682 | journal | Impact of In-Network Aggregation on Target Tracking Quality Under Network Delays Variants: doc-1749 |
|
Jan-2013 | Selected Areas in Communications, IEEE Journal on 31.4 (2013): 808-818. | collaborative with government |
doc-2131 | external conference | A Framework for Managing the Selection of Spatiotemporally Relevant Information Providers |
|
2013 | Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 403-410). IEEE | international |
doc-2271 | tech report | A New CE-based Lexical Model v3.3 |
|
Jan-2013 | international | |
doc-2272 | tech report | Lexical Model v3.3 (slides) |
|
Jan-2013 | single institute | |
doc-2281 | external conference | Algebraic (Trapdoor) One Way Functions and their Applications |
|
Jan-2013 | Theory of Cryptography (pp. 680-699). Springer Berlin Heidelberg | collaborative |
doc-2284 | journal | Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes |
|
Jan-2013 | IEEE Wireless Communicatoin Letters | single institute |
doc-2295 | journal | The discrimination power of structural superindices |
|
2013 | PloS one 8.7 (2013): e70551. | collaborative |
doc-2322 | tech report | Modelling network overlay expansion |
|
2013 | international | |
doc-2333 | tech report | Context-dependent Trust Decisions with Subjective Logic |
|
2013 | Uncertainty in Artificial Intelligence | collaborative |
doc-2496 | journal | Inference Management, Trust and Obfuscation Principles for Quality of Information in Emerging Pervasive Environments |
|
2013 | Pervasive and Mobile Computing (Vol. 11, pp. 168-187, 2014) | international |
doc-x0029 | journal | Knowledge Management for Coalition Information Sharing at the Network Edge |
|
2013 | IEEE intelligent systems, 28(1), 26-33 | international with government |
doc-x0332 | journal | A non-convex distributed optimization framework and its application to wireless ad-hoc networks |
|
2013 | Wireless Communications, IEEE Transactions on, 12(9), 4286-4296. | single institute |
doc-x0355 | book chapter | Advances in network complexity |
|
2013 | John WileySons | international |
doc-x0404 | patent | Automated data source assurance in distributed databases |
|
2013 | U.S. Patent No. 8,458,208. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0406 | patent | Automated propagation of non-conflicting queries in distributed databases |
|
2013 | U.S. Patent No. 8,560,570. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0416 | patent | Bounded-budget monitor deployment in monitoring networks via end-to-end probes |
|
2013 | U.S. Patent Application No. 13/952,225. | international |
doc-x0429 | patent | Characterizing and selecting providers of relevant information based on quality of information metrics |
|
2013 | U.S. Patent No. 8,589,389. Washington, DC: U.S. Patent and Trademark Office. | international |
doc-x0460 | journal | Cooperative sensor anomaly detection using global information |
|
2013 | Tsinghua Science and Technology, 18(3), 209-219. | collaborative |
doc-x0507 | patent | Dynamic context definitions in distributed databases |
|
2013 | U.S. Patent No. 8,458,166. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0535 | journal | Evaluating temporal robustness of mobile networks |
|
2013 | Mobile Computing, IEEE Transactions on, 12(1), 105-117. | international |
doc-x0628 | external conference | Interest propagation in named data MANETs |
|
Jan-2013 | Computing, Networking and Communications (ICNC), 2013 International Conference on (pp. 1118-1122). IEEE | collaborative |
doc-x0660 | patent | Management of logical statements in a distributed database environment |
|
2013 | U.S. Patent No. 8,478,803. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0673 | patent | Method and system for providing operator guidance in network and systems management |
|
2013 | U.S. Patent No. 8,370,466. Washington, DC: U.S. Patent and Trademark Office. | international |
doc-x0725 | external conference | Oblivious Group Storage |
|
2013 | Conference on Computer and Communications Security-CCS (pp. 247-258). | collaborative |
doc-x0781 | journal | Privacy-Preserving Information Brokering in Distributed Information Sharing.(2013) |
|
2013 | IEEE Transactions on Information Forensics and Security, 8(6), 888-900. | collaborative |
doc-x0845 | journal | Robust dynamic service composition in sensor networks |
|
2013 | Services Computing, IEEE Transactions on, 6(4), 560-572 | collaborative |
doc-x0855 | patent | Secret-key exchange for wireless and sensor networks |
|
2013 | U.S. Patent No. 8,522,029. Washington, DC: U.S. Patent and Trademark Office. | collaborative |
doc-x0900 | journal | Stereotypical trust and bias in dynamic multiagent systems |
|
2013 | ACM Transactions on Intelligent Systems and Technology (TIST) | international |
doc-x0901 | journal | Stochastic optimal control for a general class of dynamic resource allocation problems |
|
2013 | ACM SIGMETRICS Performance Evaluation Review | collaborative |
doc-x0973 | journal | Understanding processing overheads of network coding-based content distribution in VANETs |
|
2013 | Parallel and Distributed Systems, IEEE Transactions on, 24(11), 2304-2318 | collaborative |
doc-x0976 | external conference | Understanding the Cognitive Impact of Emerging Web Technologies: A Research Focus Area for Embodied, Extended and Distributed Approaches to Cognition |
|
2013 | 1st International Web for Wellbeing & Human Performance Workshop, Paris, France | single institute |
doc-x1051 | patent | Persistent querying in a federated database system |
|
2013 | U.S. Patent No. 8,386,515. Washington, DC: U.S. Patent and Trademark Office | single institute |
doc-x2004 | journal | Predicate encryption supporting disjunctions, polynomial equations, and inner products Variants: doc-x0779 |
|
2013 | Journal of cryptology, 26(2), 191-224. | collaborative |
doc-2273 | tech report | Fact Extraction and Reasoning using Controlled Natural Language - BPP proposal |
|
Dec-2012 | international | |
doc-2182 | journal | Signal-Flow-Based Analysis of Wireless Security Protocols |
|
Nov-2012 | Information and Computation: Special Issue on Information Security as a Resource | international |
doc-2224 | external conference | Towards Argumentation with Symbolic Dempster-Shafer Evidence |
|
Nov-2012 | Computational Models of Argument: Proceedings of COMMA 2012, 245, 462 | collaborative |
doc-2227 | invited talk | On Social Networks as Side Channels |
|
Nov-2012 | single institute | |
doc-2229 | external conference | RDFS Reasoning on Massively Parallel Hardware |
|
Nov-2012 | International Semantic Web Conference (ISWC), 2012 | collaborative |
doc-2235 | tech report | Hypothesis Support in Information Extraction |
|
Nov-2012 | ITACS | single institute |
doc-2249 | journal | Limits of Reliable Communication with Low Probability of Detection on AWGN Channels |
|
Nov-2012 | IEEE Journal on Selected Areas in Communications: Special Issue on Signal Processing Techniques for Wireless Physical Layer Security | single institute |
doc-2254 | invited talk | In Sensors We Trust: Balancing Risk and Value in Pervasive Sensing |
|
Nov-2012 | single institute | |
doc-2255 | external conference | Probabilistic Computation for Information Security |
|
Nov-2012 | NIPS Workshop on Probabilistic Programming | collaborative |
doc-2001 | journal | Collective Sensemaking and Military Coalitions |
|
Oct-2012 | IEEE Intelligent Systems | international |
doc-2028c | external conference | Multi-Client Non-Interactive Verifiable Computation Variants: doc-2028a |
|
Oct-2012 | Theory of Cryptography (pp. 499-518). Springer Berlin Heidelberg | international |
doc-2191 | external conference | Distributed State Machines: A Declarative Framework for the Management of Distributed Systems |
|
Oct-2012 | IEEE International Conference on Network and Service Management (CNSM), 2012 | single institute |
doc-2248 | journal | Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts Variants: doc-1941 |
|
Oct-2012 | Public Key Cryptography-PKC 2012. Springer Berlin Heidelberg, 2012. 225-242. | single institute |
doc-x0760 | patent | Performing value and context aware communications networking |
|
Oct-2012 | U.S. Patent Application No. 13/651,951. | single institute |
doc-1816 | internal conference | On the Selection of Spatiotemporally Relevant Providers of Sensory Information |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-1849c | internal conference | A System Architecture for Exploiting Mission Information Requirement and Resource Allocation Variants: doc-1849a |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-1855c | internal conference | Tasking and Sharing Sensing Assets Using Controlled Natural Language Variants: doc-1855a |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-1903 | internal conference | Square Root Law for Communication with Low Probability of Detection on AWGN Channels Variants: doc-1930 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-1999 | internal conference | A Constraint Satisfaction Model of Collective Sensemaking: Insights into the Effect of Coalition Communication Environments on the Dynamics of Collective Cognition |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2011 | internal conference | Optimal link state sampling for improved network decision making with incomplete knowledge |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2013 | internal conference | Evolution of the Preferential Attachment Topology of the Gaian Database |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2014 | internal conference | Query Propagation Behaviour in Gaian Database Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2015a | internal conference | Query Execution and Maintenance Costs in a Dynamic Distributed Federated Database |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2016 | internal conference | A Model of Query Performance in Dynamic Distributed Federated Databases Taking Account of Network Topology |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2017 | internal conference | HyperD: Analysis and Performance Evaluation of a Distributed Hypercube Database |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2021 | internal conference | On the Selection of Spatiotemporally Relevant Sensory Providers |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2022 | internal conference | Balancing Value and Risk In Information Sharing Through Obfuscation Variants: doc-1954 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2023 | internal conference | Inference Management: Trust and Obfuscation in Coalition Settings Variants: doc-x0617 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2024 | internal conference | Trust Assessment when Observing and Orienting with Uncertain, Multi-source Streaming Information |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2025 | internal conference | Localization In The Presence of Spatially Obfuscated Sensor Reports |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2028a | internal conference | Multi-User Non-Interactive Verifiable Computation Variants: doc-2028c |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2031 | internal conference | Combining Subjective Logic with DL-Lite |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2035 | internal conference | Controlled Natural Language to facilitate information extraction |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2039 | internal conference | Towards Presenting Relevant Facts and Answers on Inconsistent and Uncertain Knowledge |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2041 | internal conference | Querying Linked Ontological Data through Distributed Summarization Variants: doc-1895 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2046 | internal conference | Safe Query Processing for Pairwise Authorizations in Coalition Networks Variants: doc-2137 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2051 | internal conference | An Analysis Framework for Declarative Distributed Computing Applications Variants: doc-1921 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2052 | internal conference | A Declarative Framework for the Analysis of Routing Protocols Variants: doc-x0309 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2053 | internal conference | Endhost-Based Shortest Path Routing in Dynamic Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2057a | internal conference | Multicast under constraints in coalition and command-and-control networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2059 | internal conference | A fluid model study of multipath communication in a hybrid network for a moving convoy Variants: doc-x0314 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2060 | internal conference | Sampling Schedules for Minimum Latency Routing on a Dynamic Network with Imperfect Link State |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2062 | internal conference | Measuring cellular networks: characterizing 3G, 4G, and path diversity |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2064 | internal conference | Network Coding for Facilitating Secrecy in Large Wireless Networks Variants: doc-x0716 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2065 | internal conference | Capacity of Hybrid Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2069 | internal conference | Topological Constraints on Identifying Additive Link metrics via end-to-end path measurements |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2094a | internal conference | Calculation of the Center-of-Data in a Hypercube |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2103 | internal conference | Opportunistic Scheduling in Hybrid Network Environments with Time Scale Differences |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2104 | internal conference | Resource Allocation and Scheduling in Multi-hop Hybrid Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2113a | internal conference | Extending the Kerberos Protocol for Distributed Data as a Service |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2128 | internal conference | The Existence of Trusted Paths in Hybrid Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2129 | internal conference | A Comparative Study on Trusted Path Discovery in Two Algorithms |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2130 | internal conference | Knowledge-based Sensor Security |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2132 | internal conference | High-Level Sharing Policies and their Effect on Sensor-Task Assignment |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2133a | internal conference | Towards an Expression of Policy in Controlled English |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2137 | internal conference | Safe query processing for pairwise authorizations in coalition networks Variants: doc-2046 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2138 | internal conference | Distributed Query Planning in Coalition Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2141a | internal conference | Building Efficient Limited Scale-Free Overlay Topologies for Unstructured P2P Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2144a | internal conference | Dynamic Multipath Routing of Multi-Priority Traffic in Wireless Sensor Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2146 | internal conference | Trust-based Dynamic Service Composition in Tactical Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2147a | internal conference | Utilizing PCFGs for Modeling and Learning Service Compositions in Sensor Networks Variants: doc-2007 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2153a | internal conference | CoPing: Cooperative Probing of Path Performance for Gateway Selection in Hybrid Wireless Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2168 | internal conference | Trust decision-making with controls |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2171 | internal conference | Diagnosing Large-Scale Failures in Computer Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-2173 | internal conference | Temporal Subjective Logic |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2174 | internal conference | Sub-delegation and Trust Variants: doc-1861 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-2175 | internal conference | Towards a System for Managing Inferences with Distributed, Uncertain and Obfuscated Information |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2180 | internal conference | Connectivity of Coalition Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2184 | internal conference | Exploring Controlled English for representing knowledge in the Linguistic Knowledge Builder |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2186 | internal conference | Documenting Provenance with a Controlled Natural Language |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2192 | internal conference | A brief exploratory overview of a hierarchically labelled geo-located network of nodes |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2195 | internal conference | Optimizing Control Overhead for Power-aware Routing in Wireless Networks Variants: doc-x0753 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2196 | internal conference | Minimum Control Overhead for Power-aware Routing in Wireless Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2232 | external conference | Gateway Selection in Hybrid Wireless Networks through Cooperative Probing |
|
Sep-2012 | Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 352-360). IEEE | collaborative |
doc-2238 | internal conference | Fault Localization in MANET-Hosted Service-Based Systems Variants: doc-2018 |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2262 | software | ISTAR Ontology - Controlled English Knowledge Base |
|
Sep-2012 | single institute | |
doc-x0322 | internal conference | A Joint Rate and FEC Adaptation Approach to Enable High Speed Broadcast in IEEE 802.11 Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | single institute |
doc-x0445 | internal conference | Content Dissemination Protocols in Hybrid Wireless Networks |
|
Sep-2012 | 6th Annual Conference of the International Technology Alliance | collaborative |
doc-x0992 | external conference | Utility-proportional fairness in wireless networks Best paper award |
|
Sep-2012 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2012 | single institute |
doc-1901 | external conference | Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel |
|
Aug-2012 | Proceedings of the 2012 ACM conference on Computer and communications security (pp. 628-637). ACM | collaborative |
doc-2040 | external conference | Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications |
|
Aug-2012 | Proceedings of the 2012 ACM conference on Computer and communications security (pp. 501-512). ACM | collaborative |
doc-2089 | tech report | Characterizing 4G and 3G Networks: Supporting Mobility with Multi-Path TCP |
|
Aug-2012 | Co-Next 2012 | international |
doc-2109 | invited talk | On the Quality of Information for Sensor-Enabled Systems and Solutions |
|
Aug-2012 | international | |
doc-2118 | external conference | History-Free Sequential Aggregate Signatures |
|
Aug-2012 | Security and Cryptography for Networks (pp. 113-130). Springer Berlin Heidelberg | collaborative |
doc-2119 | external conference | Verifiable Data Streaming |
|
Aug-2012 | Proceedings of the 2012 ACM conference on Computer and communications security (pp. 953-964). ACM | collaborative |
doc-2120 | tech report | Identities and Names in CE |
|
Aug-2012 | ITACS | single institute |
doc-2121 | tech report | Summary of Communications processing |
|
Aug-2012 | ITACS | single institute |
doc-2123 | tech report | Linguistic Notes for the ACITA 2012 Fact Extraction demonstration |
|
Aug-2012 | ITACS | single institute |
doc-2127 | tech report | The potential for Fact Extraction Improvements |
|
Aug-2012 | ITACS | international |
doc-2135 | tech report | Policy-driven Service Composition and Data Sharing in a Coalition Scenario with Trust and Obfuscation |
|
Aug-2012 | international | |
doc-2140 | poster | Distributed Sensor Service Composition with Spatial Constraints with Spatial Constraints |
|
Aug-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-2143a | external conference | WiFi Access Point Deployment for Efficient Mobile Data Offloading |
|
Aug-2012 | Annual International Conference on Mobile Computing and Networking, 2012 | single institute |
doc-2170 | journal | A Hybrid Reasoning Mechanism for Effective Sensor Selection for Tasks |
|
Aug-2012 | Engineering Applications of Artificial Intelligence 26.2 (2013): 873-887. | single institute with government |
doc-2176 | journal | Towards Practical ABox Abduction in Large Description Logic Ontologies |
|
Aug-2012 | International Journal of Semantic Web and Information Systems | collaborative |
doc-2181 | journal | Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks |
|
Aug-2012 | IEEE Transactions on Wireless Communications | international |
doc-2183 | journal | Broadcast Analysis for Extended Cooperative Wireless Networks |
|
Aug-2012 | IEEE Transactions on Information Theory | single institute |
doc-2187 | demo | Semantic Enrichment for Real-time Data-to-Decisions |
|
Aug-2012 | international | |
doc-2188 | demo | Demo: Tasking and Sharing Sensing Assets Using Controlled Natural Language Variants: doc-1855a |
|
Aug-2012 | collaborative | |
doc-2189 | demo | Using Controlled English for Fact Extraction |
|
Aug-2012 | international | |
doc-2190 | workshop | Controlled English - a practical introduction |
|
Aug-2012 | 6th Annual Conference of the International Technology Alliance | international |
doc-1927 | external conference | Subjective Logic with Uncertain Partial Observations |
|
Jul-2012 | 15th International Conference on Information FUSION | collaborative with government |
doc-1930 | external conference | Square Root Law for Communication with Low Probability of Detection on AWGN Channels Variants: doc-1903 |
|
Jul-2012 | Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on (pp. 448-452). IEEE | single institute |
doc-1952a | external conference | Integrating Hard and Soft Information Sources for D2D Using Controlled Natural Language |
|
Jul-2012 | 15th International Conference on Information FUSION | international with government |
doc-1954 | external conference | Balancing Value and Risk In Information Sharing Through Obfuscation Variants: doc-2022 |
|
Jul-2012 | 15th International Conference on Information FUSION | collaborative with government |
doc-2139 | journal | Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing |
|
Jul-2012 | Information Forensics and Security, IEEE Transactions on 8.6 (2013): 888-900. | collaborative |
doc-x0794 | patent | Quality of information assessment in dynamic sensor networks |
|
Jul-2012 | U.S. Patent Application 13/552,264 | single institute |
doc-1857 | external conference | A cognitive architecture for emergency response |
|
Jun-2012 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012 | collaborative |
doc-1861 | external conference | Sub-delegation and Trust Variants: doc-2174 |
|
Jun-2012 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012 | single institute |
doc-1926 | external conference | Information Extraction using Controlled English to support Knowledge-Sharing and Decision-Making |
|
Jun-2012 | International Command and Control Research Technology Symposium (ICCRTS), 2012 | international with government |
doc-1997 | external conference | Convergecast with Aggregatable Data Classes |
|
Jun-2012 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 | collaborative |
doc-2003 | external conference | Knowledge-Oriented Secure Multiparty Computation Variants: doc-1750 |
|
Jun-2012 | Proceedings of the 7th Workshop on Programming Languages and Analysis for Security (p. 2). ACM | collaborative |
doc-2030 | journal | Market Mechanisms for Resource Allocation in Pervasive Sensor Applications |
|
Jun-2012 | Pervasive and Mobile Computing | collaborative |
doc-2066 | tech report | Representing Typed feature Structures in Controlled English |
|
Jun-2012 | ITACS | single institute |
doc-2071 | tech report | Slidesets on Controlled English |
|
Jun-2012 | international | |
doc-2122 | tech report | ACITA Fact Extraction Demonstration Outline |
|
Jun-2012 | single institute | |
doc-2177 | external conference | QoI-Aware Energy Management in Internet-of-Things Sensory Environments |
|
Jun-2012 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 | international |
doc-849 | external conference | Fine-grained access control of personal data |
|
Jun-2012 | In Proceedings of the 17th ACM symposium on Access Control Models and Technologies (pp. 145-156). ACM. | collaborative |
doc-x0044 | external conference | Data, Information and Knowledge Collaboration, Shared Awareness, and Decision Making |
|
Jun-2012 | International Command and Control Research Technology Symposium (ICCRTS), 2012 | international with government |
doc-x0484 | external conference | Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory Information |
|
Jun-2012 | Sharing Personal Sensory Information. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1004-1011). IEEE | single institute |
doc-x0892 | external conference | Solving non-zero sum multiagent network flow security games with attack costs |
|
Jun-2012 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012 | single institute |
doc-1842 | external conference | Using Subjective Logic to Handle Uncertainty and Conflicts |
|
May-2012 | Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1323-1326). IEEE | international |
doc-1880 | journal | The Web-Extended Mind |
|
May-2012 | Metaphilosophy Journal | single institute |
doc-1892 | phd thesis | Incremental Activity and Plan Recognition for Human Teams |
|
May-2012 | single institute | |
doc-1895 | external conference | Querying Linked Ontological Data through Distributed Summarization Variants: doc-1896 |
|
May-2012 | AAAI 2012 | international |
doc-1897 | external conference | Resource Allocation with Stochastic Demands |
|
May-2012 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2012 | collaborative |
doc-1928 | external conference | An Obfuscation Framework for Controlling Value of Information During Sharing |
|
May-2012 | Statistical Signal Processing Workshop (SSP), 2012 IEEE (pp. 157-160). IEEE | collaborative with government |
doc-1941 | external conference | Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts Variants: doc-2248 |
|
May-2012 | Public Key Cryptography-PKC 2012 (pp. 225-242). Springer Berlin Heidelberg | single institute |
doc-1959 | external conference | A Computational Model of Collective Sensemaking: Differential Effects of Communication Network Structure on Collective Sensemaking Abilities |
|
May-2012 | 1th International Conference on Cognitive Modeling (ICCM 12), Berlin, Germany, 13 - 15 Apr 2012. 2pp | single institute |
doc-1996 | journal | Energy-Efficient Location Services for Mobile Ad Hoc Networks |
|
May-2012 | Ad Hoc Networks 11.1 (2013): 273-287. | single institute |
doc-1998 | external conference | Studying the Impact of Minority Views in a Computational Model of Collective Sensemaking: The Role of Network Structure |
|
May-2012 | 4th International Conference on Advanced Cognitive Technologies and Applications (COGNITIVE'12), Nice, France, 22 - 27 Jul 2012. 8pp. | single institute |
doc-2005 | tech report | A Data-to-Decision Information Processing Platform for Coalition Operations |
|
May-2012 | Was originally submitted to IEEE Intelligent Systems but not accepted | international |
doc-2006 | journal | Agilely Assigning Sensing Assets to Mission Tasks in a Coalition Context |
|
May-2012 | IEEE Intelligent Systems | international with government |
doc-2007 | external conference | Utilizing PCFGs for Modeling and Learning Service Compositions in Sensor Networks Variants: doc-2147a |
|
May-2012 | Services Computing (SCC), 2012 IEEE Ninth International Conference on (pp. 282-289). IEEE | single institute |
doc-2032 | external conference | Policy-aware Service Composition in Sensor Networks |
|
May-2012 | Services Computing (SCC), 2012 IEEE Ninth International Conference on (pp. 186-193). IEEE | collaborative |
doc-2034 | software | ISTAR / CE integration details |
|
May-2012 | collaborative | |
doc-2048 | tech report | Exploitation of Distributed, Uncertain and Obfuscated Information |
|
May-2012 | international | |
doc-2055 | external conference | Connectivity in Random Hybrid Networks |
|
May-2012 | NetSci | collaborative |
doc-2056 | tech report | Routing in hybrid networks with security-aware costs |
|
May-2012 | single institute | |
doc-2058 | journal | Efficient Algorithms for Neighbor Discovery in Wireless Networks |
|
May-2012 | to appear IEEE/ACM Transactions on Networking | collaborative |
doc-x0046 | external conference | Networking & Interoperability of Disparate Coalition Assets - A Coalition Warfare Program (CWP) Project |
|
May-2012 | NATO IST-112 & SET-183 Joint Symposium on Persistent Surveillance: Networks, Sensors, Architecture, Quebec City, Canada, May 2012. | international with government |
doc-x0047 | external conference | Coalition Warfare Program (CWP) Project on Policy Controlled Information Query & Dissemination |
|
May-2012 | NATO IST-112 & SET-183 Joint Symposium on Persistent Surveillance: Networks, Sensors, Architecture, Quebec City, Canada, May 2012. | international with government |
doc-1849a | external conference | A System Architecture for Exploiting Mission Information Requirement and Resource Allocation Variants: doc-1849c |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | international |
doc-1855a | external conference | Tasking and Sharing Sensing Assets Using Controlled Natural Language Variants: doc-1855c |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | collaborative |
doc-1990 | tech report | Using Controlled English to express lambda expressions |
|
Apr-2012 | ITA | single institute |
doc-2018 | external conference | Fault Localization in MANET-Hosted Service-Based Systems Variants: doc-2238 |
|
Apr-2012 | Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on (pp. 243-248). IEEE | international |
doc-2043 | external conference | Trust and Obfuscation Variants: doc-1678 |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | international with government |
doc-2047 | external conference | An architecture for distributed video applications based on declarative networking |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | single institute |
doc-2244 | external conference | Context-rich Semantic Framework for Effective Data-to-Decisions in Coalition Networks |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | international with government |
doc-2328 | external conference | Diagnosing Degradation of Services in Hybrid Wireless Tactical Networks |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | international with government |
doc-x0045 | external conference | Intent-based resource deployment in wireless sensor networks |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | international with government |
doc-x0074 | external conference | ITA/CWP and ICB technology demonstrator: a practical integration of disparate ISR/ISTAR assets and technologies |
|
Apr-2012 | International Society for Optics and Photonics - Defense, Security and Sensing, 2012 | single institute |
doc-x0668 | external conference | MECA: Mobile Edge Capture and Analysis Middleware for Social Sensing Applications |
|
Apr-2012 | Proceedings of the 21st international conference companion on World Wide Web (pp. 699-702). ACM | single institute |
doc-1685 | external conference | Secret Communication in Large Wireless Networks without Eavesdropper Location Information |
|
Mar-2012 | IEEE International Conference on Computer Communications (InfoCom), 2012 | single institute |
doc-1773 | external conference | Impact of Directional Transmission in Large-scale Multi-hop Wireless Ad hoc Networks |
|
Mar-2012 | IEEE International Conference on Computer Communications (InfoCom), 2012 | international |
doc-1778 | external conference | On the Relationship Between Functional Encryption and Fully Homomorphic Encryption |
|
Mar-2012 | Cryptography and Coding, pp.65-84, 2013/1/1 | collaborative |
doc-1835 | external conference | Trust and Obfuscation Principles for Quality of Information in Emerging Pervasive Environments |
|
Mar-2012 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 | international |
doc-1858 | external conference | Fusion of Classifiers: A Subjective Logic Perspective |
|
Mar-2012 | Aerospace Conference, 2012 IEEE (pp. 1-13). IEEE | collaborative with government |
doc-1862 | external conference | Predictive Indoor Navigation using Commercial Smart-phones |
|
Mar-2012 | Proceedings of the 28th Annual ACM Symposium on Applied Computing (pp. 519-525). ACM | collaborative |
doc-1872 | external conference | Physical Layer Security from Inter-Session Interference in Large Wireless Networks |
|
Mar-2012 | IEEE International Conference on Computer Communications (InfoCom), 2012 | single institute |
doc-1910 | journal | Entropy and the Complexity of graphs revisited |
|
Mar-2012 | Entropy 2012, 14(3), 559-570 | collaborative |
doc-1924 | external conference | A Markov Chain Model for Coarse Timescale Channel Variation in an 802.16e Wireless Network |
|
Mar-2012 | IEEE International Conference on Computer Communications (InfoCom), 2012 | collaborative |
doc-1925 | external conference | A Mixed Queueing Network Model of Mobility in a Campus Wireless Network |
|
Mar-2012 | IEEE International Conference on Computer Communications (InfoCom), 2012 | single institute |
doc-1934 | external conference | Transient Traffic Congestion Control with Traveling Auctions |
|
Mar-2012 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2012 | single institute |
doc-1936 | external conference | On Growth of Limited Scale-Free Overlay Network Topologies |
|
Mar-2012 | IEEE International Conference on Computer Communications (InfoCom), 2012 | single institute |
doc-2029 | journal | Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks |
|
Mar-2012 | IEEE Trans. Parallel and Distributed Systemes | single institute |
doc-x0075 | journal | Utility-based Bandwidth Adaptation in Mission-Oriented Wireless Sensor Networks |
|
Mar-2012 | ACM Transactions on Sensor Networks, vol. 8, no. 2, New York, NY, USA, 03-Mar-2012. | international |
doc-x0716 | external conference | Network coding for facilitating secrecy in large wireless networks Variants: doc-2064 |
|
Mar-2012 | Information Sciences and Systems (CISS), 2012 46th Annual Conference on (pp. 1-6). IEEE. | single institute |
doc-1836 | journal | Learning Strategies for Task Delegation in Norm-Governed Environments |
|
Feb-2012 | JAAMAS | international |
doc-1873 | journal | On the Application of Cooperative Transmission to Secrecy Communications |
|
Feb-2012 | IEEE Journal on Selected Areas in Communications: Special Issue on Cooperative Networking: Challenges and Applications | international |
doc-1881 | external conference | Modelling the Dynamics of Team Sensemaking: A Constraint Satisfaction Approach |
|
Feb-2012 | Knowledge Systems for Coalition Operations (KSCO), 2012 | single institute |
doc-1890 | journal | On the Quality and Value of Information in Sensor Networks Variants: doc-1542 |
|
Feb-2012 | ACM Transactions on Sensor Networks (TOSN) 9.4 (2013): 48. | collaborative with government |
doc-1896 | tech report | Querying Linked Ontological Data through Distributed Summarization Variants: doc-1896,doc-2041 |
|
Feb-2012 | international | |
doc-1902 | external conference | Adaptive algorithms for diagnosing large-scale failures in computer networks Variants: doc-2639 |
|
Feb-2012 | Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on (pp. 1-12). IEEE | collaborative with government |
doc-1907 | tech report | Ambiguous words |
|
Feb-2012 | ITA | single institute |
doc-1908 | journal | Enforcing Secure and Privacy-Preserving Information Brokering |
|
Feb-2012 | Information Forensics and Security, IEEE Transactions on 8.6 (2013): 888-900. | collaborative |
doc-1909 | tech report | The Prolog Analyst's Helper |
|
Feb-2012 | ITA | single institute |
doc-1913 | tech report | Fact Extraction using CNL: summary of reasoning |
|
Feb-2012 | ITA | international |
doc-1921 | book chapter | Declarative Distributed Computing Variants: doc-2051 |
|
Feb-2012 | correct reasoning | international |
doc-1923 | journal | On Managing Quality of Experience of Multiple Video Streams in Wireless Networks |
|
Feb-2012 | Mobile Computing, IEEE Transactions on, 14(3), 619-631 | collaborative |
doc-1929 | external conference | Foundations of Logic-Based Trust Management |
|
Feb-2012 | Security and Privacy (SP), 2012 IEEE Symposium on (pp. 161-175). IEEE | collaborative |
doc-1931 | tech report | Flexible configuration of information extraction to support richer propositional constructs |
|
Feb-2012 | ITA | international |
doc-1933 | tech report | Survey on clustering methods for ontological knowledge |
|
Feb-2012 | international | |
doc-1939 | external conference | Optimal Sampling Strategies for Minimum Latency Routing with Imperfect Link State |
|
Feb-2012 | Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2012 10th International Symposium on (pp. 81-88). IEEE | international |
doc-x0028 | external conference | Lessons Learned from an Evaluation of a Shared Representation to Support Collaborative Planning |
|
Feb-2012 | Knowledge Systems for Coalition Operations (KSCO), 2012 | international with government |
doc-x0048 | external conference | Data and Information Sharing for Coalition Operations |
|
Feb-2012 | Knowledge Systems for Coalition Operations (KSCO), 2012 | single institute with government |
doc-x0372 | external conference | An Interoperable Framework for Distributed Coalition Planning: The Collaborative Planning Model |
|
Feb-2012 | Knowledge Systems for Coalition Operations (KSCO), 2012 | collaborative with government |
doc-x0817 | external conference | Recognizing team context during simulated missions |
|
Feb-2012 | Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (pp. 197-206). ACM | single institute |
doc-x0914 | patent | System and method for utility sampling for trust metrics in PKI |
|
Feb-2012 | U.S. Patent No. 8,116,450 | single institute |
doc-1238 | journal | Aggregate Message Authentication Codes |
|
Jan-2012 | Topics in Cryptology-CT-RSA 2008. Springer Berlin Heidelberg, 2008. 155-169. | collaborative |
doc-1809 | external conference | Percolation Phenomena in Networks under Random Dynamics |
|
Jan-2012 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2012 | collaborative with government |
doc-2242 | journal | Prognostic Normative Reasoning |
|
2012 | Engineering Applications of Artificial Intelligence | international |
doc-2304 | external conference | Opportunism vs. Cooperation: Comparing Forwarding Strategies in Multihop Wireless Networks with Random Fading Variants: doc-1748a |
|
Jan-2012 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2012 | international |
doc-x0215 | journal | More is more: The benefits of dense sensor deployment. Variants: doc-x1031 |
|
2012 | ACM Transactions on Sensor Networks (TOSN) 8, no. 3 (2012): 22 | collaborative |
doc-x0221 | journal | Secure incentives for commercial ad dissemination in vehicular networks Variants: doc-x0174 |
|
2012 | Vehicular Technology, IEEE Transactions on, 61(6), 2715-2728 | collaborative |
doc-x0309 | external conference | A Declarative Framework for the Analysis of Routing Protocols Variants: doc-2052 |
|
2012 | ICNP2012 | international |
doc-x0347 | journal | Adaptive in-network processing for bandwidth and energy constrained mission-oriented multihop wireless networks |
|
2012 | Mobile Computing, IEEE Transactions on, 11(9), 1484-1498. | collaborative |
doc-x0365 | phd thesis | Allocating Virtual and Physical Flows for Multiagent Teams in Mutable, Networked Environments |
|
2012 | (No. CMU-CS-12-129). CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE. | single institute |
doc-x0385 | external conference | Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model |
|
2012 | Public Key Cryptography-PKC 2012 (pp. 206-224). Springer Berlin Heidelberg. | collaborative |
doc-x0403 | patent | Automated data conversion and route tracking in distributed databases |
|
2012 | U.S. Patent No. 8,301,583. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0448 | journal | Control-theoretic utility maximization in multihop wireless networks under mission dynamics |
|
2012 | IEEE/ACM Transactions on Networking (TON), 20(4), 1082-1095 | collaborative |
doc-x0480 | external conference | Delegatable homomorphic encryption with applications to secure outsourcing of computation |
|
2012 | Topics in Cryptology-CT-RSA 2012 (pp. 296-312). Springer Berlin Heidelberg | collaborative |
doc-x0492 | patent | Discovering network topology from routing information |
|
2012 | U.S. Patent No. 8,310,931. Washington, DC: U.S. Patent and Trademark Office | single institute |
doc-x0523 | patent | Enabling connections for use with a network |
|
2012 | U.S. Patent No. 8,250,140. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0525 | tech report | Endhost-Based Shortest Path Routing in Dynamic Networks: Supporting Materials |
|
2012 | IBM, Tech. Rep., 2012,�http://researcher.�ibm. com/files/usthe/rc071201. | collaborative |
doc-x0572 | external conference | Functional encryption for threshold functions (or fuzzy ibe) from lattices |
|
2012 | Public Key Cryptography-PKC 2012 (pp. 280-297). Springer Berlin Heidelberg. | international |
doc-x0609 | journal | Improving acoustic vehicle classification by information fusion |
|
2012 | Pattern Analysis and Applications, 15(1), 29-43 | international with government |
doc-x0617 | tech report | Inference Management: Trust and Obfuscation in Coalition Settings Variants: doc-2023 |
|
2012 | IBM THOMAS J WATSON RESEARCH CENTER HAWTHORNE NY | international |
doc-x0647 | journal | Limitations of generating a secret key using wireless fading under active adversary |
|
2012 | IEEE/ACM Transactions on Networking (TON), 20(5), 1440-1451 | single institute |
doc-x0653 | tech report | Localization in cognitive radio systems in the presence of spatially obfuscated data |
|
2012 | Technical Report TR-UCLA-NESL-201205-01, NESL | collaborative |
doc-x0669 | patent | Mechanism for content management in wireless mobile networks |
|
2012 | U.S. Patent No. 8,340,690. Washington, DC: U.S. Patent and Trademark Office. | collaborative |
doc-x0670 | patent | Method and apparatus for detection of malicious behavior in mobile ad-hoc networks |
|
2012 | U.S. Patent No. 8,122,505. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0674 | patent | Method and system for self-organizing computer systems |
|
2012 | U.S. Patent No. 8,140,651. Washington, DC: U.S. Patent and Trademark Office. | collaborative with government |
doc-x0711 | external conference | NaaS: Network-as-a-Service in the Cloud |
|
2012 | Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise | collaborative |
doc-x0814 | journal | Reasoning support for flexible task resourcing |
|
2012 | Expert Systems With Applications, 39(2), 1998-2010 | international |
doc-x0852 | patent | Saving bandwidth in transmission of compressed data |
|
2012 | U.S. Patent Application No. 13/679,487 | single institute |
doc-x1050 | patent | Optimising data transmission in a hypercube network |
|
2012 | U.S. Patent Application No. 14/237,403 | single institute |
doc-x0331 | external conference | A new distributed optimization framework for hybrid ad-hoc networks |
|
Dec-2011 | IEEE Global Communications Conference (GlobeCom), 2011 | single institute |
doc-1669 | external conference | On Quantitative Information Flow Metrics |
|
Nov-2011 | ACM CCS 2011 (short paper) | collaborative |
doc-1670a | software | CE Store - Alpha Version 2 (software) |
|
Nov-2011 | single institute | |
doc-1838 | external conference | On the benefit of ontological reasoning in collaborative problem-solving |
|
Nov-2011 | European Workshop on Multi-Agent Systems (EUMAS), 2011 | international |
doc-1840 | journal | OWL-POLAR: A Framework for Semantic Policy Representation and Reasoning |
|
Nov-2011 | JWS | international |
doc-1863 | external conference | BDI Reasoning with Normative Considerations |
|
Nov-2011 | Engineering Applications of Artificial Intelligence, 43, 127-146 | international |
doc-1864 | tech report | Logics and Methods to Deal with Conflicting Information |
|
Nov-2011 | international | |
doc-1874 | external conference | Learning Stochastic Models of Information Flow |
|
Nov-2011 | Data Engineering (ICDE), 2012 IEEE 28th International Conference on (pp. 570-581). IEEE | international |
doc-1875 | external conference | Risk-Based Security Decisions Under Uncertainty |
|
Nov-2011 | Proceedings of the second ACM conference on Data and Application Security and Privacy (pp. 157-168). ACM | international |
doc-1877 | external conference | Balancing Behavioral Privacy and Information Utility in Sensory Data Flows Variants: doc-2643 |
|
Nov-2011 | Pervasive and Mobile Computing, 8(3), 331-345 | single institute |
doc-x0016 | external conference | Switch-and-Navigate: Controlling Data Ferry Mobility for Delay-Bounded Messages |
|
Nov-2011 | IEEE Military Communications Conference, 2011 | international with government |
doc-x0612 | external conference | Improving WSN application QoS and network lifetime management using SOA strategies |
|
Nov-2011 | IEEE Military Communications Conference, 2011 | international |
doc-1668b | external conference | Dynamic Enforcement of Knowledge-based Security Policies Variants: doc-1900 |
|
Oct-2011 | Maryland CyberSecurity | collaborative |
doc-1742 | external conference | Self-Adaptive Routing in Multi-Hop Sensor Networks |
|
Oct-2011 | IEEE International Conference on Network and Service Management (CNSM), 2011 | international |
doc-1802 | external conference | Policy Refinement: Decomposition and Operationalization for Dynamic Domains Variants: doc-1801 |
|
Oct-2011 | IEEE International Conference on Network and Service Management (CNSM), 2011 | international |
doc-1839 | external conference | Probabilistic Abox Abduction in Description Logics Variants: doc-1677 |
|
Oct-2011 | 7th International Workshop on Scalable Semantic Web Knowledge Base Systems (SSWS'11) | international |
doc-1847 | external conference | Exploiting Local Knowledge for Multi Sensor-Task Allocation |
|
Oct-2011 | NATO SET-176 RSM Autonomous Sensing & Multi-Sensor Integration for ISR Applications | single institute |
doc-1870 | tech report | Provenance and Secure Information Flows: A Discussion Paper |
|
Oct-2011 | international | |
doc-x0049 | external conference | Autonomous UAV Persistent Surveillance using Bio-Inspired Strategies with Distributed Sensor Networks, the Sensor Network Fabric, Phenomenology Based Sensing and Optimal Sensor Placement |
|
Oct-2011 | NATO SET-176 RSM Symposium on Autonomous Sensing and Multi-Sensor Integration for ISR Applications, Cardiff, UK, Oct 2011 | international with government |
doc-x0509 | external conference | Dynamic graph properties of mobile networks under levy walk mobility |
|
Oct-2011 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2011 | collaborative |
doc-1672 | internal conference | Broadcast Scheduling with Data Bundles Variants: doc-x0419 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1677 | internal conference | Probabilistic Abox Abduction in Description Logics Variants: doc-1839 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1678 | internal conference | Trust and Obfuscation Variants: doc-2043 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1681 | internal conference | A generic agent architecture for norm-compliant planning assistance |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1683 | internal conference | Anytime Cognition: An information agent for emergency response |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | collaborative |
doc-1684 | internal conference | An experimental domain for data-to-decision |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1686 | internal conference | Cut Results for the Capacity of Hybrid Networks |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1722 | internal conference | Everlasting Secrecy in Two-Hop Wireless Networks Using Artificial Noise Generation from Relays |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1723 | internal conference | Two-Way Secrecy Schemes for the Broadcast Channel with Internal Eavesdroppers Variants: doc-1726 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1728 | internal conference | OWL-POLAR: Semantic Policies for Agent Reasoning Variants: doc-814a |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1732 | internal conference | Towards Securing Query Processing in Distributed Databases |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | collaborative |
doc-1735 | internal conference | Controlled language in support of automated information extraction (Demonstration) |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1737 | internal conference | Semantically Enriched Data for Effective Sensor Data Fusion Variants: doc-x0052 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1739 | internal conference | Integrative Use of Information Extraction, Semantic Matchmaking and Adaptive Coupling Techniques in Support of Distributed Information Processing and Decision-Making |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1743 | internal conference | Sensor Service Selection through Switch Options Variants: doc-x0879 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | collaborative |
doc-1746 | internal conference | Directional Forwarding in Multi-hop Wireless Ad hoc Networks: A Connectivity Study |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1747 | internal conference | A simple queueing network model of mobility in a campus wireless network |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | single institute |
doc-1748a | internal conference | Opportunism vs. Cooperation: Comparing Forwarding Strategies in Multihop Wireless Networks with Random Fading Variants: doc-2304 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1749 | internal conference | Impact of In-network Aggregation on Target Tracking Quality Variants: doc-1682 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | collaborative |
doc-1750 | internal conference | Knowledge-oriented Secure Multiparty Computation Variants: doc-2003 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | single institute |
doc-1754 | internal conference | Performance Diagnosis of Services in Scalable and Dynamic Networks |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | collaborative |
doc-1755 | internal conference | netSCI: A generic fault diagnosis algorithm for large scale failures |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1757 | internal conference | Exploiting Domain Knowledge in Collaborative Missions |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1759 | internal conference | Simulating MANET-Hosted Service-Based Systems |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1760 | internal conference | Discovering Service Dependencies in Mobile Ad Hoc Networks Variants: doc-1860 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1769 | internal conference | Computing joins on encrypted data |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1772 | internal conference | Cooperative Monitoring of Service Performance in Mobile Networks |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | collaborative |
doc-1779 | internal conference | Tracing Insider Attacks in the Context of Predicate Encryption Schemes |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | single institute |
doc-1799 | internal conference | Using Declarative Networking Rules to Secure Overlay Networks |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1800 | internal conference | Distributed Policy Analysis With Confidentiality |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1801 | internal conference | Policy Refinement:Decomposition and Operationalization for Dynamic Domains Variants: doc-1802 |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1803 | internal conference | Risk-based Access Control Decisions Under Uncertainty |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1806 | internal conference | Making use of mobility modelling in the experimental framework |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1860 | external conference | Discovering Service Dependencies in Mobile Ad Hoc Networks Variants: doc-1760 |
|
Sep-2011 | Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on (pp. 527-533). IEEE | international |
doc-899b | internal conference | Trust Decision Making in Delegation Relationships Variants: doc-899a |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-x0317 | internal conference | A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | single institute |
doc-x0600 | internal conference | HyperD: a hypercube topology for dynamic distributed federated databases |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-x0718 | internal conference | Network topology as a cost factor in query optimization |
|
Sep-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-x0745 | external conference | Optimal gateway selection in multi-domain wireless networks: a potential game perspective |
|
Sep-2011 | Proceedings of the 17th annual international conference on Mobile computing and networking (pp. 325-336). ACM. | single institute |
doc-x0944 | external conference | Towards a fair non-convex resource allocation in wireless networks |
|
Sep-2011 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2011 | single institute |
doc-x0974 | external conference | Understanding stateful vs stateless communication strategies for ad hoc networks |
|
Sep-2011 | Proceedings of the 17th annual international conference on Mobile computing and networking (pp. 313-324). ACM | collaborative |
doc-1659 | workshop | Coalition Information Exchange (Workshop) |
|
Aug-2011 | 5th Annual Conference of the International Technology Alliance | international |
doc-1676 | tech report | Worked example from the CE workshop |
|
Aug-2011 | Boeing, Seattle (internal workshop) | international |
doc-1680 | external conference | Trust-based Probabilistic Query Answering |
|
Aug-2011 | Web Information System Engineering-WISE 2011 (pp. 57-71). Springer Berlin Heidelberg | international with government |
doc-1726 | external conference | Two-way secrecy schemes for the broadcast channel with internal eavesdroppers Variants: doc-1723 |
|
Aug-2011 | Asilomar 2011 | international |
doc-1758a | phd thesis | Informing Dialogue Strategy through Argumentation-Derived Evidence |
|
Aug-2011 | single institute | |
doc-1774 | tech report | Collective Cognition in Military Coalition Environments - Q1 Research Update |
|
Aug-2011 | ECS, Southampton | single institute |
doc-1776 | external conference | Verifiable Delegation of Computation over Large Datasets |
|
Aug-2011 | IACR Annual International Cryptology Conference (CRYPTO), 2011 | collaborative |
doc-x0707 | external conference | Multiagent communication security in adversarial settings |
|
Aug-2011 | Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on (Vol. 2, pp. 296-303). IEEE. | collaborative |
doc-1668a | tech report | Dynamic Enforcement of Knowledge-based Security Policies Variants: doc-1900,doc-1668b |
|
Jul-2011 | UMD TechReport | collaborative |
doc-1679 | external conference | An Agent Architecture for Prognostic Reasoning Assistance |
|
Jul-2011 | 22nd International Joint Conference on Artificial Intelligence, 2011 | international |
doc-x0050 | external conference | QoI-based resource allocation for multi-target tracking in energy constrained sensor networks |
|
Jul-2011 | 14th International Conference on Information FUSION | collaborative with government |
doc-x0362 | external conference | Agent-oriented incremental team and activity recognition |
|
Jul-2011 | 22nd International Joint Conference on Artificial Intelligence, 2011 | international |
doc-x0759 | external conference | Performance evaluation of secure network coding using homomorphic signature |
|
Jul-2011 | Network Coding (NetCod), 2011 International Symposium on (pp. 1-6). IEEE. | international |
doc-x0879 | external conference | Sensor service selection through switch options Variants: doc-1743 |
|
Jul-2011 | Services Computing (SCC), 2011 IEEE International Conference on (pp. 717-724). IEEE | collaborative |
doc-x0961 | external conference | Trust decision-making in multi-agent systems |
|
Jul-2011 | 22nd International Joint Conference on Artificial Intelligence, 2011 | international |
doc-1674 | external conference | A Distributed Architecture For Heterogeneous Multi Sensor-Task Allocation |
|
Jun-2011 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2011 | international |
doc-x0353 | external conference | Adaptively secure broadcast, revisited |
|
Jun-2011 | 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing (pp. 179-186). ACM. | collaborative |
doc-x0497 | external conference | Distributed Overlay Construction to Support Policy-Based Access Control |
|
Jun-2011 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011 | international |
doc-x0677 | external conference | Minimum congestion mapping in a cloud Variants: doc-x0678 |
|
Jun-2011 | Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing (pp. 267-276). ACM | single institute |
doc-x0691 | external conference | Modeling data flow in socio-information networks: a risk estimation approach |
|
Jun-2011 | Proceedings of the 16th ACM symposium on Access control models and technologies (pp. 113-122). ACM | collaborative |
doc-x0867 | external conference | Selecting relevant sensor providers for meeting your quality information needs |
|
Jun-2011 | Mobile Data Management (MDM), 2011 12th IEEE International Conference on (Vol. 1, pp. 200-205). IEEE | international |
doc-x1046 | external conference | Policy Supersession in a Coalition ISR Network |
|
Jun-2011 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011 | single institute |
doc-1753 | external conference | netCSI: A generic fault diagnosis algorithm for large-scale failures in computer networks Variants: doc-x1044 |
|
May-2011 | Reliable Distributed Systems (SRDS), 2011 30th IEEE Symposium on (pp. 167-176). IEEE | collaborative with government |
doc-x0017 | external conference | Dispatch-and-Search: Dynamic Multi-Ferry Control in Partitioned Mobile Networks |
|
May-2011 | ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2011 | collaborative with government |
doc-x0051 | external conference | The ITA Sensor Fabric & Policy Management Toolkit |
|
May-2011 | 8th NATO Military Sensing Symposium, Friedrichshafen, GER, May 2011. | international with government |
doc-x0389 | external conference | Approximation methods for infinite Bayesian Stackelberg games: Modeling distributional payoff uncertainty |
|
May-2011 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 | single institute |
doc-x0391 | external conference | Argumentation strategies for plan resourcing |
|
May-2011 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 | international |
doc-x0461 | journal | Cooperative wireless networks: from radio to network protocol designs |
|
May-2011 | Communications Magazine, IEEE, 49(5), 64-69 | single institute |
doc-x0474 | external conference | Decorrelating WSN traffic patterns with maximally uninformative constrained routing |
|
May-2011 | NETWORKING 2011 Workshops (pp. 207-218). Springer Berlin Heidelberg | international |
doc-x0773 | external conference | Policy refinement of network services for MANETs |
|
May-2011 | Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on (pp. 113-120). IEEE. | collaborative |
doc-x0896 | external conference | Sources of stereotypical trust in multi-agent systems |
|
May-2011 | Proceedings of the 14th International Workshop on Trust in Agent Societies (p. 25). | international |
doc-x1040 | external conference | Prognostic agent assistance for norm-compliant coalition planning Variants: doc-x1041 |
|
May-2011 | INFRASTRUCTURES AND TOOLS FOR MULTIAGENT SYSTEMS, 120 | international |
doc-x1041 | external conference | Prognostic agent assistance for norm-compliant coalition planning Variants: doc-x1040 |
|
May-2011 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 | international |
doc-x1042 | external conference | Probabilistic Hierarchical Planning over Markov Decision Processes |
|
May-2011 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011 | collaborative |
doc-1738 | external conference | Service-oriented Reasoning Architecture for Resource-Task Assignment in Sensor Networks |
|
Apr-2011 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international with government |
doc-1744 | external conference | Model-Driven SOA for Sensor Networks |
|
Apr-2011 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international |
doc-805 | external conference | Understanding Robustness of Mobile Networks through Temporal Network Measures |
|
Apr-2011 | IEEE International Conference on Computer Communications (InfoCom), 2011 | international |
doc-x0052 | external conference | Semantically enriched data for effective sensor data fusion Variants: doc-1737 |
|
Apr-2011 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international with government |
doc-x0073 | external conference | Forecasting routes and self-adaptation in multi-hop wireless sensor networks |
|
Apr-2011 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international |
doc-x0356 | external conference | Adversaries' Holy Grail: access control analytics |
|
Apr-2011 | First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (pp. 54-61). ACM. | single institute |
doc-x0419 | external conference | Broadcast scheduling with data bundles Variants: doc-1672 |
|
Apr-2011 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international |
doc-x0430 | external conference | Clustering in cooperative networks |
|
Apr-2011 | IEEE International Conference on Computer Communications (InfoCom), 2011 | single institute |
doc-x0755 | external conference | Pan and scan: Configuring cameras for coverage |
|
Apr-2011 | IEEE International Conference on Computer Communications (InfoCom), 2011 | single institute |
doc-x0847 | external conference | Robust multipath routing in large wireless networks |
|
Apr-2011 | IEEE International Conference on Computer Communications (InfoCom), 2011 | international |
doc-x0086 | external conference | A cultural belief network simulator. |
|
Mar-2011 | Social Computing, Behavioral-Cultural Modeling and Prediction (pp. 284-291). Springer Berlin Heidelberg | single institute |
doc-x0458 | external conference | Cooperative jamming to improve the connectivity of the 1-D secrecy graph |
|
Mar-2011 | Information Sciences and Systems (CISS), 2011 45th Annual Conference on (pp. 1-6). IEEE | single institute |
doc-x0482 | external conference | Demystifying privacy in sensory data: A qoi based approach |
|
Mar-2011 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011 | single institute |
doc-806b | external conference | Ontological Logic Programming |
|
2011 | Proceedings of the International Conference on Web Intelligence, Mining and Semantics. ACM, 2011. | single institute with government |
doc-x0060 | tech report | Understanding and Shared Understanding in Military Coalitions |
|
2011 | single institute | |
doc-x0321 | journal | A history of graph entropy measures |
|
2011 | Information Sciences, 181(1), 57-78. | collaborative |
doc-x0348 | journal | Adaptive packet prioritisation for large wireless sensor networks |
|
2011 | Telecommunication Systems, 48(1-2), 125-150. | single institute |
doc-x0354 | phd thesis | Addressing the reactiveness problem in sensor networks using rich task representation |
|
2011 | Doctoral dissertation, Cardiff University | single institute |
doc-x0382 | journal | Anomaly detection in information streams without prior domain knowledge |
|
2011 | IBM Journal of Research and Development, 55(5), 11-1. | collaborative |
doc-x0390 | book chapter | Argumentation strategies for collaborative plan resourcing |
|
2011 | Argumentation in Multi-Agent Systems(pp. 154-173). Springer Berlin Heidelberg | international |
doc-x0395 | journal | Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks |
|
2011 | Selected Areas in Communications, IEEE Journal on, 29(10), 2067-2076. | international |
doc-x0417 | journal | Bounds on the moduli of polynomial zeros |
|
2011 | Applied Mathematics and Computation, 218(8), 4128-4137 | collaborative |
doc-x0418 | tech report | Broadcast analysis for large cooperative wireless networks |
|
2011 | arXiv preprint arXiv:1104.3209. | single institute |
doc-x0420 | journal | Broadcasting Info-Pages to Sensors: Efficiency vs. Energy Conservation Variants: doc-1220a |
|
2011 | Wireless Networks, 17(6), 1529-1542 | collaborative |
doc-x0431 | journal | Cognitive and self-selective routing for sensor networks |
|
2011 | Computational Management Science, 8(3), 237-258 | international |
doc-x0434 | external conference | Combining semantic web and logic programming for agent reasoning |
|
2011 | Advanced Agent Technology (pp. 428-441). Springer Berlin Heidelberg | single institute |
doc-x0436 | journal | ComboCoding: Combined Intra/Inter-Flow Network Coding for TCP over Multihop Lossy Wireless Networks |
|
2011 | Journal of Advanced Research, 2(3), 241-252 | collaborative |
doc-x0528 | tech report | Energy-Efficient Location Service Protocols for Mobile Ad Hoc Networks |
|
2011 | Technical Report 11-1, Department of Computer Science, RPI. | single institute |
doc-x0534 | tech report | Evaluating Implementations of Service Oriented Architecture for Sensor Network via Simulation |
|
2011 | RENSSELAER POLYTECHNIC INST TROY NY. | single institute |
doc-x0551 | external conference | Exploiting domain knowledge in making delegation decisions |
|
2011 | Agents and Data Mining Interaction (pp. 117-131). Springer Berlin Heidelberg. | international |
doc-x0568 | journal | Frequency quorum rendezvous for fast and resilient key establishment under jamming attack Variants: doc-917 |
|
2011 | ACM SIGMOBILE Mobile Computing and Communications Review, 14(4), 1-3 | single institute |
doc-x0574 | journal | Generalized graph entropies |
|
2011 | Complexity, 17(2), 45-50. | collaborative |
doc-x0575 | journal | Generalized Sequential Slotted Amplify and Forward Strategy in Cooperative Communications |
|
2011 | Information Theory, IEEE Transactions on, 57(4), 1968-1974. | single institute |
doc-x0594 | external conference | How to aggregate the cl signature scheme |
|
2011 | Computer Security-ESORICS 2011 (pp. 298-314). Springer Berlin Heidelberg. | single institute |
doc-x0606 | journal | Impact of imperfect channel state information on bi-directional communications with relay selection |
|
2011 | Signal Processing, IEEE Transactions on, 59(11), 5657-5662 | single institute |
doc-x0635 | journal | Joint beamforming and power management for nonregenerative MIMO two-way relaying channels |
|
2011 | Vehicular Technology, IEEE Transactions on, 60(9), 4374-4383 | single institute |
doc-x0648 | journal | Linear precoded cooperative transmission protocol for wireless broadcast channels |
|
2011 | Vehicular Technology, IEEE Transactions on, 60(7), 3509-3515 | single institute |
doc-x0664 | journal | Masquerade mimicry attack detection: A randomised approach |
|
2011 | computers & security, 30(5), 297-310 | single institute |
doc-x0671 | patent | Method and system for deducing network routes by querying routers |
|
2011 | U.S. Patent No. 7,869,349. Washington, DC: U.S. Patent and Trademark Office. | single institute |
doc-x0731 | tech report | On Growing Perfect Power-Law Graphs |
|
2011 | Technical Report 11-02, Department of Computer Science, RPI,�http://www.�cs. rpi. edu/research/pdf/11-02. pdf. | single institute |
doc-x0736 | journal | On the design of network coding for multiple two-way relaying channels |
|
2011 | Wireless Communications, IEEE Transactions on, 10(6), 1820-1832. | international |
doc-x0744 | journal | Opportunistic relaying for secrecy communications: Cooperative jamming vs. relay chatting |
|
2011 | IEEE Transactions on Wireless Communications, 10(6), 1725-1729. | international |
doc-x0765 | external conference | Planning over MDPs through HTNs |
|
2011 | AAAI 2011 Workshop on Generalized Planning | collaborative |
doc-x0798 | external conference | Quantitative evaluation of secure network coding using homomorphic signature/hashing |
|
2011 | IEEE International Symposium on Network Coding. | international |
doc-x0912 | patent | System and method for obtaining network link state information from sequential distance vector routing tables |
|
2011 | U.S. Patent No. 7,961,642 | single institute |
doc-x0920 | patent | TCP-aware resource allocation in wireless networks |
|
Jan-2011 | U.S. Patent No. 7,864,802 | collaborative |
doc-x1029 | journal | Self-organizing systems based on morphogenesis principles |
|
2011 | IBM Journal of Research and Development, 55(5), 12-1 | single institute |
doc-x1037 | journal | Activity recognition for dynamic multi-agent teams |
|
2011 | ACM Transactions on Intelligent Systems and Technology (TIST), 3(1), 18 | collaborative |
doc-808 | external conference | Trust Decision Making in Delegation Relationships Variants: doc-899b |
|
Dec-2010 | European Workshop on Multi-Agent Systems (EUMAS), 2010 | international |
doc-809 | external conference | Incremental, Team-Oriented Activity and Plan Recognition for Software Agents |
|
Dec-2010 | European Workshop on Multi-Agent Systems (EUMAS), 2010 | international |
doc-942 | external conference | Service Discovery for Delay Tolerant Networks |
|
Dec-2010 | IEEE Global Communications Conference (GlobeCom), 2010 | single institute |
doc-x0135 | external conference | Friendship based routing in delay tolerant mobile social networks |
|
Dec-2010 | IEEE Global Communications Conference (GlobeCom), 2010 | single institute |
doc-x0163 | external conference | PCFG based synthetic mobility trace generation |
|
Dec-2010 | IEEE Global Communications Conference (GlobeCom), 2010 | single institute |
doc-1341 | journal | On the study of analogue network coding for multi-pair, bidirectional relay channels |
|
Nov-2010 | IEEE Trans. Wireless communication | international |
doc-1342 | journal | Physical Layer Network Coding and Precoding for the Two-Way Relay Channel in Cellular Systems |
|
Nov-2010 | IEEE Trans. Signal processing | collaborative |
doc-1343 | journal | Cross-layer Routing Using Cooperative Transmission in Vehicular Ad-hoc Networks |
|
Nov-2010 | IEEE JSAC Special Issue | single institute |
doc-1344 | journal | Cooperative Transmission Protocols for Wireless Broadcast Channels |
|
Nov-2010 | IEEE Trans. Wireless communication | international |
doc-1346 | journal | Entropy of Digraphs and Infinite Networks |
|
Nov-2010 | Towards an Information Theory of Complex Networks: Statistical Methods and Applications (M. Dehmer, F. Emmert-Streib, and A. Mehler, eds. Springer/Birkhouser) | single institute |
doc-1347 | journal | A symmetry index for graphs |
|
Nov-2010 | Journl of Mathematical Biophysics | collaborative |
doc-1348 | journal | Connections between Classical and Parametric Network Entropies |
|
Nov-2010 | PLoS ONE | international |
doc-1406 | tech report | Logic proposal Rationale Example in OWL |
|
Nov-2010 | single institute | |
doc-1407 | tech report | only if an example of human graspability of logic |
|
Nov-2010 | single institute | |
doc-1409 | invited talk | Quality of Information and Its Characterization in Sensor-enabled Smart Environments |
|
Nov-2010 | single institute | |
doc-1410 | tech report | Security Concerns of NUM-based Networks |
|
Nov-2010 | NSRC Technical Report | single institute |
doc-806a | external conference | Position Paper: Ontological Logic Programming |
|
Nov-2010 | Proceedings of the 3rd International Conference on Semantic Sensor Networks-Volume 668. CEUR-WS. org, 2010. | single institute with government |
doc-806c | tech report | ISTAR OWL Ontology |
|
Nov-2010 | single institute | |
doc-814a | external conference | OWL-POLAR: Semantic Policies for Agent Reasoning Variants: doc-1728 |
|
Nov-2010 | International Semantic Web Conference (ISWC), 2010 | international |
doc-815 | external conference | Path Heuristics using ACO for Inter-Domain Routing in Mobile Ad Hoc and Sensor Networks |
|
Nov-2010 | Bio-inspired models of network, information, and computing systems. Springer Berlin Heidelberg, 2010. 128-142. | collaborative |
doc-816 | external conference | Urban-X: Towards Distributed Channel Assignment in Cognitive Multi-Radio Mesh Networks |
|
Nov-2010 | Wireless Days (WD), 2010 IFIP. IEEE, 2010. | collaborative |
doc-817 | external conference | Cognitive Multi-Radio Mesh Networks on ISM Bands: A Cross-Layer Architecture |
|
Nov-2010 | Performance Computing and Communications Conference (IPCCC), 2010 IEEE 29th International. IEEE, 2010. | collaborative |
doc-819 | external conference | Content Centric Networking in Tactical and Emergency MANETs |
|
Nov-2010 | Wireless Days (WD), 2010 IFIP. IEEE, 2010. | single institute |
doc-820b | external conference | Distributed Abductive Reasoning with Constraints Variants: doc-985 |
|
Nov-2010 | Springer LCNS 2010 | single institute |
doc-821 | external conference | Adaptive Negotiation In Managing Wireless Sensor Networks |
|
Nov-2010 | In Principles and Practice of Multi-Agent Systems (pp. 121-136). Springer Berlin Heidelberg | single institute |
doc-822 | external conference | Intelligent Resource Selection for Sensor-Task Assignment: A Knowledge Based Approach Variants: doc-x0625 |
|
Nov-2010 | Annual International Conference on Advanced Topics in Artificial Intelligence (ATAI 2010,http://www.aiconf.org/) | single institute with government |
doc-916 | external conference | Secrecy in Wireless Networks Through Cooperative Chatter |
|
Nov-2010 | Army Science Conference (ASC), 2010 | international |
doc-918 | external conference | Multiple Metric Gateway Election in Heterogeneous MANETs |
|
Nov-2010 | Army Science Conference (ASC), 2010 | collaborative |
doc-920 | external conference | InterMR: Inter-MANET Routing in Heterogeneous MANETs |
|
Nov-2010 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2010 | international |
doc-930 | external conference | Assessing Trust in Uncertain Information |
|
Nov-2010 | International Semantic Web Conference (ISWC), 2010 | international with government |
doc-935 | external conference | Quality Tradeoffs in Object Tracking with Duty-Cycled Sensor Networks Best paper award |
|
Nov-2010 | Real-Time Systems Symposium (RTSS), 2010 IEEE 31st. IEEE, 2010 | collaborative with government |
doc-937 | external conference | You Can't Get There From Here: Sensor Scheduling with Refocusing Delays Variants: doc-x0024 |
|
Nov-2010 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2010 | collaborative with government |
doc-938 | external conference | Utility-Driven, Energy-Aware In-Network Processing for Mission-oriented Wireless Sensor Networks |
|
Nov-2010 | Army Science Conference (ASC), 2010 | collaborative |
doc-943 | external conference | Efficient Routing in Delay Tolerant Networks with Correlated Node Mobility |
|
Nov-2010 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2010 | single institute |
doc-x0087 | external conference | A case against routing-integrated time synchronization |
|
Nov-2010 | Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (pp. 267-280). ACM | international |
doc-x0104 | external conference | Agent Support for Policy-Driven Mission Planning Under Constraints |
|
Nov-2010 | AAAI Fall Symposium: Proactive Assistant Agents | international |
doc-919 | external conference | Connectivity Improvement for Inter-Domain Routing in MANETs |
|
Oct-2010 | IEEE Military Communications Conference, 2010 | single institute |
doc-921 | external conference | Adaptive Forwarding Rate Control for Network Coding in Tactical MANETs |
|
Oct-2010 | IEEE Military Communications Conference, 2010 | single institute |
doc-926 | external conference | Decomposition Techniques for Policy Refinement |
|
Oct-2010 | IEEE International Conference on Network and Service Management (CNSM), 2010 | international |
doc-934 | external conference | Multi-Target Tracking Using Proximity Sensors |
|
Oct-2010 | IEEE Military Communications Conference, 2010 | collaborative with government |
doc-946 | external conference | Dynamic Composition of Services in Sensor Networks |
|
Oct-2010 | Services Computing (SCC), 2010 IEEE International Conference on. IEEE, 2010 | collaborative |
doc-x0018 | external conference | Power efficiency of decode-and-forward cooperative relaying |
|
Oct-2010 | IEEE Military Communications Conference, 2010 | international with government |
doc-1049a | internal conference | Network-Enabled Collaborative Problem-Solving |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-1408 | internal conference | Demonstration of integration of semantic web technologies (updated with presentation) |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-826 | internal conference | Quantitative Evaluation of Secure Network Coding |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-828 | internal conference | Constructing Minimal Overlay to Support Policy-Based Access Control Groups Variants: doc-x0444 |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-830 | internal conference | Listen First, Broadcast Later: Topology-Agnostic Forwarding under High Dynamics |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-831 | internal conference | Dynamic Gateway Assignment to Support Inter-domain Networking in MANETs |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-833 | internal conference | Self-tuning routing algorithms |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-836 | internal conference | Obtaining Generic Mobility Models from Network Properties and Trace Data |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-848 | internal conference | Inferring Trust in Uncertain Information |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-851 | internal conference | Risk Sensitive Planning in Partially Observable Environments Variants: doc-987 |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-858 | internal conference | Robust Bayesian Methods for Stackelberg Security Games Variants: doc-988 |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-863 | internal conference | Information Sharing Decisions under Uncertainty |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-864 | internal conference | Acting in Partially Observable Domains with Delayed Observations |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-867 | internal conference | Sensors as a Service Oriented Architecture: Middleware for Sensor Networks Variants: doc-947b |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-876 | internal conference | Cooperative Data Dissemination to Mission Sites Variants: doc-961 |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-877 | internal conference | A model-driven approach to the construction, composition and analysis of services on sensor networks |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-878 | internal conference | Configuration of Actuated Camera Networks for Multi-target Coverage |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-881 | internal conference | Single Sensor Scheduling with Refocusing Delays |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-882 | internal conference | Sensor Allocation in Diverse Environments Variants: doc-970 |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-883 | internal conference | Who, When, Where: Timeslot Assignment to Mobile Clients Variants: doc-1034 |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-886 | internal conference | Joint Assignment of Timeslot and Transmission Rate for Data-Item Scheduling in Mobile WSNs |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-899a | internal conference | Trust Decision Making in Delegation Relationships Variants: doc-899b |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-917 | external conference | Frequency Quorum Rendezvous for Fast and Resilient Key Establishment under Jamming Attack Variants: doc-x0568 |
|
Sep-2010 | Annual International Conference on Mobile Computing and Networking, 2010 | single institute |
doc-924 | external conference | Ad Hoc Networking via Named Data |
|
Sep-2010 | Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture (pp. 3-8). ACM | collaborative |
doc-927a | internal conference | Time-Specific Encryption Variants: doc-927b |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-932a | internal conference | Information-Theoretic Detection of Masquerade Mimicry Attacks Variants: doc-932b |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-939 | external conference | Intelligent information assistance for coalition operations |
|
Sep-2010 | Knowledge Systems for Coalition Operations (KSCO), 2010 | single institute |
doc-940 | external conference | Dynamic Networks and Distributed Problem-Solving |
|
Sep-2010 | Knowledge Systems for Coalition Operations (KSCO), 2010 | collaborative |
doc-941 | external conference | Making Plans Alive |
|
Sep-2010 | Knowledge Systems for Coalition Operations (KSCO), 2010 | international with government |
doc-954b | internal conference | Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Variants: doc-954a |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-955a | internal conference | Learning Autonomic Security Reconfiguration Policies Variants: doc-955b |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-975b | internal conference | Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Variants: doc-975a |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-986b | internal conference | Secure Network Coding Over The Integers Variants: doc-986a |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | collaborative |
doc-x0027 | external conference | Hybrid Rationale and Controlled Natural Language for Shared Understanding |
|
Sep-2010 | Knowledge Systems for Coalition Operations (KSCO), 2010 | international with government |
doc-x0061 | internal conference | A Formal Context Representation Framework for Network-Enabled Recognition |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0063 | internal conference | The Cognitive Virtues of Dynamic Networks |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0065 | internal conference | Idea Propagation in Social Networks: The Role of 'Cognitive Advantage' |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0066 | internal conference | Cognition and the Web |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-x0067 | internal conference | Extended Memory, the Extended Mind, and the Nature of Technology-Mediated Memory Enhancement |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-x0068 | internal conference | Supporting Distributed Coalition Planning with Semantic Wiki Technology |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0069 | internal conference | Collective Cognition: Exploring the Dynamics of Belief Propagation and Collective Problem Solving in Multi-Agent Systems |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0070 | internal conference | Modelling the Dynamics of Collective Cognition: A Network-Based Approach to Socially-Mediated Cognitive Change |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0071 | internal conference | Semantic Networks and Shared Understanding: A Network-Based Approach to Representing and Visualizing Shared Understanding |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0302 | internal conference | A Conceptual Framework to Support a Multi-level Planning Capability |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0315 | internal conference | A formal context representation framework for network-enabled cognition |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0366 | internal conference | An agent architecture for intelligent information assistance |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0369 | internal conference | An Energy Efficient Dynamic Location Server Hierarchy for Mobile Ad Hoc Networks |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0376 | internal conference | Analysis and Algorithms for Power Allocation in Decode-And-Forward Cooperative Relaying |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0506 | internal conference | Dynamic Composition of Services in Sensor Networks and Its Implementation under Sensor Fabric |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-x0613 | internal conference | Inconsistency Tolerant Reasoning over Uncertain Data |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | single institute |
doc-x0803 | internal conference | Query optimization in a distributed hypercube database |
|
Sep-2010 | 4th Annual Conference of the International Technology Alliance | international |
doc-807a | external conference | Probabilistic plan recognition for intelligent information agents: Towards proactive software assistant agents |
|
Aug-2010 | Proc. ICAART (2011): 281-287. | single institute |
doc-811 | external conference | Keyless Channel Hopping against Jamming Attack in Wireless Networks |
|
Aug-2010 | UKC | single institute |
doc-812 | external conference | On the Universal Generation of Mobility Models |
|
Aug-2010 | Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2010 IEEE International Symposium on. IEEE, 2010. | collaborative |
doc-813 | invited talk | Towards quantification of utility in the OODA loop |
|
Aug-2010 | single institute | |
doc-820c | external conference | Distributed Abductive Reasoning with Constraints Variants: doc-985 |
|
Aug-2010 | 11th International Workshop on Computational Logic in Multi-Agent Systems | single institute |
doc-925 | external conference | Speculative Abduction Reasoning for Hierarchical Agent Systems |
|
Aug-2010 | Computational Logic in Multi-Agent Systems. Springer Berlin Heidelberg, 2010. 49-64. | collaborative |
doc-927b | external conference | Time-Specific Encryption Best paper award Variants: doc-927a |
|
Aug-2010 | Security and Cryptography for Networks. Springer Berlin Heidelberg, 2010. 1-16 | single institute |
doc-928 | external conference | Assessing Trust in Uncertain Information using Bayesian Description Logics |
|
Aug-2010 | Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010 | international with government |
doc-929 | invited talk | Trust-based Decision-Making with Uncertain Information |
|
Aug-2010 | international | |
doc-931 | external conference | A Decision Theoretic Approach to Data Leakage Prevention |
|
Aug-2010 | Social Computing (SocialCom), 2010 IEEE Second International Conference on. IEEE, 2010 | single institute |
doc-932b | external conference | Information-Theoretic Detection of Masquerade Mimicry Attacks Variants: doc-932a |
|
Aug-2010 | Network and System Security (NSS), 2010 4th International Conference on. IEEE, 2010 | single institute |
doc-936 | external conference | An Ontological Approach to Integrating Task Representations in Sensor Networks |
|
Aug-2010 | Proc 17th International Conference on Knowledge Engineering and Knowledge Management (EKAW 2010). Springer. 2010 | single institute |
doc-975a | external conference | Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Variants: doc-975b |
|
Aug-2010 | IACR Annual International Cryptology Conference (CRYPTO), 2010 | international |
doc-x0133 | external conference | Error performance bounds for routing algorithms in wireless cooperative networks Variants: doc-1489b |
|
Aug-2010 | Communications and Networking in China (CHINACOM), 2010 5th International ICST Conference on (pp. 1-7). IEEE | single institute |
doc-x0179 | external conference | Shipping to Streaming: Is this shift green? |
|
Aug-2010 | Proceedings of the first ACM SIGCOMM workshop on Green networking (pp. 61-68). ACM | single institute |
doc-x0182 | external conference | StochKit-FF: Efficient systems biology on multicore architectures |
|
Aug-2010 | Euro-Par 2010 Parallel Processing Workshops (pp. 167-175). Springer Berlin Heidelberg | collaborative |
doc-x1043 | external conference | ANTIPA: an agent architecture for intelligent information assistance |
|
Aug-2010 | ECAI (pp. 1055-1056) | single institute |
doc-1349 | external conference | Boolean Coherence: Does it make sense? |
|
Jul-2010 | Logics for Systems Analysis | single institute |
doc-933 | external conference | Networks of Trust and Distrust: Towards Logical Reputation Systems |
|
Jul-2010 | Logics in Security, Copenhagen, Denmark (2010) | single institute |
doc-944 | external conference | A Negotiation Framework for Negotiation of Coalition Policies |
|
Jul-2010 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010 | single institute |
doc-945 | external conference | Behavior Modeling with Probabilistic Context Free Grammars |
|
Jul-2010 | 13th International Conference on Information FUSION | single institute |
doc-947b | external conference | Sensors as a Service Oriented Architecture: Middleware for Sensor Networks Variants: doc-867 |
|
Jul-2010 | Intelligent Environments (IE), 2010 Sixth International Conference on (pp. 209-214). IEEE | international |
doc-948 | external conference | Risk Based Access Control with Uncertain and Time-dependent Sensitivity |
|
Jul-2010 | Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on. IEEE, 2010 | international with government |
doc-x0144 | external conference | Markov process modeling and simulation for wireless sensor network life estimation with QoS constraints |
|
Jul-2010 | Proceedings of the 2010 Summer Computer Simulation Conference (pp. 168-173). Society for Computer Simulation International | single institute |
doc-x0752 | external conference | Optimizing a policy authoring framework for security and privacy policies |
|
Jul-2010 | Proceedings of the Sixth Symposium on Usable Privacy and Security (p. 8). ACM. | collaborative |
doc-x0983 | external conference | Usable policy template authoring for iterative policy refinement |
|
Jul-2010 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2010 | collaborative |
doc-950 | external conference | Utility-based Gateway Deployment for Supporting Multi-domain DTNs |
|
Jun-2010 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2010 | international |
doc-954a | external conference | Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Variants: doc-954b |
|
Jun-2010 | Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2010 | collaborative |
doc-968 | external conference | Design and Implementation of a Robust Sensor Data Fusion System for Unknown Signals |
|
Jun-2010 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2010 | single institute |
doc-970 | external conference | Sensor Allocation in Diverse Environments Variants: doc-882 |
|
Jun-2010 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2010 | single institute |
doc-x0123 | external conference | Dependable connection setup for network capabilities |
|
Jun-2010 | Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on (pp. 301-310). IEEE | single institute |
doc-x0124 | external conference | Disentangling wireless sensing from mesh networking |
|
Jun-2010 | Proceedings of the 6th Workshop on Hot Topics in Embedded Networked Sensors (p. 3). ACM | international |
doc-x0134 | external conference | FLoc: Dependable link access for legitimate traffic in flooding attacks |
|
Jun-2010 | Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on (pp. 327-338). IEEE | single institute |
doc-x0169 | external conference | QoI-Aware Wireless Sensor Network Management for Dynamic Multi-Task Operations. |
|
Jun-2010 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2010 | international |
doc-x0350 | patent | Adaptive rate allocation for multiple TCP sources in wireless networks |
|
Jun-2010 | U.S. Patent No. 7,733,777 | collaborative |
doc-1029b | external conference | Broadcast Encryption with Multiple Trust Centers and Dynamic Coalitions Variants: doc-1029a |
|
May-2010 | LatinCrypt 2010 | international |
doc-820a | external conference | Distributed Abductive Reasoning with Constraints Variants: doc-985 |
|
May-2010 | Declarative Agent Languages and Technologies VIII. Springer Berlin Heidelberg, 2010. 148-166. | single institute |
doc-915 | external conference | Security-capacity trade-off in large wireless networks using keyless secrecy |
|
May-2010 | ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2010 | single institute |
doc-949 | external conference | Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption |
|
May-2010 | Ad Hoc Networking Workshop (Med-Hoc-Net), 2010 The 9th IFIP Annual Mediterranean. IEEE, 2010 | collaborative |
doc-952 | external conference | Group Detection in Mobility Traces |
|
May-2010 | Proceedings of the 6th international wireless communications and mobile computing conference. ACM, 2010 | single institute |
doc-953 | external conference | Effect of Limited Topology Knowledge on Opportunistic Forwarding in Ad Hoc Wireless Networks |
|
May-2010 | Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2010 Proceedings of the 8th International Symposium on (pp. 237-246). IEEE | single institute |
doc-955b | external conference | Learning Autonomic Security Reconfiguration Policies Variants: doc-955a |
|
May-2010 | Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on. IEEE, 2010 | single institute |
doc-958 | external conference | An Ontology-based Framework for Designing a Sensor Quality of Information Software Library |
|
May-2010 | Mobile Data Management (MDM), 2010 Eleventh International Conference on (pp. 264-269). IEEE | collaborative with government |
doc-960d | external conference | Flexible Task Resourcing for Intelligent Agents |
|
May-2010 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 | single institute |
doc-963 | external conference | The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks |
|
May-2010 | IEEE International Conference on Communications (ICC), 2010 | single institute |
doc-964 | external conference | Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks |
|
May-2010 | IEEE International Conference on Communications (ICC), 2010 | single institute |
doc-965 | external conference | Bootstrapping trust evaluations through stereotypes |
|
May-2010 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 | international |
doc-966 | external conference | Learning policies through argumentation-derived evidence |
|
May-2010 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 | international |
doc-967 | external conference | Encryption schemes secure against chosen-ciphertext selective opening attacks |
|
May-2010 | IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2010 | collaborative |
doc-980 | external conference | On the Application of Cooperative Transmission to Wireless Broadcast Channels |
|
May-2010 | IEEE International Conference on Communications (ICC), 2010 | international |
doc-985 | external conference | Distributed Abductive Reasoning with Constraints Variants: doc-820b |
|
May-2010 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 | single institute |
doc-986a | external conference | Secure Network Coding over the Integers Variants: doc-986b |
|
May-2010 | Public Key Cryptography-PKC 2010 (pp. 142-160). Springer Berlin Heidelberg | collaborative |
doc-987 | external conference | Risk sensitive Planning in Partially Observable Environments Variants: doc-851 |
|
May-2010 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 | single institute |
doc-988 | external conference | Robust Bayesian Methods for Stackelberg Security Games Variants: doc-858 |
|
May-2010 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2010 | single institute |
doc-997 | external conference | Transmission Capacity of Decode-and-Forward Cooperation in Overlaid Wireless Networks |
|
May-2010 | IEEE International Conference on Communications (ICC), 2010 | single institute |
doc-x0019 | external conference | Flying in the dark: controlling autonomous data ferries with partial observations |
|
May-2010 | ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2010 | collaborative with government |
doc-x0118 | external conference | Computing argumentation in polynomial number of bdd operations: A preliminary report |
|
May-2010 | Argumentation in Multi-Agent Systems (ArgMAS), 2010 | international |
doc-x0156 | external conference | On control of networks of dynamical systems |
|
May-2010 | Circuits and Systems (ISCAS), Proceedings of 2010 IEEE International Symposium on (pp. 3785-3788). IEEE | single institute |
doc-x0161 | external conference | On the benefits of argumentation-derived evidence in learning policies |
|
May-2010 | Argumentation in Multi-Agent Systems (ArgMAS), 2010 | international |
doc-x0308 | external conference | A decision-theoretic approach to resourcing plans in joint missions |
|
May-2010 | Argumentation in Multi-Agent Systems (ArgMAS), 2010 | international |
doc-x0634 | external conference | Joint beamforming and power allocation for MIMO two-way relaying channels |
|
May-2010 | IEEE International Conference on Communications (ICC), 2010 | single institute |
doc-x1028 | external conference | Measuring behavioral trust in social networks |
|
May-2010 | Intelligence and Security Informatics (ISI), 2010 IEEE International Conference on (pp. 150-152). IEEE | single institute |
doc-956 | external conference | High-Resolution, Low-Power Time Synchronization an Oxymoron No More Best paper award |
|
Apr-2010 | Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM, 2010 | collaborative |
doc-961 | external conference | Cooperative Data Dissemination to Mission Sites Variants: doc-876 |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | collaborative |
doc-962 | external conference | Implementation of utility-based resource optimization protocols on ITA sensor fabric |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international |
doc-969 | external conference | Warfighter decision making performance analysis as an investment priority driver |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international with government |
doc-971 | external conference | Conditional Shortest Path Routing in Delay Tolerant Networks |
|
Apr-2010 | World of Wireless Mobile and Multimedia Networks (WoWMoM), 2010 IEEE International Symposium on a (pp. 1-6). IEEE | single institute |
doc-972 | external conference | An Energy Efficient Location Service for Mobile Ad Hoc Networks |
|
Apr-2010 | ISCIS 2010 | single institute |
doc-974 | external conference | Reflections on Provenance Ontology Encodings |
|
Apr-2010 | Provenance and Annotation of Data and Processes (pp. 198-205). Springer Berlin Heidelberg | international |
doc-977 | external conference | Towards Learning Risk Estimation Functions for Access Control |
|
Apr-2010 | Snowbird Learning Workshop | international |
doc-983 | external conference | Dynamic Control of Data Ferries under Partial Observations |
|
Apr-2010 | IEEE Wireless Communications and Networking Conference (WCNC), 2010 | international with government |
doc-984 | external conference | Morphogenesis in Computer Networks Variants: doc-1021 |
|
Apr-2010 | Sarnoff Symposium, 2010 IEEE (pp. 1-6). IEEE | international |
doc-x0072 | external conference | Generic Vehicle Architecture for the integration and sharing of in-vehicle and extra-vehicle sensors |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | single institute |
doc-x0142 | external conference | Management of coalition sensor networks |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | collaborative |
doc-x0453 | tech report | Controlling Autonomous Data Ferries: Proof of Selected Theorems |
|
Apr-2010 | Technical Report RC24980, IBM, April 2010.https://researcher.�ibm. com/researcher/files/usthe/rc24980.pdf | collaborative |
doc-x0499 | external conference | Distributed policy based access to networked heterogeneous ISR data sources |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | international |
doc-x0750 | external conference | Optimising the deployment of airborne heterogeneous sensors for persistent ISR missions |
|
Apr-2010 | International Society for Optics and Photonics - Defense, Security and Sensing, 2010 | single institute with government |
doc-957 | external conference | Target Tracking with Packet Delays and Losses - QoI amid Latencies and Missing Data |
|
Mar-2010 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2010 | collaborative |
doc-959 | external conference | Compressive Oversampling for Robust Data Transmission in Sensor Network |
|
Mar-2010 | IEEE International Conference on Computer Communications (InfoCom), 2010 | collaborative |
doc-976 | external conference | On MySpace Account Spans and Double Pareto-Like Distribution of Friends |
|
Mar-2010 | IEEE International Conference on Computer Communications (InfoCom), 2010 | single institute |
doc-978 | external conference | Green Wave: Latency and Capacity-Efficient Sleep Scheduling for Wireless Networks |
|
Mar-2010 | IEEE International Conference on Computer Communications (InfoCom), 2010 | international |
doc-979 | external conference | Neighbor Discovery with Reception Status Feedback to Transmitters |
|
Mar-2010 | IEEE International Conference on Computer Communications (InfoCom), 2010 | collaborative with government |
doc-981 | external conference | Wireless Interrupt: Inter-Device Signaling in Next Generation Wireless Networks |
|
Mar-2010 | IEEE International Conference on Computer Communications (InfoCom), 2010 | single institute |
doc-1350 | journal | Cost Effective Multi-Period Spraying for Routing in Delay Tolerant Networks |
|
Feb-2010 | IEEE/ACM Transactions on Networking (TON), 18(5), 1530-1543 | single institute |
doc-1411a | tech report | Summary of Controlled English |
|
Feb-2010 | ITA | single institute |
doc-1412 | tech report | On Structuring Controlled English Documents |
|
Feb-2010 | ITA | single institute |
doc-1414 | tech report | CPM Visualisations of Warning Orders and OPORDs in a military scenario |
|
Feb-2010 | ITA | single institute |
doc-x0120 | external conference | CORNER: a realistic urban propagation model for VANET |
|
Feb-2010 | Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on (pp. 57-60). IEEE | collaborative |
doc-1354 | journal | A Taxonomy of Biologically Inspired Research in Computer Networking |
|
2010 | Computer Networks | collaborative |
doc-1416 | external conference | Multi-User Diversity for Secrecy in Wireless Networks |
|
2010 | Information Theory and Applications Workshop (ITA), 2010 (pp. 1-9). IEEE | international |
doc-1418 | tech report | Collaboratively Developed Extensions to Commercial Game Environments for Research and Analysis of Coordinated Team Activities |
|
Jan-2010 | Hawaii International Conference on System Sciences (HICSS-43) | international |
doc-x0032 | journal | Sensor-mission assignment in constrained environments |
|
2010 | Parallel and Distributed Systems, IEEE Transactions on, 21(11), 1692-1705 | international |
doc-x0062 | external conference | Context Representation for the Semantic Web |
|
2010 | Web Science Conference, Raleigh, North Carolina, USA. | international |
doc-x0064 | book chapter | Cultural Network Analysis: A Cognitive Approach to Cultural Modeling |
|
2010 | D. Verma (Ed.), Network Science for Military Coalition Operations: Information Extraction and Interaction. IGI Global, Hershey, Pennsylvania, USA. | international |
doc-x0097 | external conference | A perspective on trust, security and autonomous systems |
|
2010 | Proceedings of the New Security Paradigms Workshop, Concord, MA | single institute |
doc-x0106 | external conference | An auto-delegation mechanism for access control systems |
|
2010 | Security and Trust Management (pp. 1-16). Springer Berlin Heidelberg | single institute |
doc-x0107 | external conference | Analyzing the AIR language: a semantic web (production) rule language |
|
2010 | Web Reasoning and Rule Systems (pp. 58-72). Springer Berlin Heidelberg | collaborative |
doc-x0112 | external conference | Authenticated broadcast with a partially compromised public-key infrastructure Variants: doc-x0202 |
|
2010 | Stabilization, Safety, and Security of Distributed Systems (pp. 144-158). Springer Berlin Heidelberg | collaborative |
doc-x0115 | external conference | Brief announcement: configuration of actuated camera networks for multi-target coverage |
|
2010 | Stabilization, Safety, and Security of Distributed Systems (pp. 282-284). Springer Berlin Heidelberg | collaborative |
doc-x0116 | external conference | Broadcast encryption with multiple trust authorities |
|
2010 | Progress in Cryptology-LATINCRYPT 2010 (pp. 1-19). Springer Berlin Heidelberg | international |
doc-x0152 | external conference | Modelling Uncertain and Time-Dependent Security Labels in MLS Systems |
|
2010 | e-Business and Telecommunications (pp. 158-171). Springer Berlin Heidelberg | international with government |
doc-x0199 | journal | A guide to trust in mobile ad hoc networks |
|
2010 | Security and Communication Networks, 3(6), 503-516 | single institute |
doc-x0204 | journal | Constrained-path labellings on graphs of bounded clique-width |
|
2010 | Theory of Computing Systems, 47(2), 531-567 | collaborative |
doc-x0207 | journal | Distributed energy-efficient target tracking with binary sensor networks |
|
2010 | ACM Transactions on Sensor Networks (TOSN), 6(4), 32 | single institute |
doc-x0210 | journal | FleaNet: A virtual market place on vehicular networks |
|
2010 | Vehicular Technology, IEEE Transactions on, 59(1), 344-355. | collaborative |
doc-x0211 | journal | GeoDTN+ Nav: geographic DTN routing with navigator prediction for urban vehicular environments |
|
2010 | Mobile Networks and Applications, 15(1), 61-82 | collaborative |
doc-x0212 | journal | Identity crisis: on the problem of namespace design for ID-PKC and MANETs Variants: doc-1584 |
|
2010 | Security and Communication Networks, 3(6), 535-545 | collaborative with government |
doc-x0213 | journal | Impact of network coding on system delay for multisource-multidestination scenarios |
|
2010 | Vehicular Technology, IEEE Transactions on, 59(2), 831-841 | collaborative |
doc-x0214 | journal | Introduction to the Special Issue on Advances in Sensing, Information Processing and Decision Making for Coalition Operations within the US/UK |
|
2010 | The Computer Journal, 53(5) | international |
doc-x0217 | journal | On the interaction of clocks, power, and synchronization in duty-cycled embedded sensor nodes |
|
2010 | ACM Transactions on Sensor Networks (TOSN), 7(3), 24 | collaborative |
doc-x0220 | journal | P2P content distribution to mobile bluetooth users |
|
2010 | Vehicular Technology, IEEE Transactions on, 59(1), 356-367 | collaborative |
doc-x0224 | journal | Sensor-mission assignment in wireless sensor networks |
|
2010 | ACM Transactions on Sensor Networks (TOSN), 6(4), 36 | collaborative |
doc-x0228 | journal | Transmit power estimation using spatially diverse measurements under wireless fading |
|
2010 | Networking, IEEE/ACM Transactions on, 18(4), 1171-1180 | international |
doc-x0233 | phd thesis | Evolving security policies |
|
2010 | single institute | |
doc-x0333 | external conference | A novel relay assisted cooperative transmission protocol for wireless multiple access system |
|
2010 | IEEE Trans. on Communications | international |
doc-x0444 | tech report | Constructing minimal overlay to support policy-based access control groups Variants: doc-828 |
|
2010 | IBM Research Report, RC24935 | international |
doc-x0456 | book chapter | Conversation Analysis of Coalition Communication in Network Centric Operations |
|
2010 | Network Science for Military Coalition Operations: Information Exchange and Interaction: Information Exchange and Interaction, 256 | single institute |
doc-x0717 | book chapter | Network Science for Military Coalition Operations: Information Exchange and Interaction: Information Exchange and Interaction |
|
2010 | IGI Global. | single institute |
doc-x0719 | tech report | Network-Centric Access Control |
|
2010 | Gatech CC Technical Report, 2010.�http://www.cc. gatech. edu/~ twang/neat. pdf. | single institute |
doc-x0730 | tech report | On Estimating Degree Distributions of Directed Graphs through Sampling |
|
2010 | University of Massachusetts CMPSCI Technical Report UM-CS-2010-046. | collaborative |
doc-x0762 | tech report | Physical-layer-enhanced wireless secret key exchange |
|
2010 | Univ. Massachusetts Amherst, Amherst, MA, Tech. Rep. UM-CS-2010-032. | collaborative |
doc-x0842 | patent | Risk-sensitive investment strategies under partially observable market conditions |
|
2010 | U.S. Patent Application No. 12/780,650 | single institute |
doc-x0943 | external conference | Toward quantification of utility in the OODA loop |
|
2010 | PASTA 2010 | single institute |
doc-1415 | tech report | Presentation to Prof H Boley on representation of logic and rationale |
|
Dec-2009 | ITA | single institute |
doc-x0155 | external conference | On black-box constructions of predicate encryption from trapdoor permutations |
|
Dec-2009 | IACR Annual International Conference on the Theory and Application of Cryptology and Information (ASIACRYPT), 2009 | single institute |
doc-x0160 | external conference | On the application of network coding with diversity to opportunistic scheduling Best paper award Variants: doc-1014 |
|
Dec-2009 | Wireless Mobile and Computing (CCWMC 2009), IET International Communication Conference on (pp. 534-538). IET | collaborative |
doc-1008 | external conference | Transmission Delay Analysis with Finite Coding Length in Wireless Cooperative Networks |
|
Nov-2009 | IEEE Global Communications Conference (GlobeCom), 2009 | single institute |
doc-1037 | external conference | Impact of Social Networks on Delay Tolerant Routing |
|
Nov-2009 | IEEE Global Communications Conference (GlobeCom), 2009 | single institute |
doc-1038 | external conference | Distributed Target Tracking with Directional Binary Sensor Networks |
|
Nov-2009 | IEEE Global Communications Conference (GlobeCom), 2009 | single institute |
doc-1039a | external conference | A Participation Incentive Market Mechanism for Allocating Heterogeneous Network Services |
|
Nov-2009 | IEEE Global Communications Conference (GlobeCom), 2009 | collaborative |
doc-1355 | journal | Resource Determination and Allocation in Sensor Networks: A Hybrid Approach |
|
Nov-2009 | The Computer Journal | collaborative |
doc-1357 | journal | What Is a Good Plan? Cultural Variations in Expert Planners' Concepts of Plan Quality |
|
Nov-2009 | Journal of Cognitive Engineering and Decision Making | international |
doc-1419 | external conference | Defining Quality of Information and Metadata for Sensor-originated Information |
|
Nov-2009 | USMA Network Science Workshop | international with government |
doc-1420 | tech report | Implemented Extensions to CPM 3 |
|
Nov-2009 | ITA | single institute |
doc-1424 | invited talk | Collaborative Jazz Improvisation as an example of Cognitive and Network Extension |
|
Nov-2009 | single institute | |
doc-1425 | tech report | The Representation of Special Logics in Semantic Web languages |
|
Nov-2009 | ITA | collaborative |
doc-1426 | tech report | Outline of Scenario for CPM Evaluation, Q4 BPP09 |
|
Nov-2009 | ITA | collaborative |
doc-1428 | tech report | Conceptual Mapping between GPAL-OWL and CPM |
|
Nov-2009 | ITA | international |
doc-989 | external conference | Bounds on Network Coding and Multi-Rate Diversity Gain in Multicast Wireless Applications |
|
Nov-2009 | Wireless Communication Systems, 2009. ISWCS 2009. 6th International Symposium on (pp. 221-224). IEEE | collaborative |
doc-990 | external conference | Protecting Network Coded Packets in Coalition Networks |
|
Nov-2009 | Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on (pp. 168-175). IEEE | single institute |
doc-991 | external conference | Learning Policy Constraints through Dialogue |
|
Nov-2009 | AAAI Fall Symposium: The Uses of Computational Argumentation | international |
doc-x0092 | external conference | A metadata calculus for secure information sharing |
|
Nov-2009 | Proceedings of the 16th ACM conference on Computer and communications security (pp. 488-499). ACM | international |
doc-x0100 | external conference | A Study on Transmission Delay with Finite Coding Length in Wireless Cooperative Networks Variants: doc-1013 |
|
Nov-2009 | IEEE Global Communications Conference (GlobeCom), 2009 | single institute |
doc-x0125 | external conference | Dynamic security policy learning |
|
Nov-2009 | Proceedings of the first ACM workshop on Information security governance (pp. 39-48). ACM | international |
doc-x0158 | external conference | On optimising personal network size to manage information flow |
|
Nov-2009 | Proceedings of the 1st ACM international workshop on Complex networks meet information & knowledge management (pp. 19-26). ACM | collaborative |
doc-x0173 | external conference | Route capacity estimation based admission control and QoS routing for mesh networks |
|
Nov-2009 | IEEE Global Communications Conference (GlobeCom), 2009 | collaborative |
doc-x0184 | external conference | The fable of the bees: incentivizing robust revocation decision making in ad hoc networks |
|
Nov-2009 | Proceedings of the 16th ACM conference on Computer and communications security (pp. 291-302). ACM | international |
doc-1025 | external conference | Energy-efficient key distribution and revocation in tactical networks with asymmetric links |
|
Oct-2009 | IEEE Military Communications Conference, 2009 | single institute |
doc-1427 | tech report | Emergent capabilities for collaborative teams in the evolving web environment |
|
Oct-2009 | ITA | international |
doc-992 | external conference | Interpreting Team Collaboration |
|
Oct-2009 | 2009 Network Science Workshop | international |
doc-995 | external conference | Semantic History: Towards Modeling and Publishing Changes of Online Semantic Data |
|
Oct-2009 | International Semantic Web Conference (ISWC), 2009 | single institute |
doc-996 | external conference | A Semantic Wiki Based Light-Weight Web Application Model |
|
Oct-2009 | International Semantic Web Conference (ISWC), 2009 | international |
doc-999a | external conference | CoCast: Multicast Mobile Ad Hoc Networks using Cognitive Radio |
|
Oct-2009 | IEEE Military Communications Conference, 2009 | collaborative |
doc-x0162 | external conference | On the maximum throughput of clandestine sensor networking |
|
Oct-2009 | IEEE Military Communications Conference, 2009 | collaborative with government |
doc-x1031 | external conference | More is more: The benefits of dense sensor deployment Variants: doc-x0215 |
|
Oct-2009 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2009 | collaborative |
doc-1002 | internal conference | Expressive Policy Analysis with Laws of System Change |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1005 | external conference | A Stochastic Geometry Approach to Transmission Capacity in Wireless Cooperative Networks |
|
Sep-2009 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2009 | international |
doc-1006a | external conference | Enhancing Congestion Control with Adaptive Per-Node Airtime Allocation for Wireless Sensor Networks |
|
Sep-2009 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2009 | international |
doc-1009 | internal conference | Interference Subtraction with Supplementary Cooperation in Wireless Cooperative Networks Variants: doc-1070 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1010 | internal conference | Neighbor Discovery in Wireless Networks and the Coupon Collector's Problem Variants: doc-1011 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1011 | external conference | Neighbor Discovery in Wireless Networks and the Coupon Collector's Problem Variants: doc-1010 |
|
Sep-2009 | Annual International Conference on Mobile Computing and Networking, 2009 | single institute |
doc-1012a | internal conference | Mission-based Joint Optimal Resource Allocation in Wireless Multicast Sensor Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1013 | internal conference | A Study on Transmission Delay with Finite Coding Length in Wireless Cooperative Networks Variants: doc-x0100 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1014 | internal conference | On the Application of Network Coding with Diversity to Opportunistic Scheduling Variants: doc-x0160 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1015a | internal conference | RelayCast: Scalable Multicast Routing in Delay Tolerant Coalition Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | collaborative |
doc-1016 | internal conference | Enabling Inter-domain DTN Communications by Networked Static Gateways |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1017 | internal conference | Topology-aware Inter-domain Routing for Heterogeneous MANETs |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1018a | internal conference | Dynamic Attributes Design in Attribute Based Encryption |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1019a | internal conference | Adaptive Forwarding Rate Control for Network Coding in the Tactical MANET |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1020 | internal conference | Self-Organizing Processes of Collective Behavior in Computer Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1021 | internal conference | Morphogenesis in Computer Networks Variants: doc-984 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1023 | internal conference | Efficient Evaluation of History-based Policies |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1024 | internal conference | Realising Management and Composition of Self-Managed Cells in Body Area Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1028 | internal conference | A Metadata Algebra for Sharing Tactical Information |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1029a | internal conference | Broadcast Encryption with Multiple Trust Centers and Dynamic Coalitions Variants: doc-1029b |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1030 | internal conference | Revocation Mechanisms for Hybrid Group Communication with Asymmetric Links |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1031 | internal conference | Bootstrapping Coalition MANETs: Physical-Layer Security under Active Adversary |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1032 | internal conference | A Judgement Mechanism for Key Revocation |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1033 | internal conference | A Judgment Mechanism for Key Revocation |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1035 | internal conference | Knowledge-Driven Agile Sensor-Mission Assignment |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1040 | internal conference | Experimental Evaluation of the Performance and Scalability of a Dynamic Distributed Federated Database |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1041 | poster | Technologies for Federation and Interoperation of Coalition Networks Variants: doc-1064 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1042a | internal conference | Agent Assistance in Forming Swift Trust in Ad-Hoc Decision-Making Teams |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1043a | internal conference | Argumentation-based agent support for learning policies in a coalition mission |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1044a | internal conference | Towards the Implementation of Multi-Agent Planning Dialogues |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1045a | internal conference | Agent Support for Policy-driven Collaborative Planning in Ad-hoc Teams |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1046a | internal conference | Evidence-Based Plan Monitoring for Human Teams in Uncertain Environments |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1047a | internal conference | Discovering Context Changes in Team Behaviour |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1048a | internal conference | Modeling simulated military mission context |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1050a | poster | Miscommunication and Context Awareness |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1051 | poster | Improving Shared Understanding in Multilevel Planning |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1052 | internal conference | Visualising Rationale in the CPM |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1053 | internal conference | Layered Controlled Natural Languages |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1054 | internal conference | Towards an Understanding of Shared Understanding in Military Coalition Contexts |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1055 | poster | A Controlled Natural Language Interface for Semantic MediaWiki |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1056 | internal conference | Rule Modeling Using Semantic MediaWiki |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1068 | internal conference | Enhanced Situation Awareness in Collaborative Planning Through Context-Aware Mashup |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-1417b | internal conference | Review of relational algebra for dynamic distributed federated databases Variants: doc-1417a |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1431b | internal conference | GIDS: Global Interlinked Data Store |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-998 | internal conference | Full Connectivity and Percolation in Large Cooperative Wireless Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | single institute |
doc-x0033 | journal | On the Study of Network Coded AF Transmission Protocol for Wireless Multiple Access Channels Variants: doc-1378 |
|
Sep-2009 | Wireless Communications, IEEE Transactions on 8.1 (2009): 118-123 | collaborative |
doc-x0096 | external conference | A note on information-theoretic secret key exchange over wireless channels |
|
Sep-2009 | Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on (pp. 754-761). IEEE | single institute |
doc-x0098 | external conference | A scalable micro wireless interconnect structure for CMPs |
|
Sep-2009 | Proceedings of the 15th annual international conference on Mobile computing and networking (pp. 217-228). ACM | international |
doc-x0146 | external conference | Maximum throughput of clandestine relay |
|
Sep-2009 | 47th Annual Allerton Conference on (pp. 1082-1089). IEEE | collaborative with government |
doc-x0195 | internal conference | Understanding the quality of management in computer networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-x0196 | internal conference | A QoI-Aware Middleware for Task-Oriented Applications in Wireless Sensor Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-x0241 | internal conference | Exact and Fuzzy Sensor-Task Assignment Variants: doc-x0542 |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-x0304 | internal conference | A controlled natural language interface for semantic media wiki |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-x0536 | internal conference | Evaluating the Control Overhead of Routing Protocols in Dynamic Ad Hoc Networks |
|
Sep-2009 | 3rd Annual Conference of the International Technology Alliance | international |
doc-1000 | external conference | Scaling Properties of Delay Tolerant Networks in Correlated Motion Patterns |
|
Aug-2009 | Proceedings of the 4th ACM Workshop on Challenged Networks (pp. 19-26). ACM | collaborative |
doc-1001 | external conference | Temporal Distance Metrics for Social Network Analysis |
|
Aug-2009 | Proceedings of the 2nd ACM workshop on Online social networks (pp. 31-36). ACM | collaborative |
doc-1022a | external conference | Security Policy Refinement using Data Integration: A Position Paper |
|
Aug-2009 | Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (pp. 25-28). ACM | international |
doc-1026 | external conference | Attacking Cryptographic Schemes Based on `Perturbation Polynomials` |
|
Aug-2009 | Proceedings of the 16th ACM conference on Computer and communications security (pp. 1-10). ACM. | international |
doc-1034 | journal | Who, When, Where; Timeslot Assignment to Mobile Clients Variants: doc-883 |
|
Aug-2009 | Mobile Computing, IEEE Transactions on, 11(1), 73-85 | collaborative |
doc-1060 | external conference | Building key-private, public-key encryption schemes |
|
Aug-2009 | Information Security and Privacy (pp. 276-292). Springer Berlin Heidelberg | single institute |
doc-1077 | journal | Proactive Data Dissemination to Mission Sites |
|
Aug-2009 | Wireless Networks, 18(7), 749-762 | international |
doc-1078 | external conference | Flexible Resource Assignment in Sensor Networks: A Hybrid Reasoning Approach |
|
Aug-2009 | 1st International Workshop on the Semantic Sensor Web (SemSenWeb 2009), Heraklion, Crete, Greece, 1st June, 2009. Collocated with 6th Annual European Semantic Web Conference" (ESWC 2009) | collaborative with government |
doc-1092 | external conference | Selection of Sensors For Missions Using Semantic-Aware Cooperative Agents |
|
Aug-2009 | Proceedings of the International Workshop on Agent-based Technologies and applications for enterprise interoperability (ATOP'09) (pp. 73-84) | single institute with government |
doc-1362 | journal | MANET QoS Support without Reservations |
|
Aug-2009 | Wiley Journal on Security and Communication Networks | single institute |
doc-1363 | journal | Temperature Driven Time Synchronization |
|
Aug-2009 | IEEE Embedded Systems Letters, July 2009 | single institute |
doc-1364a | journal | On the Development of an Internetwork-centric Defense for Scanning Worms Variants: doc-1325 |
|
Aug-2009 | Computers & Security (2009) doi:10.1016/j.cose.2009.07.003 | collaborative |
doc-1367 | journal | Agent Support for Policy-driven Collaborative Mission Planning |
|
Aug-2009 | The Computer Journal, June 24 2009, doi: 10.1093/comjnl/bxp061 | international with government |
doc-1396 | external conference | On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups |
|
Aug-2009 | Designs, Codes and Cryptography, 52(2), 219-241 | single institute |
doc-1431a | tech report | GIDS: Global Interlinked Data Store (Full Technical Report) |
|
Aug-2009 | Technical report | international |
doc-1432 | tech report | The representation of logic in semantic web languages |
|
Aug-2009 | single institute | |
doc-1433 | tech report | Representation of Logic in the CPM |
|
Aug-2009 | single institute | |
doc-994 | external conference | On the recognition of compromise in sensing systems: rewired acoustic arrays and distorted route estimation and classification |
|
Aug-2009 | International Society for Optics and Photonics - Europe Security and Defense, 2009 | international with government |
doc-x0129 | external conference | Energy efficient sampling for event detection in wireless sensor networks |
|
Aug-2009 | Proceedings of the 2009 ACM/IEEE international symposium on Low power electronics and design (pp. 419-424). ACM | single institute |
doc-x0168 | external conference | Privacy-preserving integrity-assured data aggregation in sensor networks |
|
Aug-2009 | 2009 International Conference on Computational Science and Engineering (pp. 168-175). IEEE | collaborative |
doc-x0181 | external conference | Size matters: variation in personal network size, personality and effect on information transmission |
|
Aug-2009 | Computational Science and Engineering, 2009. CSE'09. International Conference on (Vol. 4, pp. 188-193). IEEE | collaborative |
doc-x0188 | external conference | Trading in risk: Using markets to improve access control |
|
Aug-2009 | Proceedings of the 2008 workshop on New security paradigms (pp. 107-125). ACM | single institute |
doc-1004 | external conference | Toward efficient quality of information estimation in simultaneous acoustic tracking and classification of multiple targets |
|
Jul-2009 | 12th International Conference on Information FUSION | international with government |
doc-1061 | external conference | A Dynamic Infrastructure for Interconnecting Disparate ISR/ISTAR Assets (the ITA Sensor Fabric) |
|
Jul-2009 | 12th International Conference on Information FUSION | international with government |
doc-1062 | external conference | Verification of Policy-Based Self-Managed Cell Interactions Using Alloy |
|
Jul-2009 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2009 | single institute |
doc-1063 | external conference | Acoustic Vehicle Classification by Fusing with Semantic Annotation |
|
Jul-2009 | 12th International Conference on Information FUSION | international with government |
doc-1064 | external conference | Technologies for Federation and Interoperation of Coalition Networks Variants: doc-1041 |
|
Jul-2009 | 12th International Conference on Information FUSION | international |
doc-1440 | external conference | Building Principles for a Quality of Information Specification for Sensor Information |
|
Jul-2009 | 12th International Conference on Information FUSION | international with government |
doc-x0002 | external conference | An end to end life cycle for ISR in coalition networks |
|
Jul-2009 | 12th International Conference on Information FUSION | international with government |
doc-x0103 | external conference | Adaptive packet prioritisation for wireless sensor networks |
|
Jul-2009 | Next Generation Internet Networks, 2009. NGI'09 (pp. 1-7). IEEE | single institute |
doc-1079 | external conference | Cheap or Flexible Sensor Coverage |
|
Jun-2009 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2009 | single institute |
doc-1080 | external conference | Detection and Localization Sensor Assignment With Exact and Fuzzy Locations |
|
Jun-2009 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2009 | international with government |
doc-1083 | external conference | Control-theoretic Optimization of Utility over Mission Lifetimes in Multi-hop Wireless Networks |
|
Jun-2009 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2009 | collaborative |
doc-x0543 | external conference | Examining the Perception of Miscommunication in a Coalition Environment ID# 072 |
|
Jun-2009 | International Command and Control Research Technology Symposium (ICCRTS), 2009 | single institute |
doc-1058 | journal | Self-Selecting Reliable Path Routing for Diverse Wireless Sensor Network Environments |
|
May-2009 | Proc. IEEE International Symposium on Computers and Communication, July 2009 | single institute |
doc-1065 | external conference | Multi-Scale Temporal Segmentation and Outlier Detection in Sensor Networks |
|
May-2009 | Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on (pp. 306-309). IEEE | collaborative |
doc-1066 | external conference | A Scale-Invariant Local Descriptor for Event Recognition in 1D Sensor Signals |
|
May-2009 | Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on (pp. 1226-1229). IEEE | collaborative |
doc-1075 | external conference | A Decision Support System for Secure Information Sharing |
|
May-2009 | Proceedings of the 14th ACM symposium on Access control models and technologies (pp. 105-114). ACM | international with government |
doc-1085 | external conference | Automated Aiding Strategies for Decentralized Planning with Interdependent Policies |
|
May-2009 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 | international |
doc-1086 | external conference | Agent Support for Human Team Collaboration in Uncertain Environments |
|
May-2009 | Proc. of the First Int. Workshop on Mixed-Initiative Multiagent Systems, Budapest, Hungary | single institute |
doc-1091 | external conference | Policy-driven Planning in Coalitions - a Case Study |
|
May-2009 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 | international |
doc-1093 | external conference | Multi-agent Planning with Confidentiality |
|
May-2009 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 | single institute |
doc-1094 | external conference | Agent-based Sensor-Mission Assignment for Tasks Sharing Assets |
|
May-2009 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 | single institute |
doc-1103 | external conference | On Efficient Query Processing of Stream Counts on the Cell Processor |
|
May-2009 | Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 748-759). IEEE | collaborative |
doc-1104 | external conference | A Framework for Clustering Massive-Domain Data Streams |
|
May-2009 | Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 102-113). IEEE | single institute |
doc-1110a | tech report | Expressive Policy Analysis with Enhanced System Dynamicity Variants: doc-1110b,doc-1110d |
|
May-2009 | seminar presentation at NYU-Poly, April 1 | single institute |
doc-1116a | tech report | Applying quality formalisms and QoS experience in building a framework for studying QoI |
|
May-2009 | panel presentation at the 'Information Quality and QoS in Sensor Networks: Challenges and Opportunities' panel session, IQ2S-09, Galveston, TX, USA, March 9 2009; | single institute |
doc-1119 | external conference | Contract Formation Through Preemptive Normative Conflict Resolution |
|
May-2009 | Proceedings of the Fourth International Workshop on Normative Multi-Agent Systems (NorMAS09), Schloss Dagstuhl, Germany, March, 2009. | single institute |
doc-1358 | journal | Bounds on the Throughput Gain of Network Coding in Unicast and Multicast Wireless Networks |
|
May-2009 | IEEE JSAC | single institute |
doc-1359 | journal | Asymptotic Connectivity Properties of Cooperative Wireless Ad Hoc Networks |
|
May-2009 | IEEE JSAC | collaborative |
doc-1368 | journal | Dynamic Service Execution in Sensor Networks |
|
May-2009 | Computer Journal, 2009. The Computer Journal Advance Access published online on May 28, 2009 | international with government |
doc-1369 | journal | Analyzing Team Decision-Making in Tactical Scenarios |
|
May-2009 | The Computer Journal- 2009 | collaborative |
doc-1370 | journal | Probabilistic Approaches to Estimating the Quality of Information in Military Sensor Networks |
|
May-2009 | British Computer Society: The Computer Journal (in press) | international |
doc-1371 | tech report | Engineering Policy-Based Ubiquitous Systems |
|
May-2009 | lecture for the British Computer Society Computer Journal Lecture Series. | single institute |
doc-1374 | journal | CONTOUR: An Efficient Algorithm for Discovering Discriminating Subsequences |
|
May-2009 | Data Mining and Knowledge Discovery Journal, Vol 18(1), February 2009. | collaborative |
doc-1430 | poster | Adaptive in-network processing for bandwidth and energy constrained mission-oriented wireless sensor networks |
|
May-2009 | DCOSS 2009, June 2009 | collaborative |
doc-1434 | tech report | Efficient SME Knowledge capture through CNLs and ontologies |
|
May-2009 | single institute | |
doc-1435 | tech report | Extension to the Evaluation using visual rationale |
|
May-2009 | single institute | |
doc-1436 | tech report | Exploring high level CNLs for logistics |
|
May-2009 | single institute | |
doc-1437 | tech report | Example of Multilevel representation of ammunition |
|
May-2009 | single institute | |
doc-1438 | tech report | A Hybrid Search Engine for the Semantic Web |
|
May-2009 | single institute | |
doc-x0089 | external conference | A dialogue mechanism for public argumentation using conversation policies |
|
May-2009 | Argumentation in Multi-Agent Systems (ArgMAS), 2009 | collaborative |
doc-x0108 | external conference | Application of halftoning algorithms to location dependent sensor placement |
|
May-2009 | Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on (pp. 161-164). IEEE | international |
doc-x0139 | external conference | Inconsistency tolerance in weighted argument systems |
|
May-2009 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009 | international |
doc-x0157 | external conference | On high dimensional projected clustering of uncertain data streams |
|
May-2009 | Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on (pp. 1152-1154). IEEE | single institute |
doc-1097 | external conference | Event Recognition in Sensor Networks by Means of Grammatical Inference |
|
Apr-2009 | IEEE International Conference on Computer Communications (InfoCom), 2009 | single institute |
doc-1099 | external conference | Exact Analysis of Latency of Stateless Opportunistic Forwarding |
|
Apr-2009 | IEEE International Conference on Computer Communications (InfoCom), 2009 | international |
doc-1101 | external conference | Generating Reliable Quality of Information (QoI) Metrics for Target Tracking |
|
Apr-2009 | International Society for Optics and Photonics - Defense, Security and Sensing, 2009 | single institute |
doc-1105a | external conference | A stochastic process algebraic abstraction of detection evidence fusion in tactical sensor networks |
|
Apr-2009 | International Society for Optics and Photonics - Defense, Security and Sensing, 2009 | international |
doc-1106 | external conference | Sensor Assignment to Missions in a Coalition Context: The SAM Tool |
|
Apr-2009 | IEEE International Conference on Computer Communications (InfoCom), 2009 | international with government |
doc-1107 | external conference | The ITA Sensor Fabric |
|
Apr-2009 | International Society for Optics and Photonics - Defense, Security and Sensing, 2009 | international with government |
doc-x0094 | external conference | A new approach to architecture of sensor networks for mission-oriented applications |
|
Apr-2009 | International Society for Optics and Photonics - Defense, Security and Sensing, 2009 | international |
doc-x0186 | external conference | TO-GO: TOpology-assist geo-opportunistic routing in urban vehicular grids |
|
Apr-2009 | Wireless On-Demand Network Systems and Services, 2009. WONS 2009. Sixth International Conference on (pp. 11-18). IEEE | single institute |
doc-x0942 | external conference | Toward mission-specific service utility estimation using analytic stochastic process models |
|
Apr-2009 | International Society for Optics and Photonics - Defense, Security and Sensing, 2009 | international with government |
doc-1108a | external conference | Auction-Based Congestion Management for Target Tracking in Wireless Sensor Networks |
|
Mar-2009 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009 | collaborative |
doc-1114 | external conference | Shared Understanding within Military Coalitions: A Definition and Review of Research Challenges Best paper award |
|
Mar-2009 | Knowledge Systems for Coalition Operations (KSCO), 2009 | international with government |
doc-1115 | external conference | Using a Structured Plan Representation to Support Multi-level Planning |
|
Mar-2009 | Knowledge Systems for Coalition Operations (KSCO), 2009 | international with government |
doc-x0091 | external conference | A letter soup for the quality of information in sensor networks |
|
Mar-2009 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009 | international with government |
doc-x0095 | external conference | A new schema for security in dynamic uncertain environments |
|
Mar-2009 | Sarnoff Symposium, 2009. SARNOFF'09. IEEE (pp. 1-5). IEEE | single institute |
doc-x0235 | tech report | A Methodology for Value of Information Determination in Coalition Sensor Networks |
|
Mar-2009 | Published in: RC24764 in 2009 | collaborative |
doc-x0236 | tech report | A State Transition Model for Policy Specification |
|
Mar-2009 | IBM Research Report RC24766 (March 2009) | collaborative |
doc-1007 | journal | SAT: Building New Trust Architecture for Vehicular Networks |
|
Feb-2009 | MobiArch 2008, Seattle WA, Aug. 2008 | collaborative |
doc-1069 | journal | Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks |
|
Feb-2009 | IEEE ICC 2009, Dresden, Germany, June 2009 | single institute |
doc-1070 | journal | Interference Subtraction with Supplementary Cooperation in Wireless Cooperative Networks Variants: doc-1009 |
|
Feb-2009 | ICC 2009, June 2009 | single institute |
doc-1071 | journal | Distributed and Power Efficient Routing in Wireless Cooperative Networks |
|
Feb-2009 | IEEE ICC 2009, June 2009 | single institute |
doc-1073 | journal | Adaptive Response System for Distributed Denial-of-Service Attacks |
|
Feb-2009 | IM 2009 Dissertation Digests, June 2009. | collaborative |
doc-1074 | external conference | A Controlled Natural Language Interface for Semantic Media Wiki Using the Rabbit Language |
|
Feb-2009 | Workshop on Controlled Natural Language (CNL'09), Marettimo Island, Italy, June 2009 | international |
doc-1084 | journal | Learning Operational Requirements from Goal Models |
|
Feb-2009 | ICSE 2009, May 2009. | single institute |
doc-1095 | journal | Realising Management and Composition of Self-Managed Cells in Pervasive Healthcare |
|
Feb-2009 | 3rd International Conference on Pervasive Computing Technologies for Healthcare 2009. | single institute |
doc-1100 | journal | Quality of Information Aware Rate Control for Sensor Networks |
|
Feb-2009 | Workshop on Feedback Control Implementation and Design in Computing Systems & Networks (FeBID 2009) at ACM/IEEE IPSN / CPS Week, April 2009 | collaborative |
doc-1102 | journal | Routing of high-priority packets in wireless sensor networks |
|
Feb-2009 | In IEEE Second International Conference on Computer and Network Technology | international |
doc-1109 | external conference | Robust and Efficient Communication Overlays for Trust Authority Computations |
|
Feb-2009 | Sarnoff Symposium, 2009. SARNOFF'09. IEEE. IEEE, 2009. | single institute |
doc-1111 | tech report | Compact Signatures for Network Coding |
|
Feb-2009 | Public Key Cryptography, March 2009 | collaborative |
doc-1112 | journal | Hierarchical Identity Based Encryption with Polynomially Many Levels |
|
Feb-2009 | TCC 2009 - The 6th Theory of Cryptography Conference, Springer, LNCS, March 2009 | single institute |
doc-1113 | external conference | Cognitive Extension and the Web |
|
Feb-2009 | Web Science Conference: Society On-Line, Athens, Greece. March 2009 | international with government |
doc-1121 | journal | Identifying Social Communities in Complex Communications for Network Efficiency |
|
Feb-2009 | Proceeding of The First International Conference on Complex Sciences: Theory and Applications (Complex 2009), Shanghai, February, 2009. | collaborative |
doc-1122 | external conference | CodeCast: Network Coding Based Multicast in MANETs |
|
Feb-2009 | Demos of the 10th international workshop on mobile computing systems and applications (HotMobile 2009) | single institute |
doc-1123 | external conference | Sharing airtime with Shair avoids wasting time and money |
|
Feb-2009 | Proceedings of the 10th workshop on Mobile Computing Systems and Applications (p. 6). ACM | collaborative |
doc-1124 | demo | Inter-Domain Routing for Heterogeneous MANETs |
|
Feb-2009 | international | |
doc-1137 | external conference | Toward Identifying Process Models in Ad Hoc and Distributed Teams |
|
Feb-2009 | Proceedings of the 1st International Working Conference on Human Factors and Computational Models in Negotiation (pp. 55-62). ACM | collaborative |
doc-1170 | external conference | Utility-Based Joint Sensor Selection and Congestion Control for Task-Oriented WSNs |
|
Feb-2009 | Signals, Systems and Computers, 2008 42nd Asilomar Conference on (pp. 1165-1169). IEEE | international |
doc-1171 | journal | FairCast: Fair Multi-Media Streaming in Ad Hoc Networks through Local Congestion Control |
|
Feb-2009 | MSWiM 2008, Vancouver, Oct., 2008 | collaborative |
doc-1195a | journal | On Low Dimensional Random Projections and Similarity Search |
|
Feb-2009 | Proceedings of ACM Seventeenth Conference on Information and Knowledge Management, Napa Valley, CA, USA, 2008. | single institute |
doc-1365 | journal | Understanding the Quality of Monitoring for Network Management |
|
Feb-2009 | the Computer Journal of Oxford University. April 2009 | international with government |
doc-1375 | journal | Efficient Peer-to-peer File Sharing using Network Coding in MANET |
|
Feb-2009 | Journal of Communications and Networks (JCN), Special Issue on Network Coding, Volume 10, Issue 4, pp. 422-429, Dec. 2008. | collaborative |
doc-1441 | tech report | Evaluation of the Collaborative Planning Model |
|
Feb-2009 | international | |
doc-1443a | tech report | Multi-Sensor Centralized Tracking System |
|
Feb-2009 | single institute | |
doc-x0090 | external conference | A framework for culturally adaptive policy management in ad hoc collaborative contexts Variants: doc-1463a |
|
Feb-2009 | Proceedings of the 2009 international workshop on Intercultural collaboration (pp. 257-260). ACM | international |
doc-x0122 | external conference | Cultural variations in collaborative decision making: driven by beliefs or social norms? |
|
Feb-2009 | Proceedings of the 2009 international workshop on Intercultural collaboration (pp. 111-118). ACM | single institute |
doc-x0187 | external conference | Toward quality of information aware rate control for sensor networks |
|
Feb-2009 | Fourth International Workshop on Feedback Control Implemenation and Design in Computing Systems and Networks | collaborative |
doc-1125 | external conference | Robust MANET Routing using Adaptive Path Redundancy and Coding |
|
Jan-2009 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 | single institute |
doc-1126a | external conference | On the Mapping between Logical and Physical Topologies |
|
Jan-2009 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 | international |
doc-1127a | external conference | Empirical Evaluation of Hybrid Opportunistic Networks |
|
Jan-2009 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 | collaborative |
doc-1128 | external conference | Control-Theoretic, Mission-Driven, Optimization Techniques for Wireless Sensor Networks |
|
Jan-2009 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 | collaborative |
doc-1417a | tech report | Review of relational algebra for dynamic distributed federated databases Variants: doc-1417b |
|
2009 | ITACS | international |
doc-1748b | external conference | Opportunism versus Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading |
|
Jan-2009 | IEEE International Conference on Communication Systems and Networks and Workshops (COMMSNETS), 2009 | international |
doc-x0082 | book chapter | Data streams: An overview and scientific applications |
|
2009 | Scientific Data Mining and Knowledge Discovery (pp. 377-397). Springer Berlin Heidelberg. | single institute |
doc-x0083 | book chapter | Dialogue games for agent argumentation |
|
2009 | Argumentation in artificial intelligence (pp. 261-280). Springer US | international |
doc-x0084 | book chapter | On Applications of Density Transforms for Uncertain Data Mining |
|
2009 | Managing and Mining Uncertain Data (pp. 1-19). Springer US | single institute |
doc-x0093 | external conference | A model for integrating dialogue and the execution of joint plans |
|
2009 | Argumentation in multi-agent systems (pp. 60-78). Springer Berlin Heidelberg | international |
doc-x0136 | external conference | Gconnect: A connectivity index for massive disk-resident graphs |
|
2009 | Proceedings of the VLDB Endowment, 2(1), 862-873 | collaborative |
doc-x0154 | external conference | Multistatic Pulse-Wave Angle-of-arrival-assisted relative interferometric RADAR |
|
2009 | Radar Conference, 2009 IEEE (pp. 1-5). IEEE | collaborative |
doc-x0159 | external conference | On Segment-Based Stream Modeling and Its Applications. |
|
Jan-2009 | SDM (pp. 721-732) | single institute |
doc-x0180 | external conference | Signing a linear subspace: Signature schemes for network coding |
|
2009 | Public Key Cryptography-PKC 2009 (pp. 68-87). Springer Berlin Heidelberg | collaborative |
doc-x0200 | journal | A survey of uncertain data algorithms and applications |
|
2009 | IEEE Transactions on, 21(5), 609-623 | single institute |
doc-x0201 | journal | ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks |
|
2009 | Wireless Networks, 15(4), 525-539 | single institute |
doc-x0206 | journal | Dissemination and harvesting of urban data using vehicular sensing platforms |
|
2009 | Vehicular Technology, IEEE Transactions on, 58(2), 882-901 | collaborative |
doc-x0216 | journal | On classification and segmentation of massive audio data streams |
|
2009 | Knowledge and information systems, 20(2), 137-156 | single institute |
doc-x0225 | journal | Temperature compensated time synchronization |
|
2009 | Embedded Systems Letters, IEEE, 1(2), 37-41 | single institute |
doc-x0232 | phd thesis | Enhancing privacy in cryptographic protocols |
|
2009 | single institute | |
doc-x0237 | tech report | An MDP model for planning team actions with communication |
|
2009 | collaborative | |
doc-x0240 | tech report | Emergent mobile services |
|
2009 | collaborative | |
doc-x0245 | tech report | QoI-Aware Operations & Management in Multi-Task-Oriented Wireless Sensor Networks |
|
2009 | IBM Res. Tech. Rep. RC24840 | international |
doc-x0487 | external conference | Development of a controlled natural language interface for semantic mediawiki |
|
2009 | Controlled Natural Language (pp. 206-225). Springer Berlin Heidelberg | international |
doc-x0542 | tech report | Exact and Fuzzy Sensor-Task Assignment Variants: doc-x0241 |
|
2009 | Network and Security Research Center, Pennsylvania State University, Tech. Rep. NAS-TR-0106-2009. | international |
doc-x0739 | tech report | On the interaction of clocks and power in embedded sensor nodes |
|
2009 | Tech. rep., University of California, Los Angeles, Networked and Embedded Systems Lab. | collaborative |
doc-x1039 | journal | A generic framework for automated multi-attribute negotiation |
|
2009 | Group Decision and Negotiation, doi10.1007/s10726-008-9119-9, ISSN 0926-2644 (Print), Vol 18, No. 2, pp. 169-187 | single institute |
doc-1131a | external conference | A Proposal for Trust Management in Coalition Environments |
|
Dec-2008 | Army Science Conference (ASC), 2008 | international |
doc-1133 | external conference | Security Policy Automation from Specification to Device Configuration |
|
Dec-2008 | Army Science Conference (ASC), 2008 | single institute |
doc-1134a | external conference | A Metadata Calculus for Securing Information Flows |
|
Dec-2008 | Army Science Conference (ASC), 2008 | international |
doc-x0627 | external conference | Inter-Domain Path Authentication in Tactical MANETs Variants: doc-1136 |
|
Dec-2008 | Army Science Conference (ASC), 2008 | international |
doc-x0924 | external conference | The Base Zone Protection Problem |
|
Dec-2008 | Army Science Conference (ASC), 2008 | international with government |
doc-1072a | external conference | Using Argumentation Logic for Firewall Configuration Management |
|
Nov-2008 | Integrated Network Management, 2009. IM'09. IFIP/IEEE International Symposium on (pp. 180-187). IEEE | collaborative |
doc-1110b | external conference | Expressive Policy Analysis with Enhanced System Dynamicity Variants: doc-1110a |
|
Nov-2008 | Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS (pp. 239-250). ACM | international |
doc-1135 | external conference | The True Cost of Accurate Time |
|
Nov-2008 | Workshop on Power Aware Computing and Systems (HotPower 2008), December 2008 | collaborative |
doc-1138 | external conference | Angle-of-Arrival Assisted Radio Interferometry (ARI) Target Localization |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | collaborative |
doc-1139 | external conference | Detecting Transient Signals with Incomplete Observations Variants: doc-1484a |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | single institute |
doc-1141 | external conference | A New Form of Network Coded Cooperative Transmission for Multiple Access Channels |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international |
doc-1143a | external conference | Blind Estimation of Transmit-Power for Multiple Wireless Sources |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international |
doc-1144a | external conference | Securing Information Flows: A Quantitative Risk Analysis Approach |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international |
doc-1145a | external conference | Connectivity Augmentation in Tactical Mobile Ad hoc Networks |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | single institute |
doc-1146 | external conference | Tiered Architecture for On-Line Detection, Isolation and Repair of Faults in Wireless Sensor Networks |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international with government |
doc-1147a | external conference | Assigning Sensors to Competing Missions |
|
Nov-2008 | IEEE Global Communications Conference (GlobeCom), 2008 | collaborative |
doc-1148 | external conference | Time Dependent Message Spraying for Routing in Intermittently Connected Networks |
|
Nov-2008 | IEEE Global Communications Conference (GlobeCom), 2008 | single institute |
doc-1149 | external conference | Distributed Target Tracking with Imperfect Binary Sensor Networks |
|
Nov-2008 | IEEE Global Communications Conference (GlobeCom), 2008 | single institute |
doc-1150a | external conference | Flexible and Secure Communications in an Identity-Based Coalition Environment |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international |
doc-1151 | external conference | Multi-target Tracking and Identification by a Vector of Sensors |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | single institute |
doc-1152a | external conference | Balancing Cost-Quality Tradeoff in Cooperative Ad Hoc Sensor Networks |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | single institute |
doc-1153 | external conference | Reasoning and Resource Allocation for Sensor-Mission Assignment in a Coalition Context |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international with government |
doc-1154 | external conference | A Computational Framework for Quality of Information Analysis for Detection-oriented Sensor Networks Variants: doc-1521 |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | collaborative |
doc-1155 | external conference | "Direction" Assisted Geographic Routing for Mobile Ad Hoc Networks |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | single institute |
doc-1156 | external conference | Collaborative And Context-Aware Planning |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international |
doc-1157 | external conference | On the performance of random linear network coding in relay networks |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | collaborative |
doc-1160a | external conference | Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs |
|
Nov-2008 | Computer Security-ESORICS 2008 (pp. 49-65). Springer Berlin Heidelberg | international |
doc-1163a | external conference | Trust Management For Secure Information Flows |
|
Nov-2008 | Proceedings of the 15th ACM conference on Computer and communications security (pp. 175-188). ACM | international |
doc-1166a | external conference | ProbeCast: Ad Hoc Multicast Admission Control via Probing |
|
Nov-2008 | Proceedings of Q2SWiNet 2008, Vancouver, BC | single institute |
doc-1167a | external conference | Relaycast: Scalable Multicast Routing in Delay Tolerant Networks |
|
Nov-2008 | Network Protocols, 2008. ICNP 2008. IEEE International Conference on. IEEE, 2008 | collaborative |
doc-1189a | external conference | Enhancing Energy Efficiency for Data Fusion in Sensor Networks with a Detection Mission |
|
Nov-2008 | 11th Int'l Symposium on Wireless Personal Multimedia Communications (WPMC 2008), Saariselk, Lapland, Finland, Sept. 8-11 2008 | single institute |
doc-1197 | external conference | Phase Transitions of Opportunistic Communication |
|
Nov-2008 | Proceedings of the third ACM workshop on Challenged networks (pp. 73-80). ACM | collaborative |
doc-1198 | external conference | Predictability of Human Mobility and Its Impact on Forwarding |
|
Nov-2008 | Communications and Networking in China, 543-547. ChinaCom 2008. Date: 25-27 Aug. 2008 | collaborative |
doc-1206 | external conference | GeoDTN+Nav: A Hybrid Geographic and DTN Routing with Navigation Assistance in Urban Vehicular Networks |
|
Nov-2008 | MobiQuitous/ISVCS 2008, Trinity College Dublin, Ireland, July. 2008 | collaborative |
doc-1376 | journal | Normative Conflict Resolution in Multi-Agent Systems |
|
Nov-2008 | Autonomous Agents and Multi-Agent Systems, DOI 10.1007/s10458-008-9070-9, ISSN 1387-2532 (Print) 1573-7454 (Online) | single institute |
doc-1377a | external conference | Information Quality Aware Sensor Network Services |
|
Nov-2008 | Signals, Systems and Computers, 2008 42nd Asilomar Conference on (pp. 1155-1159). IEEE | international |
doc-1481b | external conference | Accuracy Analysis of Data Aggregation for Network Monitoring Variants: doc-1481a |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international |
doc-x0020 | external conference | Analyzing Finite MANETs by Transformations to Equivalent Static Graphs |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | collaborative with government |
doc-x0189 | external conference | Traffic analysis in anonymous MANETs |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | single institute |
doc-x0970 | external conference | Two-tier framework for sensor fault characterization in sensor networks Variants: doc-1485a |
|
Nov-2008 | IEEE Military Communications Conference, 2008 | international with government |
doc-x1011 | external conference | Using commercial PC games in defence research |
|
Nov-2008 | Proceedings of the 9th International Animation, Games & SFX Conference | international |
doc-x0784 | external conference | ProbeCast: MANET admission control via probing |
|
Oct-2008 | Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks (pp. 71-78). ACM. | single institute |
doc-1136 | internal conference | Inter-Domain Path Authentication in Tactical MANETs Variants: doc-x0627 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1165 | external conference | Quality of Information: an Empirical Approach |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | single institute |
doc-1172a | external conference | Distributed Network Utility Optimization in Wireless Sensor Networks Using Power Control Variants: doc-1471 |
|
Sep-2008 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008 | international |
doc-1175 | external conference | A System Architecture for Filtering and Disseminating Data in Sensors Networks |
|
Sep-2008 | International Society for Optics and Photonics - Europe Security and Defense, 2008 | international with government |
doc-1176a | external conference | A knapsack approach to sensor-mission assignment with uncertain demands |
|
Sep-2008 | International Society for Optics and Photonics - Europe Security and Defense, 2008 | international |
doc-1177 | external conference | Addressing Practical Challenges in Utility Optimization of Mobile Wireless Sensor Networks Variants: doc-1250 |
|
Sep-2008 | International Society for Optics and Photonics - Europe Security and Defense, 2008 | international |
doc-1178 | external conference | Quality-Driven Congestion Control for Target Tracking in Wireless Sensor Networks |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | collaborative |
doc-1182 | external conference | Opportunistic Forwarding in Wireless Networks with Duty Cycling |
|
Sep-2008 | Annual International Conference on Mobile Computing and Networking, 2008 | international |
doc-1184 | external conference | Relays, Base Stations, and Meshes : Enhancing Mobile Networks with Infrastructure |
|
Sep-2008 | Annual International Conference on Mobile Computing and Networking, 2008 | single institute |
doc-1185a | external conference | Cross-Layer Routing Optimization for Wireless Networks with Cooperative Diversity |
|
Sep-2008 | IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2008 | single institute |
doc-1186 | external conference | Adaptive QoS Routing for Significant Events in Wireless Sensor Networks |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | collaborative |
doc-1188a | external conference | Securing Information Flows: A Metadata Framework |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | international |
doc-1190a | external conference | Adaptive Sampling for Transient Signal Detection in the Presence of Missing Samples |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | single institute |
doc-1445 | internal conference | Creation of a cooperative beam formed antenna system within a cluster |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1446 | internal conference | Framing the problem of creating ad-hoc distributed antenna arrays for cluster communications |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1448a | internal conference | Holistan Revisited: Demonstrating Agent- and Knowledge-Based Capabilities for Future Coalition Military Operations |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1449 | internal conference | Sensor-mission assignment: A scenario-driven walkthrough |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1451 | internal conference | Frugal Sensor Assignment Variants: doc-1221 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1453 | internal conference | Robust Routing for Dynamic MANETS |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1454a | internal conference | Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1455a | internal conference | A Framework for Supporting Human Military Planning |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1456a | internal conference | Agent Support for Mission Planning Under Policy Constraints |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1457a | internal conference | Collaborative, Context-Aware and Chain of Command Sensitive Planning |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1458 | internal conference | Unsupervised Multi-Scale Salient Temporal Outlier Detection |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-1459a | internal conference | Analysis of Cost-Quality Tradeoff in Cooperative Ad Hoc Sensor Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1460a | internal conference | Distributed Target Tracking Using Binary Sensors with Imprecise Range Measurements |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1462a | internal conference | Models of Network Growth by Combination |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1463a | internal conference | A Framework for Culturally Adaptive Policy Management in Ad Hoc Collaborative Contexts Variants: doc-x0090 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1466 | internal conference | Enabling Accurate Node Control in Randomized Duty Cycling Networks Variants: doc-1209 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1468a | internal conference | From mission specification to quality of information measures - closing the loop in military sensor networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1470a | internal conference | A Multivariate Model for Data Cleansing in Sensor Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1471 | internal conference | Distributed Network Utility Optimization in Wireless Sensor Networks Using Power Control Variants: doc-1172a |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1472 | internal conference | Multi-monitor Estimation of Transmit-power under Wireless Fading |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1474a | internal conference | On the Impact of Time Synchronization on Quality of Information and Network Performance |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-1475 | internal conference | Adaptive Random Re-Routing in Sensor Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-1476a | internal conference | The Use of Rationale in Collaborative Planning |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1478a | internal conference | Engineering Abstractions for Modelling Interactions between Self-Managed Cells |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1480 | internal conference | Rate-optimal decentralized broadcasting: the wireless case |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1481a | internal conference | Accuracy Analysis of Data Aggregation for Network Monitoring Variants: doc-1481b |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1483 | internal conference | Maximizing Utility of Sensor Mission Assignment with Uncertain Demands Variants: doc-1215 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1484a | internal conference | Detecting Transient Signals with Incomplete Observations: Performance Analysis Variants: doc-1139 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1485a | internal conference | Two-Tier Framework for Sensor Fault Characterization in Sensor Networks Variants: doc-x0970 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1489b | internal conference | Error Performance Bounds for Routing Algorithms in Wireless Cooperative Networks Variants: doc-x0133 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1491a | internal conference | Improved Energy Efficiency in Sensor Network based Data Fusion for Hypothesis Testing |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1492a | internal conference | Experimental Insights into Quality of Information |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1493 | internal conference | Network Coding vs. Erasure Coding: Reliable Multicast in Wireless Ad hoc Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1494a | internal conference | Simulation Framework for QoI Characterization of Sensor Networks in the Presence of Faults |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1495a | internal conference | Mission-Based Joint Adaptation of Data Rates and Transmission Power for Multicast Wireless Sensor Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1496a | internal conference | Neighbor discovery with reception status feedback |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1497a | internal conference | On The Data Gathering Capacity of Large Scale Multihop Wireless Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-1499 | internal conference | Policy Evolution with Grammatical Evolution Variants: doc-x0085 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1500a | internal conference | A Dynamic Model of Mission Context |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1501 | internal conference | Semantic Web techniques to support interoperability in distributed networked environments |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1503a | internal conference | Antenna Beam Pattern Model for Cooperative Ad-Hoc Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1504a | internal conference | Probabilistic Inference Measures of the Quality of Information in Military Sensor Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1505a | internal conference | A Framework for Quality of Information Analysis for Detection-oriented Sensor Network Deployments |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-1506a | internal conference | Agent-Based Dialogues to Support Plan Execution by Human Teams Variants: doc-1246a |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1517 | internal conference | Location Dependent Heuristics for Sensor Coverage Planning Variants: doc-1583a |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1522 | internal conference | Simulating ITA Scenarios using Battlefield 2 |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1523a | internal conference | A Grammar Inference Algorithm for Event Recognition in Sensor Networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-1524 | internal conference | Words Are Mightier Than Swords and Yet Miscommunication Costs Lives! |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1525a | internal conference | Analysis of a Recorded Team Coordination Dialogue |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-1532 | internal conference | On the design of opportunistic decode-forward cooperative transmission protocol |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-x0021 | external conference | Data gathering capacity of large scale multihop wireless networks |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | collaborative with government |
doc-x0149 | external conference | Modeling distributed beamforming in wireless networks |
|
Sep-2008 | Communication, Control, and Computing, 2008 46th Annual Allerton Conference on (pp. 475-482). IEEE | single institute |
doc-x0300 | internal conference | A Biologically Inspired Architecture for a Self Organizing Computing Network |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-x0311 | internal conference | A dynamic distributed federated database |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-x0339 | internal conference | A semantic routing framework |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-x0368 | internal conference | An economic model for securing cross-domain information flows |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-x0388 | internal conference | Applying Policy to Inter-domain MANET Routing in Challenging Environments |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-x0552 | internal conference | Exploiting UAVs capabilities in tactical MANETs |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-x0605 | internal conference | Impact of coverage on the performance of wireless ad hoc networks |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | collaborative |
doc-x0626 | internal conference | Inter-and Intra-Domain Routing Interactions for MANETs |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | international |
doc-x0638 | internal conference | Key Deactivation Strategies in MANETs-A Survey |
|
Sep-2008 | 2nd Annual Conference of the International Technology Alliance | single institute |
doc-x1030 | external conference | More is more: The benefits of dense sensor deployment Variants: doc-x1031 |
|
Sep-2008 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2008 | collaborative |
doc-1164 | external conference | Scalable Topology Discovery and Link State Detection using Routing Events |
|
Aug-2008 | Reliable Distributed Systems, 2008. SRDS'08. IEEE Symposium on (pp. 165-174). IEEE | collaborative |
doc-1180 | external conference | An Ontology-Centric Approach to Sensor-Mission Assignment |
|
Aug-2008 | Knowledge Engineering: Practice and Patterns (pp. 347-363). Springer Berlin Heidelberg | international with government |
doc-1181a | external conference | ROFL: Routing as the Firewall Layer |
|
Aug-2008 | Proceedings of the 2008 workshop on New security paradigms (pp. 23-31). ACM | international |
doc-1183 | journal | Adaptive Random Re-Routing for Differentiated QoS in Sensor Networks |
|
Aug-2008 | Computer Journal, 53(7), 1052-1061 | collaborative |
doc-1196a | external conference | Latency of Opportunistic Forwarding in Finite Regular Wireless Networks |
|
Aug-2008 | Proceedings of the fifth international workshop on Foundations of mobile computing (pp. 55-64). ACM | international |
doc-1205 | external conference | Assault and PEPA |
|
Aug-2008 | the 7th Workshop on Process Algebra and Stochastically Timed Activities (PASTA 2008), Edinburgh, UK, July 30-31, 2008 | single institute |
doc-1372 | book chapter | Communications for Agent-Based Human Team Support |
|
Aug-2008 | Handbook of research on multi-agent dystems: Semantics and dynamics of organizational models (2009): 285 | international |
doc-1373 | book chapter | Personal Assistants for Human Organizations |
|
Aug-2008 | book chapter in V. Dignum (ed), Organizations in Multi-Agent Systems, an IGI-Global (http://www.igi-pub.com/) Handbook of Research, Information Science Reference | single institute |
doc-1378 | journal | On the Study of Network Coded AF Transmission Protocol for Wireless Multiple Access Channels Variants: doc-x0033 |
|
Aug-2008 | Wireless Communications, IEEE Transactions on, 7(11), 4568-4574 | collaborative |
doc-x0025 | book chapter | Quality of Sensor-originated Information in Coalition Information Networks |
|
Aug-2008 | Network Science for Military Coalition Operations: Information Exchange and Interaction, D. Verma, Ed. IGI Global (2010) | international |
doc-x0030 | book chapter | The Network-Extended Mind |
|
Aug-2008 | Network Science for Military Coalition Operations: Information Exchange and Interaction, D. Verma, Ed. IGI Global (2010) | international |
doc-x0088 | external conference | A data-intensive lightweight semantic wrapper approach to aid information integration |
|
Jul-2008 | 4th International Workshop on Contexts and Ontologies (C&O 2008), Patraz, Greece, 21 - 22 Jul 2008 | international |
doc-1173 | external conference | A Multidimensional Approach to Studying Cultural Differences and Coping Strategies in a Multinational Coalition Environment |
|
Jun-2008 | International Command and Control Research Technology Symposium (ICCRTS), 2008 | international |
doc-1174 | external conference | Social sensemaking in multinational groups: a common ground approach |
|
Jun-2008 | International Command and Control Research Technology Symposium (ICCRTS), 2008 | international |
doc-1203a | external conference | Acoustic Information Fusion for Ground Vehicle Classification |
|
Jun-2008 | 11th International Conference on Information FUSION | international with government |
doc-1212 | external conference | An Algebra for Integration and Analysis of Ponder2 Policies |
|
Jun-2008 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 | collaborative |
doc-1215 | external conference | Maximizing Utility of Sensor-Mission Assignment with Uncertain Demands Variants: doc-1483 |
|
Jun-2008 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2008 | international |
doc-1216 | external conference | Content Distribution in VANETs using Network Coding: The Effect of Disk I/O and Processing O/H Variants: doc-1526 |
|
Jun-2008 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 | collaborative |
doc-1217a | external conference | How to Enable Policy-based Interactions in Dynamic Wireless Networks? |
|
Jun-2008 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 | international |
doc-1218a | external conference | Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors |
|
Jun-2008 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 | international |
doc-1220a | external conference | Broadcasting Info-Pages to Sensors: Efficiency vs. Energy Conservation Variants: doc-x0420 |
|
Jun-2008 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 | collaborative |
doc-1221 | external conference | Frugal Sensor Assignment Variants: doc-1451 |
|
Jun-2008 | IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), 2008 | international |
doc-1233a | external conference | The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment |
|
Jun-2008 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 | international |
doc-1389b | external conference | Distributed Utility-Based Sensor Rate Adaptation Protocols for Missions with Differentiated Priorities |
|
Jun-2008 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 | collaborative |
doc-x0003 | external conference | Intelligence, Surveillance, and Reconnaissance fusion for coalition operations |
|
Jun-2008 | 11th International Conference on Information FUSION | international with government |
doc-x0004 | external conference | Policy-enabled ITA sensor fabric for the validation of experimental algorithms using real and simulated sensors |
|
Jun-2008 | IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2008 | international with government |
doc-x0148 | external conference | Mobility models for wireless networks: Challenges, Pitfalls, and Successes |
|
Jun-2008 | Principles of Advanced and Distributed Simulation, 2008. PADS'08. 22nd Workshop on (pp. 3-3). IEEE | single institute |
doc-x0183 | external conference | TCP performance in coded wireless mesh networks |
|
Jun-2008 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008 | collaborative |
doc-1110d | external conference | Expressive Policy Analysis with Enhanced System Dynamicity Variants: doc-1110b |
|
May-2008 | ESORICS, October 2008 | international |
doc-1159 | external conference | Bio-inspired Multi-Agent Collaboration for Urban Monitoring Applications |
|
May-2008 | Bio-Inspired Computing and Communication (pp. 204-216). Springer Berlin Heidelberg. | international |
doc-1179 | external conference | Security And Anonymity Of Identity-Based Encryption With Multiple Trusted Authorities |
|
May-2008 | Pairing-Based Cryptography-Pairing 2008 (pp. 354-375). Springer Berlin Heidelberg | single institute |
doc-1192a | external conference | Command Dialogues |
|
May-2008 | Argumentation in Multi-Agent Systems (ArgMAS), 2008 | international |
doc-1194 | external conference | Low-Power High-Accuracy Timing Systems for Efficient Duty Cycling |
|
May-2008 | Proceedings of the 2008 international symposium on Low Power Electronics & Design (pp. 75-80). ACM | collaborative |
doc-1199a | external conference | MLS Security Policy Evolution with Genetic Programming |
|
May-2008 | Proceedings of the 10th annual conference on Genetic and evolutionary computation (pp. 1571-1578). ACM | international |
doc-1201 | external conference | A Role-based Infrastructure for the Management of Dynamic Communities Variants: doc-1527 |
|
May-2008 | Resilient Networks and Services (pp. 1-14). Springer Berlin Heidelberg | international |
doc-1202 | external conference | A Middleware Framework for Market-Based Actuator Coordination in Sensor and Actuator Networks |
|
May-2008 | Proceedings of the 5th international conference on Pervasive services (pp. 101-110). ACM | collaborative |
doc-1211a | external conference | Policy Evolution using Genetic Programming: A comparison of three approaches |
|
May-2008 | Evolutionary Computation, 2008. CEC 2008.(IEEE World Congress on Computational Intelligence). IEEE Congress on (pp. 1792-1800). IEEE | international |
doc-1213a | external conference | Hypothesis Pruning and Ranking for Large Plan Recognition Problems |
|
May-2008 | Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (AAAI-08) Vol. 8, pp. 998-1003, June 2008 | collaborative |
doc-1219a | journal | Utility-Based Adaptation in Mission-oriented Wireless Sensor Networks |
|
May-2008 | ACM Transactions on Sensor Networks (TOSN), 8(2), 17 | collaborative |
doc-1222 | external conference | Adaptive Military Behaviour in a Collaborative Simulation |
|
May-2008 | Proceedings of the 2008 Summer Computer Simulation Conference (p. 34). Society for Modeling & Simulation International | international |
doc-1224a | external conference | Connectivity in Cooperative Wireless Ad Hoc Networks Variants: doc-1224b |
|
May-2008 | Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing (pp. 121-130). ACM | collaborative |
doc-1227 | external conference | A Cost-Quality Tradeoff in Cooperative Sensor Networking |
|
May-2008 | IEEE International Conference on Communications (ICC), 2008 | single institute |
doc-1228a | external conference | Robust and Efficient Plan Recognition for Dynamic Multi-Agent Teams |
|
May-2008 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2008 | collaborative |
doc-1232 | external conference | Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing (pp. 381-390). ACM |
|
May-2008 | ACM Mobihoc 2008 | international |
doc-1235 | external conference | A Distributed Cooperative Target Tracking with Binary Sensor Networks |
|
May-2008 | IEEE International Conference on Communications (ICC), 2008 | single institute |
doc-1239 | external conference | Cultural Network Analysis: Characterizing Target Audience Cognition |
|
May-2008 | Proceedings of the 2008 Phoenix Challenge Conference on Information Operations, April 2008, Monterey CA. | single institute |
doc-1246a | external conference | Automated Requirements-Driven Definition of Norms for the Regulation of Behavior in Multi-Agent Systems Variants: doc-1506a |
|
May-2008 | Proceedings of the AISB Workshop on Behaviour Regulation in Multi-Agent Systems (AISB'08) (pp. 43-48) | international |
doc-1247 | external conference | A Model of Human Teamwork for Agent-Assisted Search Operations |
|
May-2008 | NATO Research and Technology Organisation: Human Factors and Medicine Panel Symposium (NATO HFM-142/RTO Symposium), NATO RTA / HFM, B.P. 25, 7 Rue Ancelle, F-92201 Neuilly-sur-Seine Cedex, France, April, 2008 | international |
doc-1384a | journal | A Circulatory System Approach for Wireless Sensor Networks Variants: doc-1384c |
|
May-2008 | Ad-Hoc Networks, July 2008 | collaborative with government |
doc-1386 | journal | Mitigating Performance Degradation in Congested Sensor Networks |
|
May-2008 | IEEE Transactions on Mobile Computing, 7(6):682-697, 2008 | collaborative |
doc-1388 | external conference | Biologically Inspired Self Selective Routing with Preferred Path Selection |
|
May-2008 | Bio-Inspired Computing and Communication (pp. 229-240). Springer Berlin Heidelberg | single institute |
doc-1390 | journal | Self-Selecting Reliable Paths for Wireless Sensor Network Routing |
|
May-2008 | Computer Communication Journal, April 2008 | collaborative |
doc-1391a | journal | Gait Feature Subset Selection by Mutual Information Variants: doc-1282 |
|
May-2008 | IEEE Transactions on Systems, Man, and Cybernetics April 2008 | single institute |
doc-1521 | tech report | A Computational Framework for Quality of Information Analysis for Detection-Oriented Sensor Network Deployments Variants: doc-1154 |
|
May-2008 | invited talk at UoMd, College Park, MD, USA, Feb. 12, 2008 | single institute |
doc-x0099 | external conference | A sensor placement algorithm for redundant covering based on riesz energy minimization |
|
May-2008 | ISCAS 2008. IEEE International Symposium on (pp. 2074-2077). IEEE | single institute |
doc-1243a | external conference | Threshold RSA for Dynamic and Ad-Hoc Groups |
|
Apr-2008 | IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008 | collaborative |
doc-1244 | external conference | On Data Centric Trust Establishment in Ephemeral Ad-Hoc Networks |
|
Apr-2008 | IEEE International Conference on Computer Communications (InfoCom), 2008 | collaborative |
doc-x0132 | external conference | Enhancing Energy Efficiency for Routing in Sensor Networks with a Detection Mission |
|
Apr-2008 | IPSN 2008 (International Conference on Information Processing in Sensor Networks), April 22-24, 2008 | single institute |
doc-x0632 | tech report | IT security as risk management: A research perspective |
|
Apr-2008 | IBM Research Report RC24529 (April 2008) | single institute |
doc-x0779 | external conference | Predicate encryption supporting disjunctions, polynomial equations, and inner products Variants: doc-x2004 |
|
Apr-2008 | IACR Annual Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2008 | collaborative |
doc-x0826 | external conference | Reliability gain of network coding in lossy wireless networks |
|
Apr-2008 | IEEE International Conference on Computer Communications (InfoCom), 2008 | collaborative |
doc-1249 | external conference | Cooperative Transmit-Power Estimation in MANETs |
|
Mar-2008 | IEEE Wireless Communications and Networking Conference (WCNC), 2008 | international |
doc-1250 | external conference | Addressing Practical Challenges in Utility Optimization of Mobile Wireless Sensor Networks Variants: doc-1177 |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | international |
doc-1251a | external conference | Matching Sensors to Missions using a Knowledge-Based Approach |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | international with government |
doc-1252 | external conference | On the Resiliency of Wireless Sensor Networks with Circulation Graphs |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | collaborative with government |
doc-1253 | external conference | A Biologically-Inspired MANET Architecture |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | international with government |
doc-1255 | external conference | Using stochastic process algebra models to estimate the quality of information in military sensor networks |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | international |
doc-1583a | external conference | Location Dependent Heuristics for Sensor Coverage Planning Variants: doc-1517 |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | international |
doc-x0005 | external conference | Policy-enabled interconnection of sensor networks |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | collaborative with government |
doc-x0054 | external conference | Policy enabled interconnection of sensor networks using a message queue infrastructure |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | collaborative with government |
doc-x0055 | external conference | The challenge of sensor information processing and delivery within network and information science research |
|
Mar-2008 | International Society for Optics and Photonics - Defense, Security and Sensing, 2008 | international with government |
doc-x0056 | external conference | US-UK ITA Sensor Information Processing & Delivery |
|
Mar-2008 | SET-130 Symposium on NATO Military Sensing, Orlando, FL, Mar 2008. | international with government |
doc-x1038 | journal | Creating physically embodied agents using realistic human motion models |
|
Mar-2008 | Journal on Simulation and Gaming, special Issue on AI techniques, Vol. 39, No. 1, pp. 64-82 | collaborative |
doc-1193a | external conference | Inter-Domain Routing for Mobile Ad Hoc Networks |
|
Feb-2008 | Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture (pp. 61-66). ACM | international |
doc-1209 | external conference | Enabling Accurate Node Control in Randomized Duty Cycling Networks Variants: doc-1466 |
|
Feb-2008 | Distributed Computing Systems, 2008. ICDCS'08. The 28th International Conference on (pp. 123-132). IEEE | single institute |
doc-1210 | external conference | Compact forbidden-set routing on planar graphs |
|
Feb-2008 | SPAA 2008 | collaborative |
doc-1229 | external conference | On the design of a quality-of-service driven routing protocol for wireless cooperative networks |
|
Feb-2008 | Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE (pp. 624-628). IEEE | single institute |
doc-1230 | external conference | Connectivity check in 3-connected planar graphs with obstacles |
|
Feb-2008 | International Conference on Topological and Geometric Graph Theory, Paris, 2008 | collaborative |
doc-1240a | external conference | NITELIGHT: A Graphical Tool for Semantic Query Construction |
|
Feb-2008 | Semantic Web User Interaction Workshop (SWUI 2008) at CHI 2008, Florence, Italy. | collaborative |
doc-1241b | external conference | US/UK Mental Models of Planning: The Relationship between Plan Detail and Plan Quality |
|
Feb-2008 | NATO RTO HFM-142 Symposium on Adaptability in Coalition Teamwork, 21-23 April 2008, Copenhagen, Denmark | international |
doc-1242 | external conference | Linguistic Sources of Coalition Miscommunication |
|
Feb-2008 | NATO RTO HFM-142 Symposium on Adaptability in Coalition Teamwork, Copenhagen, Denmark | international with government |
doc-1256 | journal | A New Privacy Enhanced Matchmaking Protocol |
|
Feb-2008 | IEICE Transactions on Communications, 96(8), 2049-2059 | collaborative |
doc-1394 | journal | Sequence Alignment for Masquerade Detection |
|
Feb-2008 | Computational Statistics & Data Analysis 52.8 (2008): 4116-4131. | collaborative |
doc-1398a | journal | Web 3.0: Chicken Farms on the Semantic Web |
|
Feb-2008 | Computer, 41(1), 106-108 (2008) | single institute |
doc-1530 | tech report | Framework for Sensors System: Data Fusion and Information Dissemination |
|
Feb-2008 | Technical report | international |
doc-1531 | journal | On the combination of cooperative diversity and network coding for wireless uplink transmissions |
|
Feb-2008 | Vehicular Technology, IEEE Transactions on, 60(4), 1590-1601. | single institute |
doc-x0238 | tech report | Bootstrapping coalition manets |
|
Feb-2008 | international | |
doc-x0085 | book chapter | Policy evolution with grammatical evolution Variants: doc-1499 |
|
2008 | Simulated Evolution and Learning (pp. 71-80). Springer Berlin Heidelberg | international |
doc-x0102 | external conference | A visual approach to semantic query design using a web-based graphical query designer |
|
2008 | Knowledge Engineering: Practice and Patterns (pp. 275-291). Springer Berlin Heidelberg | international |
doc-x0105 | external conference | An analysis of the origin of ontology mismatches on the semantic web |
|
2008 | Knowledge Engineering: Practice and Patterns (pp. 120-135). Springer Berlin Heidelberg | single institute |
doc-x0127 | external conference | Efficient handling of adversary attacks in aggregation applications |
|
2008 | Computer Security-ESORICS 2008 (pp. 66-81). Springer Berlin Heidelberg | collaborative |
doc-x0165 | external conference | POAF: Portable ontology aligned fragments |
|
2008 | International Workshop on Ontologies: Reasoning and Modularity (WORM 2008), Tenerife, Spain | collaborative |
doc-x0175 | external conference | Securing grid workflows with trusted computing |
|
2008 | Computational Science-ICCS 2008 (pp. 510-519). Springer Berlin Heidelberg | single institute |
doc-x0194 | external conference | XCXO: An ultra-low cost ultra-high accuracy clock system for wireless sensor networks in harsh remote outdoor environments |
|
2008 | ISSCC/DAC'08 | collaborative |
doc-x0203 | journal | Computing with time: from neural networks to sensor networks |
|
2008 | The Computer Journal, 51(4), 511-522 | single institute |
doc-x0205 | journal | CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast |
|
2008 | Computer Communications, 31(15), 3672-3682 | collaborative |
doc-x0209 | journal | Exploiting manufacturing variations for compensating environment-induced clock drift in time synchronization |
|
2008 | ACM SIGMETRICS Performance Evaluation Review, 36(1), 97-108 | collaborative |
doc-x0222 | journal | Secure time synchronization in sensor networks |
|
2008 | ACM Transactions on Information and System Security (TISSEC), 11(4), 23 | collaborative |
doc-x0226 | journal | The Extended Mind and Network-Enabled Cognition |
|
2008 | The Computer Journal | international |
doc-x0234 | tech report | A coordination-theoretic approach to understanding process differences |
|
2008 | MIT Sloan Research Paper No. 4637-07 | collaborative |
doc-x0242 | tech report | Knowledge representation and query in semantic MediaWiki: a formal study |
|
2008 | Tetherless World Constellation (RPI) Technical Report | single institute |
doc-x0244 | tech report | Optimal labelling for connectivity checking in planar networks with obstacles |
|
2008 | collaborative | |
doc-x0774 | book chapter | Policy technologies for self-managing systems |
|
2008 | Pearson Education. | single institute |
doc-1207 | external conference | Near-Optimal Co-ordinated Coding in Wireless Multihop Networks |
|
Dec-2007 | ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2007 | collaborative |
doc-1226a | external conference | Robust Routing in Networks With Time-Varying Links |
|
Dec-2007 | ACM Conference on emerging Networking EXperiments and Technologies (CoNEXT), 2007 | single institute |
doc-x0197 | journal | 4GM@ 4GW: Implementing 4G in the Military Mobile Ad-Hoc Network Environment |
|
Dec-2007 | IJCSNS, 7(4), 70. | collaborative |
doc-1129a | external conference | Player Collaboration in Virtual Environments using Hierarchical Task Network Planning |
|
Nov-2007 | Applications and Innovations in Intelligent Systems XV. Springer London, 2008. 203-216 | collaborative |
doc-1237b | external conference | Network Domain Entrypoint/path Detemination for DDoS Attacks |
|
Nov-2007 | Network Operations and Management Symposium, 2008. NOMS 2008. IEEE (pp. 57-64). IEEE | collaborative |
doc-1259a | external conference | Enhanced TCP SYN Attack Detection |
|
Nov-2007 | IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM) | collaborative |
doc-1262a | external conference | Covering With Inexactly Placed Sensors |
|
Nov-2007 | !7th Fall Workshop on Computational and Combinatorial Geometry (FWCG 2007), Hawthorne, NY | single institute |
doc-1263 | external conference | A Framework for QoI-inspired Analysis for Sensor Network Deployment Planning Variants: doc-1581 |
|
Nov-2007 | Proceedings of the 3rd international conference on Wireless internet (p. 28). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) | collaborative |
doc-1265 | tech report | Overview of MEMBRANE and ITA Projects on Mesh and Cooperative Networks |
|
Nov-2007 | the opening speech at the IET Seminar on Smart Antennas and Cooperative Communications, October 22, 2007, London, UK | single institute |
doc-1279a | external conference | Capacity of a Wireless Ad Hoc Network with Infrastructure Variants: doc-1279c |
|
Nov-2007 | Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 239-246). ACM | collaborative |
doc-1282 | journal | Gait Feature Subset Selection by Mutual Information Variants: doc-1391a |
|
Nov-2007 | Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 39(1), 36-46 | single institute |
doc-1289 | external conference | Beta Random Projection |
|
Nov-2007 | Bio-Inspired Computing and Communication (pp. 319-331). Springer Berlin Heidelberg | single institute |
doc-1290 | external conference | Wavelet-domain statistics of packet switching networks near traffic congestion |
|
Nov-2007 | Bio-Inspired Computing and Communication (pp. 268-279). Springer Berlin Heidelberg | collaborative |
doc-1326a | external conference | Neighborhood Changing Rate: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios |
|
Nov-2007 | Wireless on Demand Network Systems and Services, 2007. WONS'07. Fourth Annual Conference on (pp. 38-45). IEEE | collaborative |
doc-1392b | journal | DARE: A System for Distributed Abductive Reasoning |
|
Nov-2007 | Autonomous Agents and Multi-Agent Systems, 16(3), 271-297 | single institute |
doc-1393a | book chapter | Managing Intelligence Resources Using Semantic Matchmaking and Argumentation |
|
Nov-2007 | M Pechoucek, S G Thompson, & H Voos, Defense Industry Applications of Autonomous Agents and Multi-Agent Systems, Birkhauser, pages 33-50, 2008. [ISBN: 978-3-7643-8570-5] | collaborative |
doc-1395a | journal | Computing with Time: From Neural Networks to Wireless Networks Best paper in volume 51 award |
|
Nov-2007 | Computer Journal, vol.51, 2008 | single institute |
doc-1397 | journal | Naming Games in Two-Dimensional and Small-World-Connected Random Geometric Networks |
|
Nov-2007 | Physical Reviews E, vol. 77, 2008 | single institute |
doc-1400 | journal | The International Technology Alliance in Network and Information Sciences |
|
Nov-2007 | IEEE Intelligent Systems, Vol. 22, No. 5, September/October 2007 | international |
doc-1526 | tech report | Content Distribution in VANETs using Network Coding: The Effect of Disk I/O and Processing O/H Variants: doc-1216 |
|
Nov-2007 | UCLA CSD Technical Report | collaborative |
doc-1527 | tech report | A Role-based Infrastructure for the Management of Dynamic Communities Variants: doc-1201 |
|
Nov-2007 | international | |
doc-1533 | external conference | Inter-domain Routing over Mobile Ad-hoc Networks |
|
Nov-2007 | HotMobile, 2008 | international |
doc-1534 | tech report | Risk Modulating Factors in Risk-Based Access Control for Information in a MANET |
|
Nov-2007 | IBM Research report | single institute |
doc-1535 | tech report | Unifying MANET safety and Security |
|
Nov-2007 | Report ITA/TR/2007/02 | collaborative |
doc-1536 | tech report | Dynamic Trust and Risk Management in MANETs |
|
Nov-2007 | collaborative | |
doc-x0131 | external conference | Enhanced perimeter routing for geographic forwarding protocols in urban vehicular scenarios |
|
Nov-2007 | IEEE Global Communications Conference (GlobeCom), 2007 | collaborative |
doc-1260a | external conference | Secure Dynamic Community Establishment in Coalitions |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | international |
doc-1264b | external conference | Network Coding Performance for Reliable Multicast |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | collaborative |
doc-1266a | external conference | MIMO and TCP: A Case for Cross Layer Design |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | collaborative |
doc-1271a | external conference | Key Refreshing in Identity-based Cryptography and its Application in MANETs |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | international |
doc-1273a | external conference | Efficient Trust Authority Distribution in Tactical MANET Environments |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | single institute |
doc-1277a | external conference | Context Aware Information Retrieval for Enhanced Situation Awareness |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | international |
doc-1278a | external conference | MIMO-Cast: A Cross-Layer Ad Hoc Multicast Protocol Using MIMO Radios |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | collaborative |
doc-1541d | external conference | NCR: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios, and Its Analytic Study Variants: doc-1327 |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | collaborative |
doc-1554b | external conference | Performance of Network-Coding in Multi-Rate Wireless Environments for Multicast Applications Variants: doc-1554a |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | collaborative |
doc-1561a | external conference | Achievable Rates for Network Coding on the Exchange Channel Variants: doc-1561b |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | international |
doc-1566e | external conference | Approaching semantically-mediated acoustic data fusion Variants: doc-1566a |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | international with government |
doc-x0128 | external conference | Empirical study of topology effects on diagnosis in computer networks |
|
Oct-2007 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2007 | single institute |
doc-x0313 | external conference | A first cut of the military QoI attribute space and hypothesis structure for abductive reasoning |
|
Oct-2007 | IEEE Military Communications Conference, 2007 | single institute |
doc-1280 | internal conference | Mobile Ad-hoc Inter-domain Network Routing |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1283a | external conference | Study of a Bus-Based Disruption-Tolerant Network: Mobility Modeling and Impact on Routing |
|
Sep-2007 | Annual International Conference on Mobile Computing and Networking, 2007 | collaborative |
doc-1361c | internal conference | Cognitive and Self-Healing Routing for Sensor Networks Variants: doc-1361a |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1384c | internal conference | A Circulatory System Approach for Wireless Sensor Networks Variants: doc-1384a |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1529 | internal conference | Policy Authoring, Verification, and Deployment. Poster presentation and prototype demonstration |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1538 | internal conference | An Ontology-Based Approach to Sensor-Mission Assignment |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1539 | internal conference | Toward a Formal Characterization of Policy Specification and Analysis |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1540 | internal conference | Conversation Analysis of Coalition Communication in Computational Pragmatics |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1541a | internal conference | NCR: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios, and Its Analytic Study Variants: doc-1541d |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1542 | internal conference | Quality of Information in Sensor Networks Variants: doc-1890 |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1543 | internal conference | Progress on the Collaborative Planning Model |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1546 | internal conference | A Distributed Test Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1547 | internal conference | Towards a Model of Agent-Assisted Team Search |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1548 | internal conference | Policy Algebras for Hybrid Firewalls Variants: doc-1587 |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1549 | internal conference | Sensor-Mission Matching: Centralized and Distributed Approaches |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1550 | internal conference | Threat Modelling for Mobile Ad Hoc and Sensor Networks |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1551 | internal conference | The Case for an Agile SOA |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1554a | internal conference | Performance of Network-Coding in Multi-Rate Wireless Environments for Multicast Applications Variants: doc-1554b |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1555 | internal conference | Reliability Gain of Network Coding |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1558 | internal conference | A Coordination-Theoretic Model of the Military Decision-Making Process |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1559b | internal conference | Full Coverage of a Region Allowing Inexact Placement of Sensors Variants: doc-1559a |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1560 | internal conference | Cultural Network Analysis |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1561b | internal conference | Achievable Rates of Physical Layer Network Coding Schemes on the Exchange Channel Variants: doc-1561a |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1562a | internal conference | On the study of cross-layer optimization for wireless cooperative networks |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1562b | internal conference | On the Cross-layer optimization for wireless cooperative networks |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1563a | internal conference | On the Capacity of Network Coding with Diversity Variants: doc-1563b |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1563b | internal conference | On the Capacity of Network Coding with Diversity Variants: doc-1563a |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1564 | internal conference | Semantic Technologies and Enhanced Situation Awareness |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1565 | internal conference | Formal Properties of Distributed Database Networks |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1566a | internal conference | Approaching Semantically-Mediated Acoustic Data Fusion Variants: doc-1566e |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1567 | internal conference | Using Stochastic Process Algebras to Measure Quality of Information |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1568 | internal conference | Inspect: A General Framework for On-Line Detection and Diagnosis of Sensor Faults |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1570 | internal conference | Managing Collaboration in Hybrid-Agent Teams |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | international |
doc-1576 | internal conference | An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | single institute |
doc-1581 | internal conference | A framework for QoI-inspired analysis for sensor network deployment planning Variants: doc-1263 |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1584 | internal conference | Identity Crisis: On the Problem of Namespace Design for ID-PKC and MANETs Variants: doc-x0212 |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-x0150 | external conference | Modeling of a bus-based disruption tolerant network trace |
|
Sep-2007 | ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2007 | collaborative |
doc-x0174 | external conference | Secure incentives for commercial ad dissemination in vehicular networks Variants: doc-x0221 |
|
Sep-2007 | Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 150-159). ACM | collaborative |
doc-x0178 | external conference | SET: Detecting node clones in sensor networks |
|
Sep-2007 | Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on (pp. 341-350). IEEE | single institute |
doc-x0502 | internal conference | Distributed utility optimization in mission-oriented wireless sensor networks |
|
Sep-2007 | 1st Annual Conference of the International Technology Alliance | collaborative |
doc-1257 | external conference | Sensor Assignment In Virtual Environments Using Constraint Programming |
|
Aug-2007 | Applications and Innovations in Intelligent Systems XV (pp. 333-338). Springer London | collaborative |
doc-1269a | external conference | Efficient Plan Recognition for Dynamic Multi-agent Teams |
|
Aug-2007 | Grace Hopper Women in Computer Science Conference (pp. 204-208) | collaborative |
doc-1274a | external conference | Managing Conflict Resolution in Norm-Regulated Environments |
|
Aug-2007 | Engineering Societies in the Agents World VIII (pp. 55-71). Springer Berlin Heidelberg | collaborative |
doc-1288 | external conference | SHR: Self-Healing Routing for Wireless ad hoc Sensor Networks |
|
Aug-2007 | Proc. Intern. Symp. Performance Evaluation of Computer and Telecommunication Systems SPECTS (Vol. 7, pp. 5-14) | collaborative |
doc-1295a | external conference | First Experience with CarTorrent in a Real Vehicular Ad Hoc Network Testbed |
|
Aug-2007 | 2007 Mobile Networking for Vehicular Environments (pp. 109-114). IEEE | collaborative |
doc-1296a | external conference | Evaluating Vehicle Network Strategies for Downtown Portland: Opportunistic Infrastructure and the Importance of Realistic Mobility Models |
|
Aug-2007 | Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking (pp. 47-51). ACM | collaborative |
doc-1298a | external conference | Efficient Distribution of Trust Authority Functions in Tactical Networks |
|
Aug-2007 | Information Assurance and Security Workshop, 2007. IAW'07. IEEE SMC (pp. 84-91). IEEE | single institute |
doc-1327 | external conference | NCR: A Unifying Parameter to Characterize and Evaluate Data Dissemination Scenarios, and its Analytic Study Variants: doc-1541d |
|
Aug-2007 | IEEE Wireless On Line Networked Systems (WONS), Innsbruck, Austria, January 2007 | collaborative |
doc-1361a | journal | Cognitive and Self-Healing Routing for Sensor Networks Variants: doc-1361c |
|
Aug-2007 | Computational Management Science, DOI: 10.1007/s10287-009-0102-y | international |
doc-1381a | journal | Distributed beamforming and power allocation for cooperative networks |
|
Aug-2007 | Wireless Communications, IEEE Transactions on, 7(5), 1817-1822 | collaborative |
doc-1382a | journal | Bio-inspired Multi-Agent Data Harvesting in a Proactive Urban Monitoring Environment |
|
Aug-2007 | Special Issue on "Bio-Inspired Computing and Communication in Wireless Ad Hoc and Sensor Networks" Elsevier Ad Hoc Networks Journal | international |
doc-1401 | journal | A diffusion model for packet travel time in a random multi-hop medium |
|
Aug-2007 | ACM Transactions on Sensor Networks, 2(3), June 2007 | single institute |
doc-x0191 | external conference | Universally-composable two-party computation in two rounds |
|
Aug-2007 | IACR Annual International Cryptology Conference (CRYPTO), 2007 | single institute |
doc-x0192 | external conference | Using Sensors Sensability Toward Sensor Localization and K-Coverage Problems |
|
Aug-2007 | Proceedings of the Sixth IASTED International Conference on Communication Systems and Networks (pp. 210-217). ACTA Press | single institute |
doc-1292 | external conference | Privacy Preserving Communication in MANETs |
|
Jun-2007 | IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2007 | collaborative |
doc-x0023 | journal | A new paradigm in International Collaboration: The US-UK International Technology Alliance in Network and Information Sciences |
|
Jun-2007 | RUSI Defence Systems | international with government |
doc-1299 | external conference | Evidential Reasoning in Bipolar Argumentation Frameworks |
|
May-2007 | Argumentation in Multi-Agent Systems (ArgMAS), 2007 | collaborative |
doc-1305 | external conference | Policy Recognition for Multi-Player Tactical Scenarios |
|
May-2007 | International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2007 | collaborative |
doc-x0114 | external conference | Bounds on the gain of network coding and broadcasting in wireless networks |
|
May-2007 | IEEE International Conference on Computer Communications (InfoCom), 2007 | single institute |
doc-x0147 | external conference | Mobile Agents and the Deus Ex Machina |
|
May-2007 | AINA Workshops (2) (pp. 486-492) | single institute |
doc-1316 | external conference | Quality of information trade-offs in the detection of transient phenomena |
|
Apr-2007 | International Society for Optics and Photonics - Defense, Security and Sensing, 2007 | single institute |
doc-1318 | external conference | Self-Healing Routing: A Study in Efficiency and Resiliency of Data Delivery in Wireless Sensor Networks |
|
Apr-2007 | International Society for Optics and Photonics - Defense, Security and Sensing, 2007 | collaborative |
doc-x0101 | external conference | A survey of sensor selection schemes in wireless sensor networks |
|
Apr-2007 | International Society for Optics and Photonics - Defense, Security and Sensing, 2007 | collaborative |
doc-x0109 | external conference | Assessing the transmission of Commander's Intent |
|
Apr-2007 | Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 413-417). IEEE | single institute |
doc-x0130 | external conference | Energy saving in joint acoustic-video target detection and tracking |
|
Apr-2007 | International Society for Optics and Photonics - Defense, Security and Sensing, 2007 | single institute |
doc-x0138 | external conference | Geometric considerations distribution of sensors in ad-hoc sensor networks |
|
Apr-2007 | International Society for Optics and Photonics - Defense, Security and Sensing, 2007 | collaborative |
doc-x0145 | external conference | Maximizing the data utility of a data archiving & querying system through joint coding and scheduling |
|
Apr-2007 | Proceedings of the 6th international conference on Information processing in sensor networks (pp. 244-253). ACM | collaborative |
doc-x1033 | external conference | Holistan: A futuristic scenario for international coalition operations Variants: doc-x1034 |
|
Apr-2007 | Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 423-427). IEEE | international |
doc-1317a | external conference | A Mobile Delay-tolerant Approach to Long-term Energy-efficient Underwater Sensor Networking |
|
Mar-2007 | IEEE Wireless Communications and Networking Conference (WCNC), 2007 | collaborative |
doc-1334b | external conference | On Sensor Sampling and Quality of Information: A starting point Variants: doc-1334a |
|
Mar-2007 | IEEE International Conference on Pervasive Computing and Communications (PerCom), 2007 | single institute |
doc-x0121 | external conference | Cultural Issues in Coalition Planning |
|
Mar-2007 | Knowledge Systems for Coalition Operations (KSCO), 2007 | international with government |
doc-x1034 | external conference | Holistan: A futuristic scenario for international coalition operations Variants: doc-x1033 |
|
Mar-2007 | Knowledge Systems for Coalition Operations (KSCO), 2007 | international |
doc-1224b | tech report | Connectivity in Cooperative Wireless Ad Hoc Networks Variants: doc-1224a |
|
Jan-2007 | collaborative | |
doc-1275b | external conference | A Survey of Bots Used for Distributed Denial of Service Attacks |
|
Jan-2007 | New Approaches for Security, Privacy and Trust in Complex Environments (pp. 229-240). Springer US | collaborative |
doc-1276 | external conference | Towards Supporting Interactions between Self-Managed Cells |
|
Jan-2007 | Self-Adaptive and Self-Organizing Systems, 2007. SASO'07. First International Conference On (pp. 224-236). IEEE | collaborative |
doc-1279c | tech report | Capacity of a Wireless Ad Hoc Network with Infrastructure Variants: doc-1279a |
|
Jan-2007 | UMass Technical Report 07-14 | collaborative |
doc-1286 | external conference | Distributed Cooperative Sensor Networks Using Intelligent Adaptive Antennas |
|
Jan-2007 | Geoscience and Remote Sensing Symposium, 2007. IGARSS 2007. IEEE International (pp. 2931-2934). IEEE | single institute |
doc-1300 | external conference | The semantic battlespace infosphere: a knowledge infrastructure for improved coalition inter-operability |
|
Jan-2007 | Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 390-395). IEEE | single institute |
doc-1302 | external conference | Understanding Process Differences: Agreeing Upon a Single Way to Skin a Cat |
|
Jan-2007 | Integration of Knowledge Intensive Multi-Agent Systems, 2007. KIMAS 2007. International Conference on (pp. 446-451). IEEE | collaborative |
doc-1306a | external conference | Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics (pp. 1-10). Springer Berlin Heidelberg |
|
Jan-2007 | EVOBIO 2007 | collaborative |
doc-1312 | invited talk | Topology control and data dissemination in wireless networks - Why look for biological inspirations? |
|
Jan-2007 | single institute | |
doc-1314 | external conference | Issues in Designing a Policy Language for Distributed Management of IT Infrastructures |
|
Jan-2007 | Integrated Network Management, 2007. IM'07. 10th IFIP/IEEE International Symposium on (pp. 30-39). IEEE | single institute |
doc-1319 | external conference | BlueTorrent: Cooperative Content Sharing for Bluetooth Users |
|
Jan-2007 | Pervasive and Mobile Computing, 3(6), 609-634 | single institute |
doc-1323 | external conference | FiG: Automatic Fingerprint Generation |
|
Jan-2007 | Symposium on Network and Distributed Systems Security (NDSS), Feb 2007 | single institute |
doc-1324 | external conference | Argumentation Based Contract Monitoring in Uncertain Domains |
|
Jan-2007 | 20th International Joint Conference on Artificial Intelligence, 2007 | collaborative |
doc-1325 | external conference | On the Development of an Internetwork-centric Defense for Scanning Worms Variants: doc-1364a |
|
Jan-2007 | Proc. 40th Hawaii International Conference for System Sciences (HICSS-40), IEEE Computer Society 28(7), 637-647, January 2007 | collaborative |
doc-1328 | external conference | Argument Based Contract Enforcement |
|
Jan-2007 | Research and Development in Intelligent Systems XXIII (pp. 145-158). Springer London | collaborative |
doc-1330 | journal | A Reusable Commitment Management Service using Semantic Web Technology |
|
Jan-2007 | Knowledge-Based Systems, to appear, 2007 | collaborative |
doc-1332 | external conference | Secure Hierarchical In-Network Aggregation in Sensor Networks |
|
Jan-2007 | Proceedings of the 13th ACM conference on Computer and communications security (pp. 278-287). ACM | single institute |
doc-1333 | external conference | Black-box Anomaly Detection: Is it Utopian? |
|
Jan-2007 | Proceedings of HotNets, Nov 2006 | collaborative |
doc-1334a | tech report | On Sensor Sampling and Quality of Information: A starting point Variants: doc-1334b,doc-1334d |
|
Jan-2007 | IBM Research Report RC24067, Oct. 2006; also submitted to IEEE PerSeNs workshop | single institute |
doc-1337 | external conference | A Simple Argumentation Based Contract Enforcement Mechanism |
|
Jan-2007 | Cooperative Information Agents X (pp. 347-359). Springer Berlin Heidelberg | collaborative |
doc-1338a | external conference | CodeTorrent: Content Distribution using Network Coding in VANET |
|
Jan-2007 | Proceedings of the 1st international workshop on Decentralized resource sharing in mobile computing and networking (pp. 1-5). ACM | collaborative |
doc-1339 | external conference | The Workflow Based Architecture for Mobile Information Access in Occasionally Connected Computing |
|
Jan-2007 | 2006 IEEE International Conference on Services Computing (SCC 2006), September 18-22, 2006 Chicago, IL | single institute |
doc-1383 | journal | E-ODMRP:Enhanced ODMRP with Motion Adaptive Refresh |
|
Jan-2007 | Journal of Parallel and Distributed Computing | collaborative |
doc-1403 | journal | In-Network Outlier Detection in Wireless Sensor Networks |
|
Jan-2007 | IEEE Transactions on Data and Knowledge and Engineering | collaborative |
doc-1404 | external conference | The influence of risk perception in epidemics: a cellular agent model |
|
Jan-2007 | LNCS ACRI2006 - Cellular Automata for Research and Industry, Perpignan Arxiv preprint q-bio.PE/0607010, 2006 | collaborative |
doc-1559a | tech report | Full Coverage of a Region Allowing Inexact Placement of Sensors Variants: doc-1559b |
|
Jan-2007 | ITA Technical Report | collaborative |
doc-1578e | journal | On the Study of Network Coding with Diversity |
|
Jan-2007 | IEEE Trans. on Wireless Communications | international |
doc-1585 | tech report | Analyzing User Behavior in Instant Messaging |
|
Jan-2007 | single institute | |
doc-1587 | tech report | Policy Algebras for Hybrid Firewalls Variants: doc-1548 |
|
Jan-2007 | Technical Report CUCS-017-07, March 2007,http://mice.cs.columbia.edu/getTechreport.php?techreportID=453 | single institute |
doc-1590 | tech report | Towards Semantic Matchmaking in Sensor-Mission Assignment: Analysis of the Missions and Means Framework |
|
Jan-2007 | Technical Report Task 2, Project 8, Technical Area 3 | collaborative |
doc-x0110 | external conference | Assigning sensors to missions with demands |
|
2007 | Algorithmic Aspects of Wireless Sensor Networks (pp. 114-125). Springer Berlin Heidelberg | collaborative |
doc-x0141 | external conference | Key establishment in heterogeneous self-organized networks |
|
2007 | Lecture Notes in Computer Science (pp. 58-72). Springer Berlin Heidelberg, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings | collaborative |
doc-x0143 | external conference | Managing Sensors and Information Sources Using Semantic Matchmaking and Argumentation |
|
2007 | Cooperative Information Agents XI (pp. 1-4). Springer Berlin Heidelberg | single institute |
doc-x0151 | external conference | Modeling TCP in a Multi-rate Multi-user CDMA System |
|
2007 | NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 403-414). Springer Berlin Heidelberg | collaborative |
doc-x0193 | external conference | Utility Sampling for Trust Metrics in PKI |
|
2007 | IACR Cryptology ePrint Archive, 2007, 178 | single institute |
doc-x0198 | journal | A cluster based approach toward sensor localization and K-coverage problems |
|
2007 | Ubiquitous Computing and Communication Journal, 2(4), 15-23 | single institute |
doc-x0227 | journal | Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods |
|
2007 | Ad Hoc Networks, 5(6), 943-958 | collaborative |
doc-x0229 | journal | Two-Level ZigBee-4G Design for Secure and Efficient Communications in the Resources Constrained Military Environment |
|
2007 | IJCSNS, 7(10), 14 | collaborative |
doc-x0231 | phd thesis | Activity recognition for agent teams Variants: doc-x0344 |
|
2007 | single institute | |
doc-x0344 | phd thesis | Activity recognition for agent team Variants: doc-x0231 |
|
2007 | (No. CMU-RI-07-23). CARNEGIE-MELLON UNIV PITTSBURGH PA ROBOTICS INST. | single institute |
doc-x0672 | patent | Method and system for optimizing wireless networks through feedback and adaptation |
|
2007 | U.S. Patent Application No. 11/857,748. | single institute |
doc-x0685 | tech report | MIT SLOAN SCHOOL OF MANAGEMENT WORKING PAPER 4637-07 |
|
2007 | MIT SLOAN SCHOOL OF MANAGEMENT WORKING PAPER 4637-07 | collaborative |
doc-1334d | tech report | On Sensor Sampling and Quality of Information: A starting point Variants: doc-1334b,doc-1334a |
|
Nov-2006 | single institute | |
doc-1331 | external conference | UAV Assisted Disruption Tolerant Routing |
|
Oct-2006 | IEEE Military Communications Conference, 2006 | collaborative |
doc-1335 | external conference | Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs |
|
Oct-2006 | IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2006 | single institute |
doc-1336 | external conference | The Throughput Order of Ad Hoc Networks Employing Network Coding and Broadcasting |
|
Oct-2006 | IEEE Military Communications Conference, 2006 | single institute |
doc-x0243 | tech report | Literature review of teamwork models |
|
2006 | Robotics Institute, Carnegie Mellon University, 31. | collaborative |